Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
621
A decade of research on genetic privacy: the findings of the GetPreCiSe Center at Vanderbilt University
Published 2025-08-01“…While this research shows that the risk of unauthorized re-identification is often over-stated, it also identifies possible ways privacy can be compromised. Several technical and legal methods for reducing privacy risks are described, most of which focus not on collection of the data, but rather on regulating data security, access, and use once it is collected. …”
Get full text
Article -
622
Theme-Rheme Analysis in Probing Google’s Coercion Trespassing User’s Privacy; A Forensic Linguistics Research
Published 2022-09-01“…It represents the clause analysis through the use of theme-rheme in probing the user's privacy violations in Google's user privacy policy agreement: a forensic linguistics research. …”
Get full text
Article -
623
Trust-aware privacy-preserving QoS prediction with graph neural collaborative filtering for internet of things services
Published 2025-02-01“…However, issues related to information credibility, user data privacy, and prediction accuracy in QoS prediction for IoT services have become significant challenges in current research. …”
Get full text
Article -
624
Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP
Published 2025-05-01“…This act of sharing the original network data with another server can worsen the current arrangement of protecting privacy within the network. …”
Get full text
Article -
625
A service-oriented microservice framework for differential privacy-based protection in industrial IoT smart applications
Published 2025-08-01“…However, despite their potential, the practical adoption of these technologies faces critical challenges, particularly concerning data privacy and security. AI models, especially in distributed environments, may inadvertently retain and leak sensitive training data, exposing users to privacy risks in the event of malicious attacks. …”
Get full text
Article -
626
Losing control: The effects of social media fatigue, privacy concerns and psychological reactance on social media advertising
Published 2022-12-01“…This caused users to feel negatively after using SMP. Ad avoidance is caused by significant privacy concerns when encountering personalized ads, such as suspicion as to how data is used, the feeling of being watched and listened to, as well as annoyance at the irrelevance and repetitiveness of SMA. …”
Get full text
Article -
627
Mediating role of trust and privacy concerns between web assurance mechanism and purchase intention of online products
Published 2024-12-01“…A conceptual model has been framed to investigate the direct and indirect relationship between web assurance mechanism and purchase intention of online products via trust and privacy concern. This study uses data collected from 342 respondents. …”
Get full text
Article -
628
A Privacy Preserving Attribute-Based Access Control Model for the Tokenization of Mineral Resources via Blockchain
Published 2025-07-01“…A comparative analysis between ABAC and RBAC highlights how ABAC provides greater flexibility, security, and privacy for mining operations. By introducing ABAC in blockchain-based mineral reserve tokenization, this paper contributes to a more efficient and secure way of managing data access in the mining industry, ensuring that only authorized stakeholders can interact with tokenized mineral assets.…”
Get full text
Article -
629
Ethical-legal implications of AI-powered healthcare in critical perspective
Published 2025-07-01“…This requires an appraisal of AI use from a legal and ethical perspective. A review of the existing literature on AI in healthcare available on PubMed, Oxford Academic and Scopus revealed several common concerns regarding the relationship between AI, ethics, and healthcare—(i) the question of data: the choices inherent in collection, analysis, interpretation, and deployment of data inputted to and outputted by AI systems; (ii) the challenges to traditional patient-doctor relationships and long-held assumptions about privacy, identity and autonomy, as well as to the functioning of healthcare institutions. …”
Get full text
Article -
630
Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things
Published 2025-08-01“…By integrating adaptive clustering via the LEACH protocol, secure key distribution through Public Key Generators (PKGs), and private data aggregation using the Location Privacy Tree (LPT) and Chinese Remainder Theorem (CRT), the framework addresses both communication efficiency and data confidentiality. …”
Get full text
Article -
631
Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks
Published 2024-11-01“…Leveraging Federated Learning (FL), our approach enables the detection of tampered RF transmissions while safeguarding sensitive IoT data, as FL allows model training on distributed devices without sharing raw data. …”
Get full text
Article -
632
Privacy–preserving dementia classification from EEG via hybrid–fusion EEGNetv4 and federated learning
Published 2025-08-01“…Moreover, FL using FedAvg is implemented across five stratified clients, achieving 96.9% accuracy on the hybrid fused EEGNetV4 model while preserving data privacy. …”
Get full text
Article -
633
It’s Time to Relax: The Critical Importance of Digital Mental Health Products in the Context of Surveillance Capitalism
Published 2021-07-01“…We want to move beyond the personal data privacy debate and tackle other potential issues – what does this data sharing mean in terms of a shift in collective psychology and ideologies? …”
Get full text
Article -
634
Quality and Privacy Policy Compliance of Mental Health Care Apps in China: Cross-Sectional Evaluation Study
Published 2025-07-01“…Although mental health care apps can enhance outcomes, their handling of highly sensitive personal data poses significant privacy risks. …”
Get full text
Article -
635
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
Published 2025-07-01“…Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mrow><mo>−</mo><mn>2</mn></mrow></msup></semantics></math></inline-formula> probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments.…”
Get full text
Article -
636
Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems
Published 2025-07-01“…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
Get full text
Article -
637
A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network
Published 2015-10-01“…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
Get full text
Article -
638
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence
Published 2025-08-01“…Abstract The Internet of Things (IoT) consists of physical objects and devices embedded with network connectivity, software, and sensors to collect and transmit data. The development of the Internet of Things (IoT) has led to various security and privacy issues, including distributed denial-of-service (DDoS) attacks. …”
Get full text
Article -
639
Ethics of Artificial Intelligence and Robotics: Key Issues and Modern Ways to Solve Them
Published 2023-12-01Get full text
Article -
640
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article