Showing 361 - 380 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.28s Refine Results
  1. 361

    Privacy for Process Mining: A Systematic Literature Review by Ibrahim Ileri, Tugba Gurgen Erdogan, Ayca Kolukisa-Tarhan

    Published 2025-01-01
    “…However, privacy preservation issues arise when handling such data. …”
    Get full text
    Article
  2. 362

    Multiple modes of data sharing can facilitate secondary use of sensitive health data for research by Nicki Tiffin, Themba Mutemaringa, Tsaone Tamuhla, Eddie T Lulamba

    Published 2023-10-01
    “…Increasing volumes of highly granular data provide opportunities to leverage the evidence base, with growing recognition that health data are highly sensitive and onward research use may create privacy issues for individuals providing data. …”
    Get full text
    Article
  3. 363

    A Survey on Privacy-Preserving Machine Learning Inference by Stanisław Barański

    Published 2025-07-01
    “…Use cases in healthcare, finance, and education show how these techniques balance privacy with practical performance. …”
    Get full text
    Article
  4. 364

    Adaptive Transformation for Robust Privacy Protection in Video Surveillance by Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan Kankanhalli

    Published 2012-01-01
    “…However, the current detectors are not fully reliable, leading to breaches in privacy protection. In this paper, we propose a privacy protection method that adopts adaptive data transformation involving the use of selective obfuscation and global operations to provide robust privacy even with unreliable detectors. …”
    Get full text
    Article
  5. 365

    Aerial pathways to resilience: the acceptance of drones in logistics transformation by Sofia Gomes, João M. Lopes, Tiago Trancoso

    Published 2025-05-01
    “…This study examines the determinants of consumer acceptance of drone delivery services, focusing on the roles of perceived usefulness, ease of use, and privacy concerns. We collected data from 1,108 Portuguese consumers through an online survey to assess how these factors influence consumer attitudes and intentions toward adopting drone delivery services. …”
    Get full text
    Article
  6. 366

    Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward by Sudeep Tanwar, Qasim Bhatia, Pruthvi Patel, Aparna Kumari, Pradeep Kumar Singh, Wei-Chiang Hong

    Published 2020-01-01
    “…The decentralized database in BT emphasizes data security and privacy. Also, the consensus mechanism in it makes sure that data is secured and legitimate. …”
    Get full text
    Article
  7. 367
  8. 368

    A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications by Anik Sen, Swee-Huay Heng, Shing-Chiang Tan

    Published 2025-01-01
    “…Federated Learning (FL) introduces a decentralised machine learning paradigm whereby models can be trained over distributed nodes without sharing data. Despite its promise, FL faces significant security challenges, such as gradient inversion, model poisoning, and privacy leakage, which involve strong cryptographic techniques. …”
    Get full text
    Article
  9. 369

    Trajectory differential privacy protection mechanism based on prediction and sliding window by Ayong YE, Lingyu MENG, Ziwen ZHAO, Yiqing DIAO, Jiaomei ZHANG

    Published 2020-04-01
    “…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
    Get full text
    Article
  10. 370

    Human Daily Indoor Action (HDIA) Dataset: Privacy-Preserving Human Action Recognition Using Infrared Camera and Wearable Armband Sensors by Jongbum Park, Kyoung Ok Yang, Sunme Park, Jun Won Choi

    Published 2025-01-01
    “…The use of IR sensors enhances privacy, making the dataset ethically suitable for long-term monitoring. …”
    Get full text
    Article
  11. 371

    Cultural Differences in the Use of Augmented Reality Smart Glasses (ARSGs) Between the U.S. and South Korea: Privacy Concerns and the Technology Acceptance Model by Se Jung Kim, Yoon Esther Lee, T. Makana Chock

    Published 2025-07-01
    “…Korea = 898) perceived usefulness, perceived ease of use, attitude toward using, and behavioral intention to use ARSGs were impacted by privacy concerns. …”
    Get full text
    Article
  12. 372

    The Nature of the Right to Personal Data: A Civil Law Perspective by L. V. Shvets

    Published 2024-11-01
    “…This paper aims to examine the nature of the right to personal data. Based on an analysis of Russian legislation, the Author concludes that there exists an unnamed, independent subjective right, which serves to enable the data subject to control and define the conditions for data processing, as well as to protect personal data from unauthorized use. …”
    Get full text
    Article
  13. 373

    Cross-Company Data Sharing Using Distributed Analytics by Soo-Yon Kim, Stefanie Berninger, Max Kocher, Martin Perau, Sandra Geisler

    Published 2025-05-01
    “…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
    Get full text
    Article
  14. 374

    Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance by K. Vignesh Saravanan, G. Sakthi Priya

    Published 2025-05-01
    “…The performance depends on factors such as Recall, Ranking Privacy, Precision, Searching Speed. The proposed algorithm efficiently retrieves the required data maintaining the privacy and identifies the relevant data at high accuracy and optimal speed. …”
    Get full text
    Article
  15. 375

    New blockchain consensus algorithm applied on healthcare industry: Proof of Visit- (POV) by Çetin Şahin, Muhammed Ali Aydin, Ahmet Sertbaş

    Published 2025-04-01
    “…Sharing personal EHR without the citizen’s consent can lead to data privacy issues. In systems where patient data is centrally stored, software changes can cause problems such as loss of patient data. …”
    Get full text
    Article
  16. 376

    Identification of hazardous road locations using ambulance data by Anne Vingaard Olesen, Tim Alex Lindskou, Rasmus Øhlenschlæger, Torben Anders Kløjgaard, Anders Brogaard Tallaksen, Jens Lauritsen, Erika Frischknecht Christensen, Harry Lahrmann

    Published 2025-03-01
    “…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
    Get full text
    Article
  17. 377

    A Systematic Review on the Use of Big Data in Tourism by Jafar Ahangaran, Abbas Sadeghnia

    Published 2024-09-01
    “…Limitations: Although the use of big data in academic research has made significant progress, there are still challenges regarding data quality, data cost, and user privacy concerns. …”
    Get full text
    Article
  18. 378

    Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm by Syahrul Adrianto, Bambang Agus Herlambang, Ramadhan Renaldy

    Published 2025-06-01
    “…To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. …”
    Get full text
    Article
  19. 379

    Federated Mental Wellbeing Assessment Using Smartphone Sensors Under Unreliable Participation by Gavryel Martis, Ryan McConville

    Published 2025-01-01
    “…The findings suggested that given the widespread use of such devices, FL holds great potential in mood and depression detection while protecting data privacy. …”
    Get full text
    Article
  20. 380

    Data protection impact assessment system in the mode of risk management by Ying CHENG

    Published 2018-08-01
    “…In the era of big data,the risk management approach has been broadly applied in the field of personal information protection.Data protection impact assessment has become an important system to promote data protection.It takes the provisions of the data protection impact assessment of the European General Data Protection Regulation (GDPR) 2016 as the sample.By using the literature research and empirical analysis method,it analyzes in depth the theoretical background,rise and evolution,meaning and scope of data protection impact assessment to establish a standardized and specific impact assessment system as well as promote personal information protection.Assessment content includes not only privacy risk assessment,but also data security,data quality and non-discrimination.Data protection impact assessment should be set as a mandatory obligation for data processing activities that are likely to result in high risks.The evaluation process shall take the advices from stakeholders to reflect their benefits.The external supervision should be strengthened and the assessment report shall be published properly.…”
    Get full text
    Article