Showing 521 - 540 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.34s Refine Results
  1. 521

    Balancing Security and Privacy: Web Bot Detection, Privacy Challenges, and Regulatory Compliance under the GDPR and AI Act [version 1; peer review: 2 approved] by Javier Martínez Llamas, Davy Preuveneers, Koen Vranckaert, Wouter Joosen

    Published 2025-03-01
    “…Additionally, the study dives into the use of Privacy Enhancing Technologies (PETs) to strike a balance between bot detection and user privacy. …”
    Get full text
    Article
  2. 522

    Efficient verifiable searchable encryption with search and access pattern privacy by Wu Axin, Feng Dengguo, Zhang Min, Chi Jialin, Zhang Yinghui

    Published 2025-01-01
    “…To address these concerns, we first design an efficient conjunctive SE scheme with search and access pattern privacy using private set intersection. In the proposed scheme, we utilize random numbers to obfuscate the values of polynomials and randomly divide the results into two parts, which simplifies the search process, improves search efficiency, and eliminates the need for time-consuming ciphertext multiplication operations. …”
    Get full text
    Article
  3. 523

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
    Get full text
    Article
  4. 524

    Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning by G Muni Nagamani, Chanumolu Kiran Kumar

    Published 2024-12-01
    “…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
    Get full text
    Article
  5. 525
  6. 526

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  7. 527
  8. 528

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  9. 529

    Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study by Junyu Wang, Hongying Tang, Siu-Shing Man, Yingwei Chen, Shuzhang Zhou, Hoi-Shou (Alan) Chan

    Published 2025-07-01
    “…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
    Get full text
    Article
  10. 530

    Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years by Daryanto, Ika Safitri Windiarti, Bagus Setya Rintyarna

    Published 2025-02-01
    “…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
    Get full text
    Article
  11. 531

    Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection by Răzvan Rughiniş, Simona-Nicoleta Vulpe, Dinu Ţurcanu, Daniel Rosner

    Published 2025-01-01
    “…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
    Get full text
    Article
  12. 532

    Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review by Gabin F. Morillon, Marlène Guillon, Maude Laberge, Alphonse Sowanou, Thomas G. Poder

    Published 2025-08-01
    “…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
    Get full text
    Article
  13. 533

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article
  14. 534

    Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies by Hussam Ali, Ehab Haikal

    Published 2025-06-01
    “…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
    Get full text
    Article
  15. 535

    Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population by Aaro Tupasela, Juanita Devis Clavijo, Marjut Salokannel, Christoph Fink

    Published 2023-03-01
    “…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
    Get full text
    Article
  16. 536
  17. 537
  18. 538

    Social Media Suicide Watch by Katherine Prothro

    Published 2025-07-01
    “…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
    Get full text
    Article
  19. 539

    Optimization of machine learning methods for de-anonymization in social networks by Nurzhigit Smailov, Fatima Uralova, Rashida Kadyrova, Raiymbek Magazov, Akezhan Sabibolda

    Published 2025-03-01
    “…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
    Get full text
    Article
  20. 540

    An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks by Huang Haiping, Feng Juan, Wang Ruchuan, Qin XiaoLin

    Published 2014-02-01
    “…Aimed at the Top- k query problems in the wireless sensor networks (WSN) where enquirers try to seek the k highest or shortest reported values of the source nodes, using privacy protection technology, we present an exact Top- k query algorithm based on filter and data distribution table (shorted for ETQFD). …”
    Get full text
    Article