Showing 801 - 820 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 801

    Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic by Vilić Vida

    Published 2022-01-01
    “…The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. …”
    Get full text
    Article
  2. 802

    Normative framework for the protection against genetic discrimination in Serbia by Petrušić Nevena

    Published 2015-01-01
    “…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
    Get full text
    Article
  3. 803

    A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes by Diana M. POPA

    Published 2025-03-01
    “…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
    Get full text
    Article
  4. 804
  5. 805

    Based on model randomization and adaptive defense for federated learning schemes by Gaofeng Yue, Xiaowei Han

    Published 2025-02-01
    “…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
    Get full text
    Article
  6. 806

    Factors influencing the perceived usability of line pay: An extended technology acceptance model approach by Yogi Tri Prasetyo, Krisna Chandra Susanto, Ko-Hui Chuang, Ruo-Ting Yin, Jia-Wei Chen, Yu-Xuan Zhang, Omar Paolo Benito, Zachariah John A. Belmonte, Maela Madel L. Cahigas, Reny Nadlifatin, Ma. Janice J. Gumasing

    Published 2025-05-01
    “…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  7. 807
  8. 808

    Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks by Simeone Marino, Ruth Cassidy, Joseph Nanni, Yuxuan Wang, Yipeng Liu, Mingyi Tang, Yuan Yuan, Toby Chen, Anik Sinha, Balaji Pandian, Ivo D. Dinov, Michael L. Burns

    Published 2025-08-01
    “…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
    Get full text
    Article
  9. 809

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…Abstract With the popularity of mobile health monitoring and genome sequencing techniques, the scale of biomedical and genomic data grow rapidly, with their privacy receiving more and more concerns. …”
    Get full text
    Article
  10. 810

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
    Get full text
    Article
  11. 811

    Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study by Yu Yang, Peng Shen, Hongbo Lin, Luxia Zhang, Minghui Zhao, Jinwei Wang, Beiyan Bao, Guilan Kong, Xiaoyu Sun, Guohui Ding, Bixia Gao, Chao Yang

    Published 2019-08-01
    “…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
    Get full text
    Article
  12. 812

    Data Protection in Pre-Tertiary Schools In Ghana by Ephrem Kwaa-Aidoo, Elizabeth Serwaa Baah

    Published 2025-05-01
    “…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
    Get full text
    Article
  13. 813

    Blockchain Technology for Secure Patient Data Sharing by Robert-Stefan CIZMAŞ

    Published 2025-05-01
    “… This paper presents a decentralized healthcare data management system that utilizes blockchain technology to address critical challenges in data security, patient privacy, and interoperability of electronic medical records (EMR). …”
    Get full text
    Article
  14. 814

    Exploring assessment methods used by Grade Four English First Additional Language Teachers by Kofi Nkonkonya Mpuangnan, Gladys Phumzile Mngomezulu, Samantha Govender

    Published 2024-06-01
    “…The researchers opted for a thematic analysis approach, allowing for a thorough examination of the data while respecting the privacy and confidentiality of the participants. …”
    Get full text
    Article
  15. 815
  16. 816

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
    Get full text
    Article
  17. 817

    MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM by Virendra P. Vishwakarma, Abhay Kumar Yadav

    Published 2025-01-01
    “…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
    Get full text
    Article
  18. 818

    Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature by Nada Saddig Almaghrabi, Bussma Ahmed Bugis

    Published 2022-07-01
    “…Background Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. …”
    Get full text
    Article
  19. 819

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    “…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
    Get full text
    Article
  20. 820

    GraphXplore: Visual exploration and accessible preprocessing of medical data by Louis Bellmann, Karl Gottfried, Philipp Breitfeld, Frank Ückert

    Published 2025-02-01
    “…Additionally, metadata sharing, and reproducible dataset preparation are needed to increase data quality and interoperability of privacy-sensitive patient data. …”
    Get full text
    Article