Search alternatives:
useds » uses (Expand Search)
Showing 81 - 100 results of 2,784 for search '((( use OR used) privacy data\ ) OR ((( use OR used)ds OR useds) privacy data\ ))*', query time: 0.42s Refine Results
  1. 81

    Automated Redaction of Personally Identifiable Information on Drug Labels Using Optical Character Recognition and Large Language Models for Compliance with Thailand’s Personal Data... by Parinya Thetbanthad, Benjaporn Sathanarugsawait, Prasong Praneetpolgrang

    Published 2025-04-01
    “…The rapid proliferation of artificial intelligence (AI) across various industries presents both opportunities and challenges, particularly concerning personal data privacy. With the enforcement of regulations like Thailand’s Personal Data Protection Act (PDPA), organizations face increasing pressure to protect sensitive information found in diverse data sources, including product and shipping labels. …”
    Get full text
    Article
  2. 82

    A Systematic Review on the Use of Big Data in Tourism by Jafar Ahangaran, Abbas Sadeghnia

    Published 2024-09-01
    “…Limitations: Although the use of big data in academic research has made significant progress, there are still challenges regarding data quality, data cost, and user privacy concerns. …”
    Get full text
    Article
  3. 83

    A decentralized privacy-preserving framework for diabetic retinopathy detection using federated learning and blockchain by Omar Dib

    Published 2025-06-01
    “…Diabetic Retinopathy (DR) detection in distributed telemedicine environments requires secure, scalable, and privacy-preserving solutions. Traditional federated learning (FL) relies on a central server, raising concerns about data privacy and system trust. …”
    Get full text
    Article
  4. 84

    Privacy-preserving detection and classification of diabetic retinopathy using federated learning with FedDEO optimization by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…FL enables collaborative learning across multiple decentralized devices while maintaining data privacy. FedDEO optimization enhances the model's performance by fine-tuning hyperparameters in a distributed manner. …”
    Get full text
    Article
  5. 85

    An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining by Waruni Hewage, R. Sinha, M. Asif Naeem

    Published 2025-06-01
    “…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
    Get full text
    Article
  6. 86

    Data Privacy Protection in Islamic Communication Perspective by Musfiah Saidah, Hilya Maylaffayza

    Published 2024-02-01
    “…Technology in the era of society 5.0 was rising to facilitate human work, but it is used to misuse big data from the individual level. …”
    Get full text
    Article
  7. 87

    Data Anonymization and Privacy Preservation in Healthcare Systems by Datta Krishnasheesh, Gupta Himanshu

    Published 2025-01-01
    “…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
    Get full text
    Article
  8. 88

    Privacy-Preserving Data Sharing in Telehealth Services by Ammar Odeh, Eman Abdelfattah, Walid Salameh

    Published 2024-11-01
    “…The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. …”
    Get full text
    Article
  9. 89

    Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis by Austin Shouli, Ankur Barthwal, Molly Campbell, Ajay Kumar Shrestha

    Published 2025-01-01
    “…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
    Get full text
    Article
  10. 90

    On the research for big data uses for public good purposes by Adeline Decuyper

    Published 2016-12-01
    “…Finally, aside from the opportunities, the mass production and use of data has also brought many challenges, such as evaluating the representativity of the data or handling threats to the privacy of users, that we will discuss in the last section of this article.…”
    Get full text
    Article
  11. 91

    Blockchain-enabled data governance for privacy-preserved sharing of confidential data by Jingchi Zhang, Anwitaman Datta

    Published 2024-12-01
    “…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
    Get full text
    Article
  12. 92

    Combining observational and experimental data for causal inference considering data privacy by Mann Charlotte Z., Sales Adam C., Gagnon-Bartsch Johann A.

    Published 2025-03-01
    “…However, many observational datasets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. …”
    Get full text
    Article
  13. 93

    Sentimental analysis based federated learning privacy detection in fake web recommendations using blockchain model by Jitendra Kumar Samriya, Amit Kumar, Ashok Bhansali, Meena Malik, Varsha Arya, Wadee Alhalabi, Bassma Saleh Alsulami, Brij B. Gupta

    Published 2025-04-01
    “…This work offers an experimental analysis of diverse sentiment data-driven fake recommendation datasets, evaluating performance using accuracy, precision, recall, and F-measure metrics. …”
    Get full text
    Article
  14. 94

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
    Get full text
    Article
  15. 95

    Cross-Company Data Sharing Using Distributed Analytics by Soo-Yon Kim, Stefanie Berninger, Max Kocher, Martin Perau, Sandra Geisler

    Published 2025-05-01
    “…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
    Get full text
    Article
  16. 96

    Identification of hazardous road locations using ambulance data by Anne Vingaard Olesen, Tim Alex Lindskou, Rasmus Øhlenschlæger, Torben Anders Kløjgaard, Anders Brogaard Tallaksen, Jens Lauritsen, Erika Frischknecht Christensen, Harry Lahrmann

    Published 2025-03-01
    “…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
    Get full text
    Article
  17. 97

    A Proposed Vision for Using Artificial Intelligence in Enhancing Strategic Value of Human Resources by Nadera Hourani

    Published 2025-06-01
    “…Yet, there are significant challenges in the form of algorithmic bias, data privacy concerns, and organizational readiness. …”
    Get full text
    Article
  18. 98
  19. 99

    Privacy protection method on time-series data publication by Dong YU, Hai-yan KANG

    Published 2015-11-01
    “…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
    Get full text
    Article
  20. 100

    Privacy guarantees for personal mobility data in humanitarian response by Nitin Kohli, Emily Aiken, Joshua E. Blumenstock

    Published 2024-11-01
    “…Specifically, we (1) introduce an algorithm for constructing differentially private mobility matrices and derive privacy and accuracy bounds on this algorithm; (2) use real-world data from mobile phone operators in Afghanistan and Rwanda to show how this algorithm can enable the use of private mobility data in two high-stakes policy decisions: pandemic response and the distribution of humanitarian aid; and (3) discuss practical decisions that need to be made when implementing this approach, such as how to optimally balance privacy and accuracy. …”
    Get full text
    Article