Suggested Topics within your search.
Suggested Topics within your search.
-
2101
A Qualitative Study of HIV Testing Experiences and HIV Self-Testing Perspectives among Men in Northern Nigeria
Published 2024-01-01“…Thematic analysis was employed to analyze the data, yielding key themes related to prior test experiences, knowledge of self-testing, and perceived ease of use, in addition to motivation for self-testing and concerns about reliability and counseling support. …”
Get full text
Article -
2102
Considerations of Cloud Computing Contracts at the Conclusion Stage
Published 2025-03-01“…On the other hand, studies show that data security and privacy are among the most important challenges of cloud computing contracts. …”
Get full text
Article -
2103
Occupational therapy in the space of artificial intelligence: Ethical considerations and human-centered efforts
Published 2024-12-01“…One way to support future AI technology aligned with OT ethical principles may be through human-centered AI (HCAI), an emerging branch within AI research and developments with a notable overlap of OT values and beliefs.Objective To explore the risks and challenges of AI technology, and how the combined expertise, skills, and knowledge of OT and HCAI can contribute to harnessing its potential and shaping its future, from the perspective of OT’s ethical values and beliefs.Results Opportunities for OT and HCAI collaboration related to future AI technology include ensuring a focus on 1) occupational performance and participation, while taking client-centeredness into account; 2) occupational justice and respect for diversity, and 3) transparency and respect for the privacy of occupational performance and participation data.Conclusion and Significance There is need for OTs to engage and ensure that AI is applied in a way that serves OT and OT clients in a meaningful and ethical way through the use of HCAI.…”
Get full text
Article -
2104
AI-driven assistive technologies in inclusive education: benefits, challenges, and policy recommendations
Published 2025-12-01“…Additionally, the paper highlights limitations related to accuracy, infrastructure needs, educator readiness, and ethical concerns such as data privacy and algorithmic bias.To address these challenges, the study proposes policy recommendations and practical strategies for equitable and responsible AI adoption in education, including targeted educator training, funding for inclusive infrastructure, and development of ethical and technical standards. …”
Get full text
Article -
2105
Exploring the effects of artificial intelligence on student and academic well-being in higher education: a mini-review
Published 2025-02-01“…Furthermore, issues such as data privacy and job displacement emerge as AI technologies permeate educational environments. …”
Get full text
Article -
2106
Enhancing Public Service Delivery Efficiency through AI: Current Initiatives and Future Prospects in Bangladesh
Published 2024-12-01“…Some major challenges are infrastructure deficits, data privacy breaches, lack of digital literacy, and unpreparedness of the workforce. …”
Get full text
Article -
2107
Leveraging Agent-Based Modeling and IoT for Enhanced E-Commerce Strategies
Published 2024-10-01“…The effectiveness of this model is validated through simulations and case studies, demonstrating its capacity to handle large data volumes, ensure security and privacy, and maintain seamless interoperability among a variety of IoT devices and e-commerce platforms. …”
Get full text
Article -
2108
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01“…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
Get full text
Article -
2109
Potential benefits and challenges of artificial intelligence in human resource management in public institutions
Published 2025-05-01“…The findings on the perceived benefits of AI in HRM show that increased efficiency, better decision-making, and cost reduction are the top advantages, while ease of use ranks the lowest. However, challenges such as lack of expertise, data privacy concerns, high costs, and resistance to change remain significant barriers. …”
Get full text
Article -
2110
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…Eitemen and Money Laundering Concept itself. This paper uses an explanative qualitative method, and a literature study to obtain the data to strengthen this paper. …”
Get full text
Article -
2111
Patient Satisfaction Regarding Quality Nursing Care
Published 2024-01-01“…Overall the data showed that patientrsquos expectations in some aspects were not sufficiently matched. …”
Get full text
Article -
2112
Verifiable Key-Aggregate Searchable Encryption Scheme for Fog-Based Internet of Autonomous Vehicles
Published 2025-03-01“…The fog-based Internet of Autonomous Vehicles (FB-IAV) collects extensive sensing data to enhance its understanding of the environment. …”
Get full text
Article -
2113
AI in Structural Health Monitoring for Infrastructure Maintenance and Safety
Published 2024-12-01“…We examine seven core areas where AI significantly advances SHM capabilities: (1) data acquisition and sensor networks, highlighting improvements in sensor technology and data collection; (2) data processing and signal analysis, where AI techniques enhance feature extraction and noise reduction; (3) anomaly detection and damage identification using machine learning (ML) and deep learning (DL) for precise diagnostics; (4) predictive maintenance, using AI to optimize maintenance scheduling and prevent failures; (5) reliability and risk assessment, integrating diverse datasets for real-time risk analysis; (6) visual inspection and remote monitoring, showcasing the role of AI-powered drones and imaging systems; and (7) resilient and adaptive infrastructure, where AI enables systems to respond dynamically to changing conditions. …”
Get full text
Article -
2114
Current Implementation of Digital Health in Chronic Disease Management: Scoping Review
Published 2024-12-01“…We used established taxonomies to synthesize extracted data. …”
Get full text
Article -
2115
Feasibility and acceptability of a contextualized brief psychological intervention for people with bipolar disorder in rural Ethiopia
Published 2025-07-01“…We conducted a mixed-method evaluation, including in-depth qualitative interviews, fidelity ratings of a random selection of 25% of the audio recorded intervention sessions, and self-reported change in symptom severity. We used thematic analysis for qualitative data and descriptive analysis for quantitative data. …”
Get full text
Article -
2116
Perceptions, Attitudes, and Concerns on Artificial Intelligence Applications in Patients with Cancer
Published 2025-05-01“…The survey included three distinct sections: (1) Perceptions: Patients’ general views on AI’s impact in oncology; (2) Attitudes: Comfort level with AI performing medical tasks; (3) Concerns: Specific fears related to AI implementation (eg, diagnostic errors, data privacy, healthcare costs). Survey responses were summarized descriptively, and differences by age, gender, and education were analyzed using chi-square tests. …”
Get full text
Article -
2117
Potential and Legal Challenges of the Metaverse for Environmental Awareness and Sustainability in Nigeria: A Comparative Analysis with Singapore
Published 2024-04-01“…A total of 304 questionnaires were distributed to Nigerian respondents, and data were analyzed using descriptive and analytical methods. …”
Get full text
Article -
2118
AI Chatbots in Education: Challenges and Opportunities
Published 2025-03-01“…Educators can leverage such chatbots to create course content, generate assessments, evaluate student performance, and utilize them for data analysis and research. However, this technology presents significant challenges concerning data security and privacy. …”
Get full text
Article -
2119
Access to information in the context of virtual space in the legal system of Iran and United States
Published 2025-03-01“…Similarities: Monitoring: Both countries try to monitor and respond to suspicious and illegal activities in cyberspace. Protection of privacy: Both countries try to protect the privacy of users in cyberspace and prevent unauthorized intrusion and illegal access to private information. …”
Get full text
Article -
2120
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Published 2025-03-01“…This study aims to identify gaps and propose future research directions to develop robust authentication frameworks that protect user privacy and data integrity.…”
Get full text
Article