Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddddds » usedddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useddddds » usedddddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
361
Customer adoption of smartwatches – a privacy calculus perspective
Published 2025-04-01“…The authors collected 310 responses using a structured questionnaire; after data cleaning, 270 responses were used for data analysis. …”
Get full text
Article -
362
Federated Learning for Privacy-Preserving Employee Performance Analytics
Published 2025-01-01“…This paper introduces HFAN-Priv, a hierarchical federated attention network designed to predict employee resignation risk and evaluate performance trends without sharing raw data across organizations. The framework integrates feature-level and instance-level attention to model complex workforce patterns, applies differential privacy through gradient masking to ensure compliance with data protection regulations, and enhances interpretability using local SHAP and LIME explanations. …”
Get full text
Article -
363
DEBPIR: enhancing information privacy in decentralized business modeling
Published 2025-05-01“…Abstract Business modelling often involves extensive data collection and analysis, raising concerns about privacy infringement. …”
Get full text
Article -
364
Privacy for Process Mining: A Systematic Literature Review
Published 2025-01-01“…However, privacy preservation issues arise when handling such data. …”
Get full text
Article -
365
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01“…First, the framework is used to extract data during the literature review defining state-of-the-art aspects and measures. …”
Get full text
Article -
366
Expedite Privacy-Preserving Emergency Communication Scheme for VANETs
Published 2013-05-01“…But requirements of information collection and data transmission in emergency scenario are very imperative. …”
Get full text
Article -
367
Aerial pathways to resilience: the acceptance of drones in logistics transformation
Published 2025-05-01“…This study examines the determinants of consumer acceptance of drone delivery services, focusing on the roles of perceived usefulness, ease of use, and privacy concerns. We collected data from 1,108 Portuguese consumers through an online survey to assess how these factors influence consumer attitudes and intentions toward adopting drone delivery services. …”
Get full text
Article -
368
-
369
Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward
Published 2020-01-01“…The decentralized database in BT emphasizes data security and privacy. Also, the consensus mechanism in it makes sure that data is secured and legitimate. …”
Get full text
Article -
370
A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications
Published 2025-01-01“…Federated Learning (FL) introduces a decentralised machine learning paradigm whereby models can be trained over distributed nodes without sharing data. Despite its promise, FL faces significant security challenges, such as gradient inversion, model poisoning, and privacy leakage, which involve strong cryptographic techniques. …”
Get full text
Article -
371
The Nature of the Right to Personal Data: A Civil Law Perspective
Published 2024-11-01“…This paper aims to examine the nature of the right to personal data. Based on an analysis of Russian legislation, the Author concludes that there exists an unnamed, independent subjective right, which serves to enable the data subject to control and define the conditions for data processing, as well as to protect personal data from unauthorized use. …”
Get full text
Article -
372
Human Daily Indoor Action (HDIA) Dataset: Privacy-Preserving Human Action Recognition Using Infrared Camera and Wearable Armband Sensors
Published 2025-01-01“…The use of IR sensors enhances privacy, making the dataset ethically suitable for long-term monitoring. …”
Get full text
Article -
373
Trajectory differential privacy protection mechanism based on prediction and sliding window
Published 2020-04-01“…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
Get full text
Article -
374
Cross-Company Data Sharing Using Distributed Analytics
Published 2025-05-01“…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
Get full text
Article -
375
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
Get full text
Article -
376
Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance
Published 2025-05-01“…The performance depends on factors such as Recall, Ranking Privacy, Precision, Searching Speed. The proposed algorithm efficiently retrieves the required data maintaining the privacy and identifies the relevant data at high accuracy and optimal speed. …”
Get full text
Article -
377
New blockchain consensus algorithm applied on healthcare industry: Proof of Visit- (POV)
Published 2025-04-01“…Sharing personal EHR without the citizen’s consent can lead to data privacy issues. In systems where patient data is centrally stored, software changes can cause problems such as loss of patient data. …”
Get full text
Article -
378
Identification of hazardous road locations using ambulance data
Published 2025-03-01“…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
Get full text
Article -
379
A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data
Published 2025-06-01“…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
Get full text
Article -
380
Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice
Published 2025-06-01“…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
Get full text
Article