Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddddds » usedddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddddds » usedddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
-
301
NFTs enabled federated digital identity data representation and management
Published 2025-05-01“…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
Get full text
Article -
302
Las tecnologías de la información; derecho a la privacidad, tratamiento de datos y tercera edad
Published 2011-09-01Get full text
Article -
303
TAPS Responsibility matrix: a tool for responsible data science by design
Published 2024-12-01“…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
Get full text
Article -
304
A Proposed Vision for Using Artificial Intelligence in Enhancing Strategic Value of Human Resources
Published 2025-06-01“…Yet, there are significant challenges in the form of algorithmic bias, data privacy concerns, and organizational readiness. …”
Get full text
Article -
305
High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection
Published 2025-01-01“…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
Get full text
Article -
306
Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare
Published 2025-01-01“…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
Get full text
Article -
307
-
308
Applying usability recommendations when developing mobile instant messaging applications
Published 2022-02-01Get full text
Article -
309
Protection of Public Services Personal Data in The Delivery of Public Services: Comparative Study in Indonesia and Malaysia
Published 2025-03-01“…However, the exposure of personal data in public service is worrying, as data breaches have affected the public's privacy. …”
Get full text
Article -
310
“By browsing this site, you accept cookies”: Research on the cookie usage permissions of news sites in Türkiye
Published 2023-06-01“…Particularly in recent years, increasing awareness levels about personal data, digital privacy studies, and legal regulations have raised concerns about the use of cookies. …”
Get full text
Article -
311
Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS
Published 2025-01-01“…Web servers typically use data compression and encryption to optimize data transmission and protect user privacy. …”
Get full text
Article -
312
On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec
Published 2019-12-01“…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
Get full text
Article -
313
Mining privacy-preserving association rules using transaction hewer allocator and facile hash algorithm in multi-cloud environments
Published 2025-06-01“…However, in outsourced data for tasks like frequent itemset mining, privacy is an important issue. …”
Get full text
Article -
314
PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA
Published 2019-05-01“…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
Get full text
Article -
315
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
Published 2024-12-01“…Internet of Things (IoT), Edge, and Cloud components combined with artificial intelligence (AI) in data processing systems must ensure strong security and privacy for data sources. …”
Get full text
Article -
316
SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications
Published 2025-04-01“…The model achieves an 81% improvement in energy efficiency compared to non-edge networks and reduces aggregation costs by 90% and 14% relative to Privacy-Preserving fault tolerant data aggregation (PPDA) and fog- enabled secure data aggregation (FESDA) schemes. …”
Get full text
Article -
317
Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem
Published 2025-06-01“…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
Get full text
Article -
318
-
319
BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
Published 2025-01-01“…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
Get full text
Article -
320
The Law Reform Regarding the Regulation of Medical Use of Artificial Intelligence and the Protection of Patient Privacy in the Utilization of Artificial Intelligence in Health Care
Published 2024-01-01“…Further research is needed to determine the protection of patient privacy in the context of the use of artificial intelligence in the health sector and the need for legal reform related to the use of artificial intelligence in the health sector. …”
Get full text
Article