Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddddddds » usedddddddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddddddds » usedddddddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
-
441
-
442
Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population
Published 2023-03-01“…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
Get full text
Article -
443
Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age
Published 2025-06-01“…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
Get full text
Article -
444
Social Media Suicide Watch
Published 2025-07-01“…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
Get full text
Article -
445
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Get full text
Article -
446
A multimodal differential privacy framework based on fusion representation learning
Published 2022-12-01“…Then based on this representation, we use the Local Differential Privacy (LDP) mechanism to protect data. …”
Get full text
Article -
447
Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies
Published 2025-06-01“…Ethical concerns, including data privacy and algorithmic bias, received a mean score of 3.75, while sustainability challenges, such as e-waste and energy consumption, scored the lowest (mean = 3.20, SD = 0.85). …”
Get full text
Article -
448
Democratic Oversight of Government Hacking by Intelligence Agencies
Published 2025-06-01Get full text
Article -
449
Optimization of machine learning methods for de-anonymization in social networks
Published 2025-03-01“…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
Get full text
Article -
450
Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years
Published 2025-02-01“…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
Get full text
Article -
451
Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity Considerations
Published 2024-06-01“…Current and future developments must focus on securing AI models against attacks, ensuring data integrity, and safeguarding the privacy of individuals within this technological landscape.…”
Get full text
Article -
452
Children's digital privacy on fast-food and dine-in restaurant mobile applications.
Published 2025-02-01“…Restaurant mobile applications are powerful platforms for collecting users' data and are popular among children. This study aimed to provide insight into the privacy policies of top dine-in and fast-food mobile apps in Canada and data collected on child users. …”
Get full text
Article -
453
Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust
Published 2025-04-01“…Once approved, users are primarily concerned about privacy protection (i.e., user-to-system trust) when utilizing system services that require sensitive data for their functionality. …”
Get full text
Article -
454
Challenges in IoMT Adoption in Healthcare: Focus on Ethics, Security, and Privacy
Published 2024-12-01“…This study highlights ethical, security, and privacy barriers to IoMT adoption in developing countries and proposes strategies like regulatory frameworks, data encryption, AI transparency, and professional training to address these challenges. …”
Get full text
Article -
455
GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks
Published 2025-01-01“…Machine learning has become integral to our lives, finding applications in nearly every aspect of our daily routines. However, using personal information in machine learning applications has raised concerns about user data privacy and security. …”
Get full text
Article -
456
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
Published 2025-05-01“…Our pre-prototyped framework can provide such privacy preservation (namely <i>virtual proof of privacy (VPP)</i>) and visually secure data transfer promptly (<1000 ms), as well as the physical distance of the smart glasses (∼50 cm).…”
Get full text
Article -
457
Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks
Published 2016-07-01“…In this paper, to make full use of idle spectrum with low probability of location leakage, we propose a Location Privacy-Preserving Channel Allocation (LP-p CA) scheme. …”
Get full text
Article -
458
A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles
Published 2024-01-01“…Simultaneously, personal data use for analytics is growing at an unprecedented rate, raising concerns for privacy. …”
Get full text
Article -
459
PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification
Published 2025-02-01“…Secondly, the PPSC scheme securely implements the fundamental modules such as the convolutional layer, ReLU layer, average pooling layer, fully connected layer, and Softmax layer. This ensures the privacy of speech data, speech classification models, and intermediate computing results. …”
Get full text
Article -
460
Ensuring the security and privacy of information in mobile health-care communication systems
Published 2011-09-01“…The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. …”
Get full text
Article