Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 1,141 - 1,160 results of 2,784 for search '(((( useddds OR usedddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.24s Refine Results
  1. 1141

    Understanding user acceptance of mobility-as-a-service in Jakarta Metropolitan Area (JMA): Influencing factors and behavioural insights by Yos Sunitiyoso, Prawira Fajarindra Belgiawan, Muhamad Rizki, Valid Hasyimi

    Published 2025-07-01
    “…Driven by theoretical constructs of the technology acceptance model, a set of motivational factors and choice scenarios, a behavioural model is conceptualised to explore individuals’ willingness to adopt MaaS in the JMA. Using data from 1,005 respondents collected in a survey, structural equation modelling (SEM), cluster analysis and choice modelling were conducted. …”
    Get full text
    Article
  2. 1142

    FFM: Flood Forecasting Model Using Federated Learning by Muhammad Shoaib Farooq, Rabia Tehseen, Junaid Nasir Qureshi, Uzma Omer, Rimsha Yaqoob, Hafiz Abdullah Tanweer, Zabihullah Atal

    Published 2023-01-01
    “…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
    Get full text
    Article
  3. 1143
  4. 1144

    Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project by Marieke Bak, Laura Hartman, Charlotte Graafland, Ida J Korfage, Alena Buyx, Maartje Schermer

    Published 2025-04-01
    “…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
    Get full text
    Article
  5. 1145

    The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era by Johannes Schrank, Johannes Schrank

    Published 2025-08-01
    “…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
    Get full text
    Article
  6. 1146

    PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING by Tiara Putri, Rahmah Fithriani

    Published 2025-07-01
    “…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
    Get full text
    Article
  7. 1147

    Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review by John Gabriel O. Marko, Ciprian Daniel Neagu, P. B. Anand

    Published 2025-02-01
    “…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
    Get full text
    Article
  8. 1148

    Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia by Sarin Sok, Kimkong Heng, Mengkorn Pum

    Published 2025-07-01
    “…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
    Get full text
    Article
  9. 1149

    Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers by Hong Zhu

    Published 2025-05-01
    “…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
    Get full text
    Article
  10. 1150
  11. 1151
  12. 1152

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  13. 1153

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  14. 1154

    AI, machine learning and deep learning in cyber risk management by Ishrag Hamid, M. M. Hafizur Rahman

    Published 2025-05-01
    “…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
    Get full text
    Article
  15. 1155

    FedCVG: a two-stage robust federated learning optimization algorithm by Runze Zhang, Yang Zhang, Yating Zhao, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
    Get full text
    Article
  16. 1156
  17. 1157

    Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information. by Ariann Nassel, Marta G Wilson-Barthes, Chanelle J Howe, Sonia Napravnik, Michael J Mugavero, Deana Agil, Akilah J Dulin

    Published 2022-01-01
    “…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
    Get full text
    Article
  18. 1158

    Federated knee injury diagnosis using few shot learning by Chirag Goel, Anita X, Jani Anbarasi L

    Published 2025-07-01
    “…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
    Get full text
    Article
  19. 1159

    Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice by Zahra Sadeqi-Arani, Esmaeil Mazroui Nasrabadi

    Published 2024-11-01
    “…These include concerns about privacy, data security, transparency, behavioral manipulation, equity in access, and the psychological and social consequences of continuous monitoring. …”
    Get full text
    Article
  20. 1160

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
    Get full text
    Article