Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 1,041 - 1,060 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 1041

    Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media by Belia Rida Syifa Fauzia, Lukman Yudokusumo, Yova Ruldeviyani

    Published 2024-08-01
    “…These findings indicated that users’ trust, awareness, privacy concerns, and behavioral intentions significantly and positively influence the tendency to share personal data on social media platforms. …”
    Get full text
    Article
  2. 1042

    Navigating challenges/opportunities in developing smart agricultural extension platforms: Multi-media data mining techniques by Josué Kpodo, A. Pouyan Nejadhashemi

    Published 2025-09-01
    “…Addressing data privacy issues involves adhering to open-access principles and enforcing strict data encryption and anonymization standards. …”
    Get full text
    Article
  3. 1043

    Multifaceted Assessment of Responsible Use and Bias in Language Models for Education by Ishrat Ahmed, Wenxing Liu, Rod D. Roscoe, Elizabeth Reilley, Danielle S. McNamara

    Published 2025-03-01
    “…This study proposes a framework for the automatic detection of biases and violations of responsible use using a synthetic question-based dataset mimicking student–chatbot interactions. …”
    Get full text
    Article
  4. 1044

    An Evaluation on the Potential of Large Language Models for Use in Trauma Triage by Kelvin Le, Jiahang Chen, Deon Mai, Khang Duy Ricky Le

    Published 2024-10-01
    “…Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation.…”
    Get full text
    Article
  5. 1045

    Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review by Tino Kreutzer, James Orbinski, Lora Appel, Aijun An, Jerome Marston, Ella Boone, Patrick Vinck

    Published 2025-04-01
    “…Abstract Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. …”
    Get full text
    Article
  6. 1046
  7. 1047

    Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems by Manuel J. C. S. Reis

    Published 2025-06-01
    “…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
    Get full text
    Article
  8. 1048

    Putting health facilities on the map: a renewed call to create geolocated, comprehensive, updated, openly licensed dataset of health facilities in sub-Saharan African countries by Peter M. Macharia, Lenka Beňová, Nicolas Ray, Aline Semaan, Moses M. Musau, John Kapoi Kipterer, Mark Herringer, Robert W. Snow, Emelda A. Okiro

    Published 2025-04-01
    “…Consequently, multiple national and subnational parallel efforts attempt to construct HFDBs, resulting in duplication and lack of governmental input, use, and validation. Main body In this paper, we advocate for a harmonized SSA-wide HFDB. …”
    Get full text
    Article
  9. 1049

    Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management by Oluwaseun Priscilla Olawale, Sahar Ebadinezhad

    Published 2024-01-01
    “…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
    Get full text
    Article
  10. 1050

    Establishing a Personal Data Protection Agency for E-Commerce in Indonesia: Legal Framework and Implementation Challenges by Bilqis Laila Nuzul Sa'adah, Sukarmi, Reka Dewantara

    Published 2024-12-01
    “…The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
    Get full text
    Article
  11. 1051

    Challenges and strategies in building a foundational digital health data integration ecosystem: a systematic review and thematic synthesis by Radha Ambalavanan, R Sterling Snead, Julia Marczika, Gideon Towett, Alex Malioukis, Mercy Mbogori-Kairichi

    Published 2025-06-01
    “…A thematic synthesis approach was used to categorize findings into three primary themes: interoperability, PCC, and genomic data integration.ResultsA total of 161 studies were included. …”
    Get full text
    Article
  12. 1052

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…Besides, a Modified Digest hashing algorithm is also used with M-AES for feeding the encrypted text and hash into data blocks. …”
    Get full text
    Article
  13. 1053

    Open Power System Datasets and Open Simulation Engines: A Survey Toward Machine Learning Applications by Ignacio Aravena, Chih-Che Sun, Ranyu Shi, Subir Majumder, Weihang Yan, Jhi-Young Joo, Le Xie, Jiyu Wang

    Published 2025-01-01
    “…In comparison, power grid datasets face three major challenges: (i) real-world data is often restricted by regulatory constraints, privacy reasons, or security concerns, making it difficult to obtain and work with; (ii) synthetic datasets, which are created to address these limitations, often have incomplete information and are released using specialized tools, making them inaccessible to the broader community; and, (iii) input-output datasets are difficult to generate through simulation for non-experts because open-source simulators are not known outside the power system community. …”
    Get full text
    Article
  14. 1054
  15. 1055

    Self-Supervised Learning Powered by Synthetic Data From Diffusion Models: Application to X-Ray Images by Abdullah Hosseini, Ahmed Serag

    Published 2025-01-01
    “…Synthetic data offers a compelling solution to the challenges associated with acquiring high-quality medical data, which is often constrained by privacy concerns and limited accessibility. …”
    Get full text
    Article
  16. 1056

    Synthetic data trained open-source language models are feasible alternatives to proprietary models for radiology reporting by Aakriti Pandita, Angela Keniston, Nikhil Madhuripan

    Published 2025-07-01
    “…Abstract The study assessed the feasibility of using synthetic data to fine-tune various open-source LLMs for free text to structured data conversation in radiology, comparing their performance with GPT models. …”
    Get full text
    Article
  17. 1057
  18. 1058

    An Examination of Human Rights Related to the Protection of Debtor Customer Data and Information Through Bank Secrecy Rules by Erma Defiana Putriyanti, Abdul Rachmad Budiono, Sukarmi Sukarmi, Reka Dewantara

    Published 2025-03-01
    “… This research aims to examine and analyse how the protection of debtor customer data and information in the perspective of human rights. …”
    Get full text
    Article
  19. 1059

    Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction by Yingqiang Qiu

    Published 2025-01-01
    “…With the development of cloud computing, reversible data hiding in encrypted images (RDH-EI) technology has gained significant attention in ensuring data security and privacy protection. …”
    Get full text
    Article
  20. 1060

    Algorithmic systems: the consent is in the detail? by Alexandra Giannopoulou

    Published 2020-03-01
    “…While these applications are progressively gaining momentum, established data protection and privacy rules have struggled to incorporate the particularities of data-intensive information societies. …”
    Get full text
    Article