Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,081 - 1,100 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 1081

    Perceived risk and intention to use digital financial services of Vietnamese youth by Nguyễn Thị Thương, Khúc Thế Anh, Nguyễn Mạnh Cường, Phan Anh Tuấn, Bùi Thị Thanh Huyền, Võ Mỹ Linh

    Published 2025-01-01
    “…SPSS26 and AMOS24 software were used for data processing. The results show that “Security risk” does not affect the “Perceived Risk” of the youth. …”
    Get full text
    Article
  2. 1082

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…Abstract  The current condition of the Internet of Things tends to be without the use of security features, especially in the field of privacy and data confidentiality, especially in the low power sensor module i.e. …”
    Get full text
    Article
  3. 1083

    Opportunities and Challenges: The Use of ChatGPT in Enabling Library Knowledge Services by Huaming LI

    Published 2024-08-01
    “…At the same time, the application focuses on the risks and challenges posed by technical limitations, intellectual property rights, user privacy, harmful information, data sources, academic integrity and other aspects. …”
    Get full text
    Article
  4. 1084

    A Comparative Analysis of Data Protection in E-commerce B2C Contracts in Georgia and the European Union by Nato Gugava, Lika Kobaladze, Tamta Kenia, Oliko Kobakhidze

    Published 2024-12-01
    “…A lot of people communicate with the extensive use of the internet and technologies, including e-procurement, which, in these relationships require the correct processing of personal data, whereas improper protection of great deal of information increases risks of using data for criminal purposes and threatens personal privacy of consumers. …”
    Get full text
    Article
  5. 1085

    Federated Conditional Variational Auto Encoders for Cyber Threat Intelligence: Tackling Non-IID Data in SDN Environments by Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, Kashif Nisar, Mohammed Azmi Al-Betar

    Published 2025-01-01
    “…Federated Learning is a promising paradigm for sharing Cyber Threat Intelligence (CTI) without privacy issues by leveraging the cross-silos data in Software Defined Networking (SDN). …”
    Get full text
    Article
  6. 1086

    Nairobi motorcycle transit comparison dataset: Fuel vs. electric vehicle performance tracking (2023)Mendeley Data by Alois Mbutura, Martin Kitetu, Halloran Stratford, M.J. Booysen

    Published 2025-08-01
    “…To safeguard rider privacy, location data for the first and last trips of each day are excluded. …”
    Get full text
    Article
  7. 1087

    Barriers to contraceptive access and use among youths (15–24 Years) living in informal urban settlements of Kigali, Rwanda: a qualitative study by Emmanuel Okiror Okello, Alexandre Edgard Murinzi, Colyse Nduwimana, Rashidah Nambaziira

    Published 2025-08-01
    “…Abstract Background Contraceptive use among youths below 19 years in Rwanda is still very low, as low as 3.7%, yet their level of sexual activity is high. …”
    Get full text
    Article
  8. 1088

    Fed-DPSDG-WGAN: Differentially Private Synthetic Data Generation for Loan Default Prediction via Federated Wasserstein GAN by Padmaja Ramachandra, Santhi Vaithiyanathan

    Published 2025-01-01
    “…We investigate the potential of replacing the original data with statistically similar synthetic data to be used as training data to predict loan defaulters. …”
    Get full text
    Article
  9. 1089

    Santé et Big Data : l’Etat et les individus, impuissants face aux pouvoirs des réseaux by Joël Colloc

    Published 2017-03-01
    “…The use of Internet and of the social networks, lead the users to share data concerning their private life and their health. …”
    Get full text
    Article
  10. 1090

    The Association of Psychological Factors With Willingness to Share Health-Related Data From Technological Devices: Cross-Sectional Questionnaire Study by Marijn Eversdijk, Emma Rixt Douma, Mirela Habibovic, Willem Johan Kop

    Published 2025-01-01
    “…However, the use of health technology data might be hampered by the reluctance of patients to share personal health technology data because of the privacy sensitivity of this information. …”
    Get full text
    Article
  11. 1091
  12. 1092

    Enhancing Approach for Information Security in Hadoop by Raghad Z. Yousif, Shahab W. Kareem, Shadan M. Abdalwahid

    Published 2020-06-01
    “…This event motivates the need of a policy which will control these challenges. Hadoop may be a used policy recommended to beat this big data problem which usually utilizes MapReduce design to arrange huge amounts of information of the cloud system. …”
    Get full text
    Article
  13. 1093

    FedWeight: mitigating covariate shift of federated learning on electronic health records data through patients re-weighting by He Zhu, Jun Bai, Na Li, Xiaoxiao Li, Dianbo Liu, David L. Buckeridge, Yue Li

    Published 2025-05-01
    “…Abstract Federated learning (FL) enables collaborative analysis of decentralized medical data while preserving patient privacy. However, the covariate shift from demographic and clinical differences can reduce model generalizability. …”
    Get full text
    Article
  14. 1094

    Applications of blockchain technology in long-term care: use cases, potentials, and barriers by Beate Steurer, Birgit Trukeschitz, Ulrike Schneider

    Published 2024-10-01
    “…Abstract Background Digitalization in long-term care (LTC) is being discussed as a means of easing pressures on care service delivery, optimizing care coordination and planning processes, and improving service quality. With its advanced data protection and process automation features, blockchain technology could help solve data security and privacy issues, especially for the implementation of assistive technologies. …”
    Get full text
    Article
  15. 1095
  16. 1096

    Navigating the future of higher education in Saudi Arabia: implementing AI, machine learning, and big data for sustainable university development by Muhammad Adnan Khan, Abdur Rehman, Asghar Ali Shah, Sagheer Abbas, Meshal Alharbi, Munir Ahmad, Taher M. Ghazal

    Published 2025-06-01
    “…This paper looks at ways to successfully use artificial intelligence (AI) and big data analytics in Saudi higher education while supporting long-term growth. …”
    Get full text
    Article
  17. 1097

    Machine Learning-Powered Smart Healthcare Systems in the Era of Big Data: Applications, Diagnostic Insights, Challenges, and Ethical Implications by Sita Rani, Raman Kumar, B. S. Panda, Rajender Kumar, Nafaa Farhan Muften, Mayada Ahmed Abass, Jasmina Lozanović

    Published 2025-07-01
    “…It explores the principal challenges of data heterogeneity, privacy, computational complexity, and advanced methods such as federated learning (FL) and edge computing. …”
    Get full text
    Article
  18. 1098

    Teachers’ digital literacy competencies according to their age status and their level of use in classes by Gökbulut Burak, Yeniasır Mustafa, Gökbulut Özlem Dağlı

    Published 2024-01-01
    “…While the quantitative data collected was statistically analyzed and interpreted, the qualitative data was analyzed using the descriptive analysis technique. …”
    Get full text
    Article
  19. 1099

    The Use of ChatGPT in English Language Learning: A Systematic Literature Review by Nur Hidayati, Erna Andriyanti, Novasa Adiyani

    Published 2025-03-01
    “…Following PRISMA guidelines, this review analyzes data from Scopus, ERIC, and Google Scholar using thematic analysis to identify key themes. …”
    Get full text
    Article
  20. 1100