Suggested Topics within your search.
Suggested Topics within your search.
-
521
Balancing Security and Privacy: Web Bot Detection, Privacy Challenges, and Regulatory Compliance under the GDPR and AI Act [version 1; peer review: 2 approved]
Published 2025-03-01“…Additionally, the study dives into the use of Privacy Enhancing Technologies (PETs) to strike a balance between bot detection and user privacy. …”
Get full text
Article -
522
Efficient verifiable searchable encryption with search and access pattern privacy
Published 2025-01-01“…To address these concerns, we first design an efficient conjunctive SE scheme with search and access pattern privacy using private set intersection. In the proposed scheme, we utilize random numbers to obfuscate the values of polynomials and randomly divide the results into two parts, which simplifies the search process, improves search efficiency, and eliminates the need for time-consuming ciphertext multiplication operations. …”
Get full text
Article -
523
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Published 2024-10-01“…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
Get full text
Article -
524
Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning
Published 2024-12-01“…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
Get full text
Article -
525
-
526
Legal grounds for police officers' body-worn cameras
Published 2025-01-01“…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
Get full text
Article -
527
-
528
COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App
Published 2021-12-01“…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
Get full text
Article -
529
Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study
Published 2025-07-01“…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
Get full text
Article -
530
Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years
Published 2025-02-01“…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
Get full text
Article -
531
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01“…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
Get full text
Article -
532
Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review
Published 2025-08-01“…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
Get full text
Article -
533
Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age
Published 2025-06-01“…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
Get full text
Article -
534
Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies
Published 2025-06-01“…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
Get full text
Article -
535
Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population
Published 2023-03-01“…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
Get full text
Article -
536
-
537
Democratic Oversight of Government Hacking by Intelligence Agencies
Published 2025-06-01Get full text
Article -
538
Social Media Suicide Watch
Published 2025-07-01“…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
Get full text
Article -
539
Optimization of machine learning methods for de-anonymization in social networks
Published 2025-03-01“…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
Get full text
Article -
540
An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks
Published 2014-02-01“…Aimed at the Top- k query problems in the wireless sensor networks (WSN) where enquirers try to seek the k highest or shortest reported values of the source nodes, using privacy protection technology, we present an exact Top- k query algorithm based on filter and data distribution table (shorted for ETQFD). …”
Get full text
Article