Showing 2,281 - 2,300 results of 2,784 for search '((( use OR used) privacy data\ ) OR ((( use OR used)s OR usedds) privacy data\ ))*', query time: 0.29s Refine Results
  1. 2281

    A blockchain technology for improving financial flows in humanitarian supply chains: benefits and challenges by Saurav Negi

    Published 2025-04-01
    “…Key challenges identified include scalability issues, high cost and resource requirements, lack of network reliability, data privacy, supply chain integration, knowledge and training gaps, regulatory frameworks and ethical considerations. …”
    Get full text
    Article
  2. 2282

    Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach by Dan Ben Ami, Kobi Cohen, Qing Zhao

    Published 2025-01-01
    “…Federated learning (FL) is an emerging machine learning (ML) paradigm used to train models across multiple nodes (i.e., clients) holding local data sets, without explicitly exchanging the data. …”
    Get full text
    Article
  3. 2283

    Personal, environmental and behavioral predictors associated with online fraud victimization among adults. by Vimala Balakrishnan, Umayma Ahhmed, Faris Basheer

    Published 2025-01-01
    “…A self-reporting questionnaire was developed based on the PEB framework and used to collect data targeting Malaysian adults. …”
    Get full text
    Article
  4. 2284

    Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza, Zoia Khan

    Published 2024-09-01
    “…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
    Get full text
    Article
  5. 2285

    CAFiKS: Communication-Aware Federated IDS With Knowledge Sharing for Secure IoT Connectivity by Ogobuchi Daniel Okey, Demostenes Zegarra Rodriguez, Frederico Gadelha Guimaraes, Joao Henrique Kleinschmidt

    Published 2025-01-01
    “…Federated learning has recently gained significant attention as a method for building machine learning models due to its ability to preserve data privacy while delivering improved performance. …”
    Get full text
    Article
  6. 2286
  7. 2287

    Analyzing Visitor Behavior to Enhance Personalized Experiences in Smart Museums: A Systematic Literature Review by Rosen Ivanov, Victoria Velkova

    Published 2025-05-01
    “…Behavioral Analytics Platforms and Mobile/Wearable Devices are the most used technologies (42.4%) for delivering personalized content. …”
    Get full text
    Article
  8. 2288

    AI in Medical Questionnaires: Innovations, Diagnosis, and Implications by Xuexing Luo, Yiyuan Li, Jing Xu, Zhong Zheng, Fangtian Ying, Guanghui Huang

    Published 2025-06-01
    “…Future research should pay more attention to model interpretability, system compatibility, validation standardization, and ethical governance to effectively address key challenges such as data privacy, clinical integration, and transparency.…”
    Get full text
    Article
  9. 2289

    Toward Secure and Transparent Global Authentication: A Blockchain-Based System Integrating Biometrics and Subscriber Identification Module by Navid Khalili, Dimitrios Makrakis, Yaser Baseri, Abdelhakim Senhaji Hafid

    Published 2025-01-01
    “…This approach safeguards user privacy and data security. By employing blockchain technology, B2-GAS eliminates SPOFs, ensures tamper-proof transaction storage, and guarantees transparency. …”
    Get full text
    Article
  10. 2290

    Revolutionizing Imaging Design Content With AIGC: User-Centered Challenges, Opportunities, and Workflow Evolution by Zijian Zhu, Tao Yu, Yijing Wang, Junping Xu

    Published 2025-01-01
    “…Technological maturity and public acceptance serve as key adoption drivers, while social construction and innovation underscore AI’s capacity to foster creativity and design diversity. Ethics and privacy reflect user concerns over data security, whereas learning costs negatively affect adoption due to perceived complexity. …”
    Get full text
    Article
  11. 2291

    Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection by Samuel Diop, Francois Jouen, Jean Bergounioux, Imen Trabelsi

    Published 2025-01-01
    “…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
    Get full text
    Article
  12. 2292

    HELA-CMM: capability maturity model for adoption of learning analytics in higher education by Diana Šimić, Nina Begičević Ređep, Sabina Rako, Nikola Kadoić, Wim Van Petegem, Bart Rienties, Nati Cabrera Lanzo, Michael Eichhorn, Lourdes Guàrdia, Sandra Kučina Softić, Alexander Tillmann

    Published 2025-04-01
    “…The proposed maturity model comprises 28 capabilities grouped into eight categories: (1) Teaching / Learning / Assessment, (2) Data Management and Analytics, (3) Ethics, Privacy, Legal Issues, (4) People Competences, (5) Management / Leadership, (6) Culture, (7) Infrastructure, and (8) Quality Assurance. …”
    Get full text
    Article
  13. 2293

    A Deep Learning-Based Ensemble Framework for Robust Android Malware Detection by Sainag Nethala, Pronoy Chopra, Khaja Kamaluddin, Shahid Alam, Soltan Alharbi, Mohammad Alsaffar

    Published 2025-01-01
    “…The exponential growth of Android applications has resulted in a surge of malware threats, posing severe risks to user privacy and data security. To address these challenges, this study introduces a novel malware detection approach utilizing an ensemble of Convolutional Neural Networks (CNNs) for enhanced classification accuracy. …”
    Get full text
    Article
  14. 2294

    Blockchain in maritime: applications, effects and challenges by Zhao Li, Zhao Li, Yongqiang Sun

    Published 2025-07-01
    “…To prevent issues such as information concealment and privacy breaches, these stakeholders often establish complex and multi-layered data exchange processes, which significantly reduce the operational efficiency of the shipping market. …”
    Get full text
    Article
  15. 2295

    Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies by Abraham Romero, Roberto Hernandez

    Published 2024-09-01
    “…The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. …”
    Get full text
    Article
  16. 2296

    New secure distributed secret sharing scheme of n product by Zhen-hua CHEN, Shun-dong LI, Bao-cang WANG, Ji-liang LI, Xin LIU

    Published 2014-11-01
    “…Since Shamir’s secret sharing scheme does not have the property of the multiplicative homomorphism,an encoding method is utilized for privacy-preserving data to overcome the drawbacks in secure distributed multiplication calculation when using traditional Shamir’s polynomial to share the product of n secrets.Using this encoding method with multiplicative homomorphism and a commitment scheme supporting additive homomorphism,a new secure distributed secret sharing scheme of n product in one session is implemented and the proposed scheme is secure under the presence of malicious participants.The analysis shows that proposed scheme is not only more simple and feasible but also more efficient than previous schemes.…”
    Get full text
    Article
  17. 2297

    Prenatal screening educational interventions for U.S. pregnant women: a scoping review by Yasmine Zerrouki, Sara Burgoa, Goodness Okwaraji, Jennifer Mendonca, Vama Jhumkhawala, Sophie Kelly, Esin Bulut, Shaima Arshad, Elisheva Knopf, Tiffany Follin, Panagiota Kitsantas, Maria C. Mejia, Lea Sacca

    Published 2025-05-01
    “…The five steps according to Arksey and O’Malley York and for the Joanna Briggs Institute (JBI) recommendations for data extraction, analysis, and presentation of results were also used in this review. …”
    Get full text
    Article
  18. 2298

    Barriers and facilitators of the electronic medical record adoption among healthcare providers in Addis Ababa, Ethiopia by Tadesse Alemu Bekele, Lemma Derseh Gezie, Herman Willems, Jonathan Metzger, Biruhtesfa Abere, Blen Seyoum, Loko Abraham, Naod Wendrad, Selamawit Meressa, Bethel Desta, Tariku Nigatu Bogale

    Published 2024-12-01
    “…Methods A descriptive-phenomenological approach was used. Data were collected from one hospital and three health centers from 5–13 June, 2023, that implemented the EMR. …”
    Get full text
    Article
  19. 2299

    Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning by Emad-Ul-Haq Qazi, Tanveer Zia, Muhammad Hamza Faheem, Khurram Shahzad, Muhammad Imran, Zeeshan Ahmed

    Published 2024-01-01
    “…The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. …”
    Get full text
    Article
  20. 2300

    Artificial Intelligence in Knowledge Management: Overview and Selection of Software for Automotive Reporting by Bernhard Axmann, Sanket Pujar

    Published 2025-01-01
    “…Artificial Intelligence tools, using natural language processing and machine learning, streamline data extraction. - Despite their benefits, organizations face challenges in selecting the right Artificial Intelligence-driven Knowledge Management software due to a lack of standardized evaluation frameworks. …”
    Get full text
    Article