Showing 301 - 320 results of 2,784 for search '(((( useddddds OR useddddddds) OR useddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 301

    Traversable Ledger for Responsible Data Sharing and Access Control in Health Research by Sunanda Bose, Dusica Marijan

    Published 2024-12-01
    “…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
    Get full text
    Article
  2. 302
  3. 303

    A Proposed Vision for Using Artificial Intelligence in Enhancing Strategic Value of Human Resources by Nadera Hourani

    Published 2025-06-01
    “…Yet, there are significant challenges in the form of algorithmic bias, data privacy concerns, and organizational readiness. …”
    Get full text
    Article
  4. 304

    Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare by Eleni Gkiolnta, Debopriyo Roy, George F. Fragulis

    Published 2025-01-01
    “…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
    Get full text
    Article
  5. 305

    Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia by Winsherly Tan, Rizky Pratama Putra Karo Karo, Ampuan Situmeang, Shelvi Rusdiana, Siti Suraya Abd Razak

    Published 2025-03-01
    “…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
    Get full text
    Article
  6. 306

    High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection by Yanqin Zhang, Zhanling Zhang

    Published 2025-01-01
    “…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309

    “By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye by Murat Uluk

    Published 2023-06-01
    “…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
    Get full text
    Article
  10. 310

    Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS by Hyoungshick Kim, Sangwon Hyun

    Published 2025-01-01
    “…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
    Get full text
    Article
  11. 311

    On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec by Eric Montigny, Philippe Dubois, Thierry Giasson

    Published 2019-12-01
    “…Québec presents an interesting case to study the effects of data-driven campaigning of parties operating in a parliamentary system where privacy protection rules are limited. …”
    Get full text
    Article
  12. 312

    Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments by D. Dhinakaran, S. Gopalakrishnan, D. Selvaraj, M.S. Girija, G. Prabaharan

    Published 2025-06-01
    “…However, in outsourced data for tasks like frequent itemset mining, privacy is an important issue. …”
    Get full text
    Article
  13. 313

    PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA by Valentina BĂRBĂȚEANU

    Published 2019-05-01
    “…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
    Get full text
    Article
  14. 314

    A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum by Janis Judvaitis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, Leo Selavo

    Published 2024-12-01
    “…Internet of Things (IoT), Edge, and Cloud components combined with artificial intelligence (AI) in data processing systems must ensure strong security and privacy for data sources. …”
    Get full text
    Article
  15. 315

    SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications by Zaineb Naaz, Gamini Joshi, Vidushi Sharma

    Published 2025-04-01
    “…The model achieves an 81% improvement in energy efficiency compared to non-edge networks and reduces aggregation costs by 90% and 14% relative to Privacy-Preserving fault tolerant data aggregation (PPDA) and fog- enabled secure data aggregation (FESDA) schemes. …”
    Get full text
    Article
  16. 316

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
    Get full text
    Article
  17. 317
  18. 318

    BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management by Xinzhang Chen, Arash Shaghaghi, Jesse Laeuchli, Salil S. Kanhere

    Published 2025-01-01
    “…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
    Get full text
    Article
  19. 319

    THE USE OF HUMAN CHIP IMPLANTS FROM THE HADITH PERSPECTIVE by Vira Fharadillah, Muhammad Ghifari, Abil Ash

    Published 2025-07-01
    “…Chip implants are permitted for clear medical purposes that do not cause harm, while their use for non-medical purposes or those that potentially violate privacy and pose risks is prohibited in Islam. …”
    Get full text
    Article
  20. 320

    Wasserstein GAN for moving differential privacy protection by Enze Liu, Zhiguang Chu, Xing Zhang

    Published 2025-06-01
    “…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
    Get full text
    Article