Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 821 - 840 results of 2,784 for search '(((( useddds OR useddddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.23s Refine Results
  1. 821

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
    Get full text
    Article
  2. 822

    Unveiling Digital Wallets Adoption in Developing countries: A Dual-Factor Approach of Enablers and Inhibitors Impacting User Intentions by Doaa Rasheed, Mohammed Alsalem, Odai Enaizan

    Published 2025-06-01
    “…Structural Equation Modeling (SEM) was employed for data analysis using AMOS software. The findings indicate that performance expectancy, effort expectancy, social influence, perceived privacy, perceived security, and trust all have a significant impact on the intention regarding the adoption of digital wallets.…”
    Get full text
    Article
  3. 823

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    “…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
    Get full text
    Article
  4. 824

    Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges by Sobia Mehrban, Muhammad Waqas Nadeem, Muzammil Hussain, Mohammad Masroor Ahmed, Owais Hakeem, Shazia Saqib, M. L. Mat Kiah, Fakhar Abbas, Mujtaba Hassan, Muhammad Adnan Khan

    Published 2020-01-01
    “…The term does take into account various other sensitive issues, like, security, privacy, threats, cyber-attacks, etc. This is important to note that the development of FinTech is indebted to the mutual integration of different state of the art technologies, for example, technologies related to a mobile embedded system, mobile networks, mobile cloud computing, big data, data analytics techniques, and cloud computing etc. …”
    Get full text
    Article
  5. 825

    Explanations of news personalisation across countries and media types by Mariella Bastian, Mykola Makhortykh, Jaron Harambam, Max van Drunen

    Published 2020-10-01
    “…Yet, the technical implementation of news personalisation systems, in particular the one relying on algorithmic news recommenders (ANRs) and tailoring individual news suggestions with the help of user data, often remains opaque. In our article, we examine how news personalisation is used by quality and popular media in three countries with different media accountability infrastructures - Brazil, the Netherlands, and Russia - and investigate how information about personalisation usage is communicated to the news readers via privacy policies. …”
    Get full text
    Article
  6. 826

    User consultation and the design of healing architecture in a cardiology department – ways to improve care for and well-being of patients and their relatives by Maja Forum Riisbøl, Connie Timmermann

    Published 2020-01-01
    “…Design: A mixed-method approach was used, based on user consultation, in order to inform the redecoration and redesign of the observation room. …”
    Get full text
    Article
  7. 827

    A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System by Juan Alamrio Berrios Moya, John Ayoade, Md Ashraf Uddin

    Published 2025-05-01
    “…We have used dual-blockchain, which separates public and private information, which can enhance both efficiency and privacy. …”
    Get full text
    Article
  8. 828

    A survey on membership inference attacks and defenses in machine learning by Jun Niu, Peng Liu, Xiaoyan Zhu, Kuo Shen, Yuecong Wang, Haotian Chi, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang

    Published 2024-09-01
    “…Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. …”
    Get full text
    Article
  9. 829

    Dying in Darkness: Deviations From Data Sharing Ethics in the US Public Health System and the Data Genocide of American Indian and Alaska Native Communities by Cason D Schmit, Meghan Curry O’Connell, Sarah Shewbrooks, Charles Abourezk, Fallon J Cochlin, Megan Doerr, Hye-Chung Kum

    Published 2025-03-01
    “…Good governance practices like transparent data practices and the establishment of a social license (ie, the informal permission of a community to collect and use data) is essential to ethically balancing collective well-being with individual privacy in public health.…”
    Get full text
    Article
  10. 830

    Sharing health data for research purposes: results of a population survey in Germany by Caroline Dotter, Sonja Haug, Rainer Schnell, Georgios Raptis, Karsten Weber

    Published 2025-05-01
    “…Abstract Background Increased use of health data has the potential to improve both health care and health policies. …”
    Get full text
    Article
  11. 831

    Framework for Addressing Imbalanced Data in Aviation with Federated Learning by Igor Kabashkin

    Published 2025-02-01
    “…The proposed framework provides a scalable and practical solution for using distributed aviation data while addressing both class imbalance and privacy concerns, contributing to improved safety and operational efficiency in the aviation industry.…”
    Get full text
    Article
  12. 832

    Reflection on High-Quality Development of Smart Health Data by Weixuan Wang, Shaomei Shang, Zhiwen Wang, Luxia Zhang, Lin Ma, Na Li, Junhui Wu, Xu Zhang, Lan Li, Qimin Zhan

    Published 2024-12-01
    “…The development of smart geriatric care data in China now faces challenges regarding fusion of multi-source heterogeneous data, data security and privacy, and data use ethics. …”
    Get full text
    Article
  13. 833

    THE SECURITY OF PERSONAL DATA IN EUROPEAN UNION SINCE 2018 by Dariusz Brążkiewicz

    Published 2019-07-01
    “…Intensive development of information technology in the early 21st century means that citizens’ personal data is constantly processed using increasingly advanced digital technologies. …”
    Get full text
    Article
  14. 834

    Data Governance Navigation for Advanced Operations in Healthcare Excellence by Vahideh Zarea Gavgani, Aniseh Pourrasmi

    Published 2024-08-01
    “…Developments in medical data analysis bring important social benefits but also challenge privacy and other ethical values. …”
    Get full text
    Article
  15. 835

    Balancing Risks and Opportunities: Data-Empowered-Health Ecosystems by Lan Li, Emma Back, Suna Lee, Rebecca Shipley, Néo Mapitse, Stefan Elbe, Melanie Smallman, James Wilson, Ifat Yasin, Geraint Rees, Ben Gordon, Virginia Murray, Stephen L Roberts, Anna Cupani, Patty Kostkova

    Published 2025-03-01
    “…However, efforts to meet this need face risks related to privacy, data protection, security, democratic governance, and exclusion. …”
    Get full text
    Article
  16. 836

    Comparison of Personal Data Protection Laws Indonesia and Thailand by wardah yuspin, Miranti Kusretno Tampawestri, Ridho Bawana Jati

    Published 2025-06-01
    “…The emergence the leakage of personal data realizes the protection of personal data is very important because it involves the concept of one’s privacy. …”
    Get full text
    Article
  17. 837

    Enhanced federated learning for secure medical data collaboration by Benjamin Appiah, Isaac Osei, Bill K. Frimpong, Daniel Commey, Kwabena Owusu-Agymang, Gabriel Assamah

    Published 2025-04-01
    “…Abstract Federated learning (FL) enables collaborative model training across multiple institutions while preserving data privacy. However, conventional encryption techniques used in FL remain vulnerable to quantum attacks, raising concerns about the security of model update transmissions. …”
    Get full text
    Article
  18. 838

    Private Data Leakage in Federated Contrastive Learning Networks by Kongyang Chen, Wenfeng Wang, Zixin Wang, Yao Huang, Yatie Xiao, Wangjun Zhang, Zhipeng Li, Zhefei Guo, Zhucheng Luo, Lin Yin, Haiyan Mai, Xiaoying Wang, Qintai Yang

    Published 2025-01-01
    “…Generally, Federated Contrastive Learning (FCL) represents an emerging approach for learning from decentralized unlabeled data while upholding data privacy. In FCL, participant clients collaborate in learning a global encoder using unlabeled data, which can serve as a versatile feature extractor for diverse downstream tasks. …”
    Get full text
    Article
  19. 839

    Promoting Awareness of Data Confidentiality and Security During the COVID-19 Pandemic in a Low-Income Country—Sierra Leone by Joseph Sam Kanu, Mohamed A. Vandi, Brima Bangura, Katherine Draper, Yelena Gorina, Monique A. Foster, Jadnah D. Harding, Eric N. Ikoona, Amara Jambai, Mohamed A. M. Kamara, Daniel Kaitibi, Daphne B. Moffett, Tushar Singh, John T. Redd

    Published 2024-11-01
    “…ObjectivesWorld Health Organization issued Joint Statement on Data Protection and Privacy in the COVID-19 Response stating that collection of vast amounts of personal data may potentially lead to the infringement of fundamental human rights and freedoms. …”
    Get full text
    Article
  20. 840

    Patient and clinician experiences with the implementation of telemedicine and related adaptations in office-based buprenorphine treatment during the COVID-19 pandemic: a qualitativ... by Melissa Davoust, Angela R. Bazzi, Samantha Blakemore, Juliana Blodgett, Anna Cheng, Sarah Fielman, Kara M. Magane, Jacqueline Theisen, Richard Saitz, Alicia S. Ventura, Zoe M. Weinstein

    Published 2025-03-01
    “…We coded all interview data and used a thematic analysis approach to understand how telemedicine impacted treatment quality and engagement in care, as well as preferences for using telemedicine moving forward. …”
    Get full text
    Article