Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 221 - 240 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 221

    Fostering social media user intentions: AI-enabled privacy and intrusiveness concerns by Muhammad Haroon Shoukat, Islam Elgammal, Kareem M. Selem, Ali Elsayed Shehata

    Published 2025-03-01
    “…Findings – Privacy concerns significantly affect perceived usefulness. …”
    Get full text
    Article
  2. 222

    Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems by Belinda Ndlovu, Kudakwashe Maguraushe

    Published 2025-07-01
    “…Thematic analysis identified ten critical themes centred around benefits, challenges, applications, responsible use, privacy and data security, ethical considerations, institutional policies and frameworks, training, equity, and sustainable AI use. …”
    Get full text
    Article
  3. 223

    Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning by Huda Kadhim Tayyeh, Ahmed Sabah Ahmed AL-Jumaili

    Published 2024-10-01
    “…Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major problem. …”
    Get full text
    Article
  4. 224

    My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralized Share of Multi-Dimensional Data to Enhance Global Healthcare by SATHYA KRISHNASAMY

    Published 2024-08-01
    “…This paper introduces a concept beyond cryptocurrencies and finance into everyday real-world use cases that need combinatorial access to a person’s holistic data, including financial and health records, genomic data, and advanced directives, among others, that need to be privacy protected and shared with specific actors identified for their roles in the WEB3 ecosystem through decentralized identifiers and non-fungible token badges identifying particular recipients. …”
    Get full text
    Article
  5. 225

    Federated learning for intrusion detection in IoT environments: a privacy-preserving strategy by Ansam Khraisat, Ammar Alazab, Moutaz Alazab, Areej Obeidat, Sarabjot Singh, Tony Jan

    Published 2025-06-01
    “…While allowing devices to benefit from the network’s collective insights, this decentralised learning methodology safeguards data privacy. Using a real-world IoT dataset and two popular federated learning algorithms—Federated Average and Federated Average with Momentum—the study assesses the effectiveness of PEIoT-DS. …”
    Get full text
    Article
  6. 226

    My privacy at risk – my guard is on: a study of SNS use among young adults by Meenakshi Handa, Ronika Bhalla, Parul Ahuja

    Published 2024-03-01
    “…Purpose – Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. …”
    Get full text
    Article
  7. 227

    Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockch... by Ameer Ahmed, Asjad Shahzad, Afshan Naseem, Shujaat Ali, Imran Ahmad

    Published 2025-01-01
    “…Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. …”
    Get full text
    Article
  8. 228

    Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users by Abdullah Alabdulatif

    Published 2025-03-01
    “…The advancement of e-health systems has resulted in substantial enhancements in healthcare delivery via effective data management and accessibility. The use of digital health solutions presents dangers to sensitive health information, including unauthorised access, privacy violations, and security weaknesses. …”
    Get full text
    Article
  9. 229

    Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage by ZHANG Xiaoxu, CHEN Yuchen, HA Guanxiong, JIA Chunfu

    Published 2024-09-01
    “…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
    Get full text
    Article
  10. 230

    Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage by ZHANG Xiaoxu, CHEN Yuchen, HA Guanxiong, JIA Chunfu

    Published 2024-09-01
    “…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
    Get full text
    Article
  11. 231
  12. 232

    Board of Directors Role in Data Privacy Governance: Making the Transition from Compliance Driven to Good Business Stewardship by David Warner, Lisa McKee

    Published 2024-02-01
    “…Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. …”
    Get full text
    Article
  13. 233

    Efficient Traceability Systems with Smart Contracts: Balancing On-Chain and Off-Chain Data Storage for Enhanced Scalability and Privacy by Manuel José Fernández-Iglesias, Christian Delgado von Eitzen, Luis Anido-Rifón

    Published 2024-11-01
    “…The hash key method offers significant advantages in reducing blockchain storage costs, enhancing privacy, and maintaining data integrity, but it depends on reliable off-chain storage. …”
    Get full text
    Article
  14. 234

    Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes by J. Jayapradha, M. Prakash, Youseef Alotaibi, Osamah Ibrahim Khalaf, Saleh Ahmed Alghamdi

    Published 2022-01-01
    “…Currently, significant focus has been established to protect privacy during data publishing. The existing privacy models for multiple sensitive attributes do not concentrate on the correlation among the attributes, which in turn leads to much utility loss. …”
    Get full text
    Article
  15. 235
  16. 236
  17. 237

    Distributed cross-learning for equitable federated models - privacy-preserving prediction on data from five California hospitals by Tsung-Ting Kuo, Rodney A. Gabriel, Jejo Koola, Robert T. Schooley, Lucila Ohno-Machado

    Published 2025-02-01
    “…We introduce Distributed Cross-Learning for Equitable Federated models (D-CLEF), which incorporates horizontally- or vertically-partitioned data without disseminating patient-level records, to protect patients’ privacy. …”
    Get full text
    Article
  18. 238
  19. 239
  20. 240