Suggested Topics within your search.
Suggested Topics within your search.
-
2061
Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences
Published 2025-03-01“…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
Get full text
Article -
2062
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
Published 2019-10-01“…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
Get full text
Article -
2063
Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment
Published 2025-09-01“…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
Get full text
Article -
2064
Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs)
Published 2024-09-01“…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
Get full text
Article -
2065
Encrypted traffic identification scheme based on sliding window and randomness features
Published 2024-08-01“…This trend has driven the proportion of encrypted traffic on the Internet to rise continuously. However, data encryption, while ensuring privacy and security, has also become a means for illegal content to evade network supervision. …”
Get full text
Article -
2066
Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study
Published 2025-04-01“…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
Get full text
Article -
2067
GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT
Published 2023-12-01“…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
Get full text
Article -
2068
ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS
Published 2024-06-01“…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
Get full text
Article -
2069
Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors
Published 2025-04-01“…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
Get full text
Article -
2070
Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module
Published 2025-01-01“…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
Get full text
Article -
2071
Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution
Published 2025-01-01“…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
Get full text
Article -
2072
Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection
Published 2025-01-01“…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
Get full text
Article -
2073
The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers
Published 2022-06-01“… Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by GPS systems. The GPS data is usually manipulated using spoofing attacks. …”
Get full text
Article -
2074
-
2075
The IoT and AI in Agriculture: The Time Is Now—A Systematic Review of Smart Sensing Technologies
Published 2025-06-01“…However, this review also identifies critical challenges, including high infrastructure costs, limited interoperability, connectivity constraints in rural areas, and ethical concerns regarding transparency and data privacy. To address these barriers, recent innovations have emphasized the potential of Edge AI for local inference, blockchain systems for decentralized data governance, and autonomous platforms for field-level automation. …”
Get full text
Article -
2076
Blockchain in maritime: applications, effects and challenges
Published 2025-07-01“…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
Get full text
Article -
2077
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
Published 2024-09-01“…The solution leverages Merkle trees for secure data management, with each policy represented by an independent Merkle tree, enabling updates and additions without altering existing policies. …”
Get full text
Article -
2078
Criminal Law Challenged by Crossing into Virtual Reality
Published 2025-03-01“…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
Get full text
Article -
2079
Teledentistry-Dental students' preparedness and patients' experiences.
Published 2025-01-01“…Descriptive statistics were used to summarise the data.<h4>Results</h4>Out of 125 students, 88% (N = 110) were contacted by 318 patients. …”
Get full text
Article -
2080
Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting
Published 2025-01-01“…This research applies a systematic methodology for assessing such software, considering usability, adaptability, cost-effectiveness, and data privacy compliance, specifically tailored to automotive reporting and gives recommendation for software tools.…”
Get full text
Article