Showing 1,501 - 1,520 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.22s Refine Results
  1. 1501

    An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography by Zeyu Sun, Yan Wang

    Published 2025-08-01
    “…Once these data are leaked, the privacy and security of users will be threatened. …”
    Get full text
    Article
  2. 1502

    The Legal Challenges of Implementing AI in Emergency Departments by Shaghayegh Rahmani, Sahar Azamghasemzadeh

    Published 2024-04-01
    “…Additionally, AI systems used in healthcare must be designed with robust security measures to prevent data breaches and ensure the integrity of patient information (1). …”
    Get full text
    Article
  3. 1503

    UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities by Syed M. Aqleem Abbas, Muazzam A. Khan Khattak, Wadii Boulila, Anis Kouba, M. Shahbaz Khan, Jawad Ahmad

    Published 2024-01-01
    “…Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. …”
    Get full text
    Article
  4. 1504

    An empirical study on the usage behavior of mobile health management service systems for flight attendants in the digital Age by Yuting Liu, Yuting Liu, Haiyan Li

    Published 2025-04-01
    “…This study deeply explores the use behavior and influencing factors of mobile health management service systems for flight attendants in the context of the "Digital age".MethodsThe study mainly adopted the questionnaire survey method, used SPSS24.0 and AMOS24.0 software for data analysis, and used statistical methods such as factor analysis, regression analysis, and path analysis to verify the effectiveness of the model and explore the relationship between key variables.Results(1) The usage rate of the health management service system among flight attendants is not as high as expected, but the use rate of sports health monitoring applications reached 66.5%, and the daily frequency of use was as high as 25.52%, (2) Perceived ease of use and perceived usefulness have a positive and significant impact on intention to use, (3) Privacy concerns have a positive impact on intention to use Significant negative impact.ConclusionThe study points out that ease of use and usefulness are key factors in attracting flight attendants to use mobile health management service systems. …”
    Get full text
    Article
  5. 1505

    Appropriately Matching Transport Care Units to Patients in Interhospital Transport Care: Implementation Study by Shirin Hasavari, Pouyan Esmaeilzadeh

    Published 2024-12-01
    “…We introduce a distributed digital health platform, Interfacility Transport Care (ITC)–InfoChain, designed to solve this problem without compromising EHR security or data privacy. ObjectiveThis study aimed to detail the implementation of ITC-InfoChain, a secure, blockchain-based platform designed to enhance real-time data sharing without compromising data privacy or EHR security. …”
    Get full text
    Article
  6. 1506

    Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing by Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu

    Published 2020-01-01
    “…A Leakage-Resilient Ciphertext-Policy Attribute-based Encryption (LR-CP-ABE) not only supports the fine-grained access control to encrypted data but also guarantees the security of the data under the side-channel attacks. …”
    Get full text
    Article
  7. 1507

    Problematic aspects of IoT cybersecurity standardisation by P. S. Klimushyn

    Published 2025-04-01
    “…The main problem with IoT devices is related to privacy and security. The administration of large amounts of data for reliable and secure processing is a real challenge. …”
    Get full text
    Article
  8. 1508

    THE IMPACT OF DIGITAL INNOVATION ON E-COMMERCE YOUNG CUSTOMER SATISFACTION IN VIETNAM by Minh-Hoa Le, Que-Nhu Duong, Hieu-Nghia Nguyen, Quynh-Nhu Au, Nhat-Nam Pham

    Published 2025-01-01
    “…It investigates key factors influencing user satisfaction employing frameworks such as the Uses and Gratifications Theory (U&G), Technology Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of Technology (UTAUT), including utilitarian, hedonic, technological, and social gratifications, privacy risk, and social influence. …”
    Get full text
    Article
  9. 1509

    Machine Learning in Ambient Assisted Living for Enhanced Elderly Healthcare: A Systematic Literature Review by Aabid A. Mir, Ahmad S. Khalid, Shahrulniza Musa, Mohammad Faizal Ahmad Fauzi, Normy Norfiza Abdul Razak, Tong Boon Tang

    Published 2025-01-01
    “…Issues around data privacy, security breaches, and the need for robust privacy-preserving mechanisms are recurrent themes. …”
    Get full text
    Article
  10. 1510

    Graph Split Federated Learning for Distributed Large-Scale AIoT in Smart Cities by Hanyue Xu, Kah Phooi Seng, Li-Minn Ang, Wei Wang, Jeremy Smith

    Published 2025-01-01
    “…However, the centralization of sensitive IoT data for ML raises privacy and efficiency concerns. …”
    Get full text
    Article
  11. 1511

    Blockchain and signcryption enabled asynchronous federated learning framework in fog computing by Zhou Zhou, Youliang Tian, Jinbo Xiong, Changgen Peng, Jing Li, Nan Yang

    Published 2025-04-01
    “…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
    Get full text
    Article
  12. 1512

    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology by Pingping Sun, Lingang Gu

    Published 2021-01-01
    “…Then, functions such as swarm intelligence contract, legal anonymous identity authentication, intelligent transaction matching, abnormal data analysis and detection, privacy protection, and traceability are realized under the framework of the supervision system. …”
    Get full text
    Article
  13. 1513

    An Examination of Records Retention and Disposition Policy at Kabale University. by Nayakiira, Promise

    Published 2024
    “…The study sampled a total of 15 which was collected and used in the analysis. Data was collected through questionnaires and interviews. …”
    Get full text
    Thesis
  14. 1514

    Recommendations for reporting regression-based norms and the development of free-access tools to implement them in practice. by Rok Blagus, Bojan Leskošek, Francisco B Ortega, Grant Tomkinson, Gregor Jurak

    Published 2025-01-01
    “…Following our recommendations, any user can access the underlying models while data privacy is maintained. This approach ensures broad accessibility and practical application of norms, allowing other researchers to accurately interpret their individual data against such norms.…”
    Get full text
    Article
  15. 1515

    A Cloud User Anomaly Detection Method Based on Mouse Behavior by XU Hong-jun, ZHANG Hong, HE Wei

    Published 2019-08-01
    “… Aiming at the problem of cloud security threat caused by illegal operation of cloud users, this paper proposes a method to detect the abnormal behavior of cloud users by analyzing the mouse operation behavior in user’s work by using deep learning technology under the premise of ensuring the privacy of cloud users. …”
    Get full text
    Article
  16. 1516

    Prevention and Detection Methods for Enhancing Security in an RFID System by Jing Huey Khor, Widad Ismail, Mohammad Ghulam Rahman

    Published 2012-08-01
    “…Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. …”
    Get full text
    Article
  17. 1517

    An explainable and federated deep learning framework for skin cancer diagnosis. by Shuvo Biswas, Sajeeb Saha, Muhammad Shahin Uddin, Rafid Mostafiz

    Published 2025-01-01
    “…However, protecting patient data privacy is a major concern in medical research. …”
    Get full text
    Article
  18. 1518

    Federated learning applications in soil spectroscopy by Giannis Gallios, Nikolaos Tsakiridis, Nikolaos Tziolas

    Published 2025-04-01
    “…Soil spectroscopy has emerged as a key technique for rapid, non-destructive soil property prediction, yet the centralized nature of the training of machine learning models raises concerns around data privacy, accessibility, and transferability. …”
    Get full text
    Article
  19. 1519

    Distributed Training Techniques for Intelligent Model in Space-Based Information Networks by LI Yuanjun, YANG Dewei, LI Jianing, FENG Xiao

    Published 2025-03-01
    “…In addressing the issues of data distribution heterogeneity, outdated models, and data privacy and security in distributed training of intelligent models, a federated learning architecture of intelligent models was designed based on blockchain technology and applied to space-based information networks. …”
    Get full text
    Article
  20. 1520

    Examine frameworks policies and strategies for effective information governance in healthcare organizations. by Richard Okyere Boadu, Victor Wireko Adu, Kwame Adu Okyere Boadu, Baishatu Ibrahim, Prince Akey, Amponsah Amishadas Mensah, Godwin Adzakpah, Nathan Kumasenu Mensah

    Published 2025-01-01
    “…The majority of healthcare professionals were familiar with and advocated for adherence to regulatory requirements such as HIPAA (33.7%), GDPR (21.3%) and HITECH Act (14.4%), in making data governance much robust. Efforts were also identified in ensuring privacy and confidentiality during the storage, processing and transmission of patient data mostly by deploying methods such as authentication (58.9%), use of secured computers and software (71.2%) and using secure electronic platforms (66.0%) respectively indicating a keen attention for data stewardship and governance. …”
    Get full text
    Article