Showing 1,001 - 1,020 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.19s Refine Results
  1. 1001

    Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents by Kamela Al-Mannai, Khaled Al-Thelaya, Jens Schneider, Spiridon Bakiras

    Published 2024-01-01
    “…Additionally, biometric data is privacy-sensitive, and a comprehensive review from a data set perspective is missing. …”
    Get full text
    Article
  2. 1002

    Risk of AI Algorithmic Discrimination Embedded in Government Data Governance and Its Prevention and Control by PENG Lihui, ZHANG Qiong, LI Tianyi

    Published 2024-05-01
    “…To address this issue, this study proposed a series of targeted prevention and control measures, including clarifying the principle of algorithmic fairness, formulating industry norms and standards, improving the accountability mechanism and regulatory system, and optimizing the data collection and processing environment, so as to effectively curb the phenomenon of algorithmic discrimination while making full use of the advantages of AI technology, so that AI technology in government data governance can truly benefit the people, and promote social fairness and justice.…”
    Get full text
    Article
  3. 1003

    Implementing Blockchain Technology for Secure Data Transactions in Cloud Computing Environments Challenges and Solutions by Dandu Varalakshmi, N Shirisha, K Suresh, Saidhbi Shaik, V Venkatesh, C F Theresa Cenate

    Published 2025-01-01
    “…Moreover, the use of smart contracts for decentralized identity management minimizes single points of failure, allowing for strict access controls to share the data as needed in a secure manner. …”
    Get full text
    Article
  4. 1004

    Barriers impeding research data sharing on chronic disease prevention among the older adults in low-and middle-income countries: a systematic review by Neema Florence Vincent Mosha, Patrick Ngulube

    Published 2024-11-01
    “…A PRISMA flow chart was used to map out the number of studies that were identified, included, and excluded.ResultsFive main barriers were consistently highlighted, including a lack of necessary resources (9, 69%), dealing with complex and sensitive research data (2,15%), lack of policies, procedures, guidelines (5,38%), medical big data processing and integration (2,15%), and inadequate ethical considerations, legal compliance, and privacy protection (6,46%). …”
    Get full text
    Article
  5. 1005

    Contribution and legacy: a qualitative study of older people’s attitudes about sharing their routinely collected health data for research purposes in New Zealand by Engelina Groenewald, Jasmine Appleton, Brendan Hallam, Cristian Gonzalez-Prieto, Susan Yates, Daniel Wilson, Gillian Dobbie, Rosie Dobson, Sarah Cullum

    Published 2025-05-01
    “…Data were analysed using thematic analysis. Results Themes identified were: 1) Benefits: participants believed that there were benefits to sharing their health data such as helping others, improving health services, advancing scientific knowledge, and giving back to the health system; sharing health data was also seen as a reflection of good character, and people felt that their pre-existing views about whether they wished to share health data should be respected even if they were no longer able to consent. 2) Concerns: participants had concerns about sharing data with private companies, the use of inaccurate data, and the potential personal and societal consequences of sharing health data. 3) Expectations: participants encouraged collaboration between institutions in New Zealand, but expected data privacy to be maintained, processes to be transparent and cultural values around data to be respected; there was an expectation those sharing health data (patients or institutions) should benefit from any private sector gains. …”
    Get full text
    Article
  6. 1006

    From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context by Sijm H. Noteboom, Eline Kho, Maria Galanty, Clara I. Sánchez, Frans C.P. ten Bookum, Denise P. Veelo, Alexander P.J. Vlaar, Björn J.P. van der Ster

    Published 2025-01-01
    “…The feasibility of the pipeline will be demonstrated with the available data through research and clinical use cases. Furthermore, privacy, safety, data quality, and environmental impact are carefully considered in the cloud storage transition. …”
    Get full text
    Article
  7. 1007

    SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY by Mohammed A. Al-Doghan, Shaxnoza Abdulhaeva

    Published 2025-03-01
    “… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
    Get full text
    Article
  8. 1008

    SHARED DECISION MAKING AND AI ROLE IN NON-FINANCIAL PERFORMANCE: EXPLORING MODERATING ROLE OF TOP MANAGEMENT SUPPORT AND SECURITY by Mohammed A. Al-Doghan, Shaxnoza Abdulhaeva

    Published 2025-03-01
    “… This research investigates the effect of shared decision-making on non-financial performance, with specific attention to the mediating effect of using AI and the moderation effects of security and privacy concerns and top management support. …”
    Get full text
    Article
  9. 1009
  10. 1010

    Data stewardship and curation practices in AI-based genomics and automated microscopy image analysis for high-throughput screening studies: promoting robust and ethical AI applicat... by Asefa Adimasu Taddese, Assefa Chekole Addis, Bjorn T. Tam

    Published 2025-02-01
    “…However, these advancements generate vast datasets requiring effective data stewardship and curation practices to maintain data integrity, privacy, and accessibility. …”
    Get full text
    Article
  11. 1011

    Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs by Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali Alzubi

    Published 2025-04-01
    “…Using blockchain ensures secure and trustworthy communication, transparency in data sharing, maintenance of trust among nodes, and protection of user privacy. …”
    Get full text
    Article
  12. 1012
  13. 1013

    Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. by Yonggang Huang, Teng Teng, Yuanyuan Li, Minghao Zhang

    Published 2025-01-01
    “…However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. …”
    Get full text
    Article
  14. 1014
  15. 1015

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  16. 1016

    Digital twins, synthetic patient data, and in-silico trials: can they empower paediatric clinical trials? by ProfMD Mohan Pammi, Prakesh S Shah, MD, Liu K Yang, PhD, Joseph Hagan, ScD, Nima Aghaeepour, PhD, ProfMD Josef Neu, PhD

    Published 2025-05-01
    “…However, such digital innovations have been rarely used in paediatric trials. In this Viewpoint, we propose using virtual patient data to empower paediatric trials. …”
    Get full text
    Article
  17. 1017

    A practical guide to apply AI in childhood cancer: Data collection and AI model implementation by Shuping Wen, Stefan Theobald, Pilar Gangas, Karina C. Borja Jiménez, Johannes H.M. Merks, Reineke A. Schoot, Marcel Meyerheim, Norbert Graf

    Published 2024-12-01
    “…This review also outlines the rules and criteria for collecting, processing, and sharing these data. Informed consent and re-consent are required for data collection and re-use, and data quality, privacy, and security as well as data standardisation, harmonisation and interoperability are important for data processing. …”
    Get full text
    Article
  18. 1018

    HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes by Xiaohui Yang, Jing Liu

    Published 2024-01-01
    “…Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.…”
    Get full text
    Article
  19. 1019

    Making trauma ecological momentary assessment studies FAIR: review of design considerations and data procedures by Bryce Hruska, Marilyn L. Piccirillo, Lonneke I. M. Lenferink, Maria L. Pacella-LaBarbara, Ateka A. Contractor, Matthew Price, Talya Greene

    Published 2025-12-01
    “…Many challenges remain for the implementation of these practices including balancing privacy concerns and efforts to make trauma EMA data readily shareable.…”
    Get full text
    Article
  20. 1020

    GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks by Tristan Daladier Engouang, Yun Liu, Zhenjiang Zhang

    Published 2015-03-01
    “…The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. …”
    Get full text
    Article