Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
781
Investigating Sensitive Issues in Class Through Randomized Response Polling
Published 2024-10-01“…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
Get full text
Article -
782
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems
Published 2016-10-01“…In addition, the improvement obtained in the alignment process by combining the two assessment winners does not impact negatively the privacy of the user’s data, since no clear-text data is exchanged in the alignment process.…”
Get full text
Article -
783
‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes
Published 2025-01-01“…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
Get full text
Article -
784
Trust and Privacy Concerns Among Cancer Survivors Who Did Not Visit a Research Website Offering Free Genetic Counseling Services for Families: Survey Study
Published 2025-05-01“…ObjectiveWe designed a theory-based cross-sectional survey to explore the following questions: (1) To what extent did nonresponders endorse privacy concerns? (2) Were privacy concerns associated with recall of receiving the website invitation, time since diagnosis, age, and race? …”
Get full text
Article -
785
Big data transfer service architecture for cloud data centers: problems, methods, applications, and future trends
Published 2025-08-01“…After thoroughly screening selected peer-reviewed articles, the primary open issues are: incorporating a data placement module in the data transfer service, providing end-to-end safeguards for packet delivery, improving data transfer time and speed, minimizing costs and implementation overhead, ensuring secure data transfer between servers in the cloud, demonstrating effective big data transfer architectures, considering topology-specific extensions to reduce the busty nature of data centers, and enhancing data transfer services using machine learning algorithms during upload and download operations. …”
Get full text
Article -
786
Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain
Published 2025-05-01“…However, with new technologies and services, the issue of privacy and data security has become more urgent. …”
Get full text
Article -
787
The ethics of using artificial intelligence in medical research
Published 2024-12-01Get full text
Article -
788
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
789
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
790
Evaluation of Adblock Software Usage
Published 2019-12-01“…The study was based on data obtained by a web questionnaire. The research was focused on evaluation of adblocking software usage factors in five categories: (1) gender, age, and education; (2) use of advertising and sources of knowledge about advertising; (3) technical and social reasons for blocking online advertisements; (4) usage of an adblock-wall; and (5) type of online advertisement. …”
Get full text
Article -
791
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
792
LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment
Published 2025-04-01“…The widespread use of biometric recognition has intensified social concerns about personal privacy disclosure. …”
Get full text
Article -
793
Federated learning-based semantic segmentation framework for sustainable development
Published 2025-06-01“…Federated Learning protects user privacy by processing data locally on client devices rather than storing it centrally on a server. …”
Get full text
Article -
794
Student nurses’ views regarding disclosure of patients’ confidential information
Published 2011-10-01Get full text
Article -
795
Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment
Published 2011-02-01“…This article reflects on the meaning of the words “control” and “privacy” in light of the intensive diffusion of user generated content on the web. …”
Get full text
Article -
796
Calibrated optional randomized response techniques for efficient and robust estimation of quantitative sensitive variables
Published 2025-05-01“…Numerical applications using both real and simulated data supported the theoretical findings, demonstrating that the C-ORRT models exhibited lower biases, reduced variances, higher relative efficiency, enhanced privacy levels, and a better combined metric of variance and privacy. …”
Get full text
Article -
797
User Centric Android Application Permission Manager
Published 2021-12-01“…Like other systems, mobile devices are prune to different attacks that might invade user’s privacy and lead to private data leakage. Millions of Mobile application have been developed and used Worldwide, most of them are requiring permissions to work properly. …”
Get full text
Article -
798
Ethical and regulatory challenges in machine learning-based healthcare systems: A review of implementation barriers and future directions
Published 2025-03-01“…Key issues concern patient data privacy, algorithmic bias, absence of transparency, and ambiguous legal liability. …”
Get full text
Article -
799
Considerations for using Artificial Intelligence in Medical Education
Published 2025-05-01“…Dear Editor Today, the traditional context and method of education have changed, marking the beginning of the digital era in education. The use of new technologies, such as virtual reality (VR), augmented reality (AR), simulators, and artificial intelligence (AI), is a key factor in improving the quality of education and learning outcomes. …”
Get full text
Article -
800
Synthetic data production for biomedical research
Published 2025-04-01“…Synthetic data, generated using advanced artificial intelligence (AI) techniques, replicates the statistical properties of real-world datasets while excluding identifiable information. …”
Get full text
Article