Suggested Topics within your search.
Suggested Topics within your search.
-
961
Assessing the Uses, Benefits, and Limitations of Digital Technologies Used by Health Professionals in Supporting Obesity and Mental Health Communication: Scoping Review
Published 2025-02-01“…MethodsA comprehensive scoping review, which followed a validated methodology, analyzed studies published between 2013 and 2023 across 8 databases. The data extraction focused on HPs’ use of communication technologies, intervention types, biopsychosocial considerations, and perceptions of technology use. …”
Get full text
Article -
962
A decentralised architecture for secure exchange of assets in data spaces: The case of SEDIMARKGitHub
Published 2025-08-01“…Together the technologies used in SEDIMARK ensure privacy, trust and data quality for secure management, sharing, and monetisation of assets in data spaces.…”
Get full text
Article -
963
-
964
A DLP Module Design Based on Plug-in for MS Word
Published 2020-08-01“…This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. …”
Get full text
Article -
965
-
966
Hierarchical Swin Transformer Ensemble with Explainable AI for Robust and Decentralized Breast Cancer Diagnosis
Published 2025-06-01“…However, deep learning (DL) models used in healthcare face significant challenges, including concerns about data privacy, domain-specific overfitting, and limited interpretability. …”
Get full text
Article -
967
COMPUTATIONAL THINKING IN THE PROBLEM OF RELIABLE AND SECURE DATA TRANSMISSION OVER A COMMUNICATION CHANNEL
Published 2025-05-01“…There are three problems that have to be solved when transmitting data over communication channels: detection and correction of errors caused by interference in communication channels; ensuring of transmitted data privacy; protection against injection of false data. …”
Get full text
Article -
968
Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management
Published 2025-07-01“…Abstract The rapid adoption of Federated Learning (FL) in privacy-sensitive domains such as healthcare, IoT, and smart cities underscores its potential to enable collaborative machine learning without compromising data ownership. …”
Get full text
Article -
969
Federated learning with tensor networks: a quantum AI framework for healthcare
Published 2024-01-01“…The healthcare industry frequently handles sensitive and proprietary data, and due to strict privacy regulations, it is often reluctant to share it directly. …”
Get full text
Article -
970
Attitudes and preferences toward the adoption of voice-controlled intelligent personal assistants: Evidence from Croatia
Published 2023-06-01“…This paper provides an examination of the differences between IPA users and non-users as well as an overview of (non-)user perception related to privacy and security issues associated with IPA and trust in companies' appropriate use of IPA-generated data. …”
Get full text
Article -
971
Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects
Published 2025-03-01“…The logger operates a cryptography hash function of a feature vector of a video data frame and an XOR encoding scheme used for hiding the privacy information of sensitive objects in the video data frame. …”
Get full text
Article -
972
Legal Reform of Artificial Intelligence's Liability to Personal Data Perspectives of Progressive Legal Theory
Published 2024-04-01“…The research found that the use of Artificial Intelligence in collecting and analysing personal data can threaten individual privacy. …”
Get full text
Article -
973
Knowledge abstraction and filtering based federated learning over heterogeneous data views in healthcare
Published 2024-10-01“…Abstract Robust data privacy regulations hinder the exchange of healthcare data among institutions, crucial for global insights and developing generalised clinical models. …”
Get full text
Article -
974
Pursuit of Digital Innovation in Psychiatric Data Handling Practices in Ireland: Comprehensive Case Study
Published 2025-06-01“…ObjectiveThis study’s objective involves examining the state of data handling practices in the Irish Mental Health Services (MHS), identifying the shortcomings regarding privacy, security, and usability of psychiatric case notes, and proposing an innovative technological solution that addresses most of the surfaced challenges. …”
Get full text
Article -
975
Investigating the role of serious games on raising students’ awareness on safety and data protection on the Internet
Published 2025-08-01“…In this article, we present the results of an empirical study that utilized serious games for raising students’ awareness on safety and data protection on the Internet. Two questionnaires, that collected information regarding students’ knowledge and practices while using the Internet, were used for data collection. …”
Get full text
Article -
976
Traffic concealed data detection method based on contrastive learning and pre-trained Transformer
Published 2025-03-01“…To solve the problems of characterizing representing massive encrypted traffic, perceiving malicious behaviors, and identifying the ownership of privacy data, a traffic concealed data detection method was proposed based on contrastive learning and pre-trained Transformer. …”
Get full text
Article -
977
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
978
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verification may be used due to these features. …”
Get full text
Article -
979
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing is proposed. …”
Get full text
Article -
980
Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks
Published 2015-08-01“…However, how to keep data security and data privacy in cloud-integrated body sensor network (C-BSN) is an important and challenging issue since the patients’ health-related data are quite sensitive. …”
Get full text
Article