Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
881
The Use of ChatGPT in English Language Learning: A Systematic Literature Review
Published 2025-03-01“…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
Get full text
Article -
882
Ethical and legal considerations in healthcare AI: innovation and policy for safe and fair use
Published 2025-05-01Get full text
Article -
883
The use of micromobility riding simulators in road safety research: a systematic review
Published 2025-09-01“…Collecting real-world and field data involves numerous challenges due to ethical, privacy, and safety concerns. …”
Get full text
Article -
884
-
885
A review of the use of technology in sport coaching: current trends and future directions
Published 2025-03-01“…Various technological tools and applications have been developed to help coaches analyze athlete performance, monitor physical condition, provide feedback, and make decisions based on objective, real-time data. Conclusion The use of technology in sports training offers promising benefits but also presents challenges. …”
Get full text
Article -
886
Use of ChatGPT in Education: Future Strategic Road Map with SWOT Analysis
Published 2024-10-01“…However, concerns have been raised regarding ethical issues such as data privacy, security, plagiarism, bias, and the potential for commercial exploitation, as well as negative psychological impacts on users. …”
Get full text
Article -
887
Enhanced federated learning for secure medical data collaboration
Published 2025-04-01“…Abstract Federated learning (FL) enables collaborative model training across multiple institutions while preserving data privacy. However, conventional encryption techniques used in FL remain vulnerable to quantum attacks, raising concerns about the security of model update transmissions. …”
Get full text
Article -
888
Balancing Risks and Opportunities: Data-Empowered-Health Ecosystems
Published 2025-03-01“…However, efforts to meet this need face risks related to privacy, data protection, security, democratic governance, and exclusion. …”
Get full text
Article -
889
Use of AI in Mental Health Care: Community and Mental Health Professionals Survey
Published 2024-10-01“…The surveys collected data on demographics, technology comfort, attitudes toward AI, specific AI use cases, and experiences of benefits and harms from AI use. …”
Get full text
Article -
890
Healthcare Providers’ Perspective about the Use of Telemedicine in Egypt: A National Survey
Published 2022-01-01“…Participants assumed that the use of telemedicine might not have a negative effect on the doctor-patient relationship but raised some concerns regarding the privacy and security of patients’ data. …”
Get full text
Article -
891
Private Data Leakage in Federated Contrastive Learning Networks
Published 2025-01-01“…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
Get full text
Article -
892
Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone
Published 2024-11-01“…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
Get full text
Article -
893
Should we communicate with the dead to assuage our grief? An Ubuntu perspective on using griefbots
Published 2024-01-01Get full text
Article -
894
Emotional Design of Interior Spaces: Exploring Challenges and Opportunities
Published 2025-01-01“…For this purpose, the data is gathered in two phases. In phase I, semi-structured interviews were utilized to collect data from 5 interior designers. …”
Get full text
Article -
895
Anonymization in web auctions using Zero-Knowledge Proof in Blockchain technology
Published 2025-06-01“…However, the centralized nature of traditional e-commerce platforms raises concerns about data control, privacy, and potential single points of failure. …”
Get full text
Article -
896
Fingernail analysis management system using microscopy sensor and blockchain technology
Published 2018-03-01“…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
Get full text
Article -
897
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
898
Trends and pattern of contraceptive use among women attending a family planning clinic at a tertiary health facility in Ibadan, Nigeria
Published 2025-06-01“…Data were analysed using a logistic regression model (α0.05), and thematic analysis was used for the qualitative part of the study. …”
Get full text
Article -
899
Understanding user acceptance of mobility-as-a-service in Jakarta Metropolitan Area (JMA): Influencing factors and behavioural insights
Published 2025-07-01“…Driven by theoretical constructs of the technology acceptance model, a set of motivational factors and choice scenarios, a behavioural model is conceptualised to explore individuals’ willingness to adopt MaaS in the JMA. Using data from 1,005 respondents collected in a survey, structural equation modelling (SEM), cluster analysis and choice modelling were conducted. …”
Get full text
Article -
900
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
Published 2025-06-01“…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
Get full text
Article