Results 81 to 90 of about 28,164 (210)
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke +4 more
doaj +1 more source
Digital curation and the cloud [PDF]
Digital curation involves a wide range of activities, many of which could benefit from cloud deployment to a greater or lesser extent. These range from infrequent, resource-intensive tasks which benefit from the ability to rapidly provision resources
Aitken, B. +3 more
core
Situating African FinTech in Global Financial Networks
Short Abstract This paper explores the geographical patterns of firm creation and investments in African FinTech and how they have evolved since the emergence of FinTech on the continent. Our findings show waves of investment, specialisation of different FinTech centres and the networks of FinTech capital.
Julien Migozzi, Dariusz Wójcik
wiley +1 more source
Pharmacometrics (PMX) in Africa has transitioned from foundational capacity‐building to job creation, scientific leadership, regulatory influence, and health innovation. To accelerate this progress, the 2025 Pharmacometrics Africa Conference (PMXAC‐2025) convened key stakeholders to consolidate the continental PMX community, review progress in local ...
Babatunde Ayodeji Adeagbo +12 more
wiley +1 more source
Where Tech Meets the SDGs: A Supply‐Chain Process Map for Sustainability Management
ABSTRACT This study investigates how advanced technologies support Sustainable Development Goals (SDGs) within supply chain management (SCM) through a structured analysis of 4448 sustainable practices. By integrating perspectives from sustainability‐oriented innovation (SOI) and contingent dynamic capabilities, the research conceptualizes technology ...
Vincenzo Varriale +2 more
wiley +1 more source
Secure three-party clustering with identifying malicious behavior
Clustering algorithms are pivotal tools in data science and machine learning, offering a diverse array of applications ranging from customer segmentation to anomaly detection. With the development of cloud computing and outsourced computing, the adoption
Qingcai Luo +3 more
doaj +1 more source
CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems
The training techniques of the distributed machine learning approach replace the traditional methods with a cloud computing infrastructure and provide flexible computing services to clients.
Ferhat Özgür Çatak +1 more
doaj +1 more source
Practical and Secure Outsourcing of Matrix Computations to the Cloud
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing of sensitive computations should be assured in terms of input privacy and cheating detection. Existing approaches use either expensive
Nassar, Mohamed +2 more
openaire +2 more sources
Implementing AI in Radiotherapy: Insights From the Healthcare Professions
ABSTRACT The potential for artificial intelligence (AI) to transform healthcare has been of growing academic, policy and professional interest. Various studies have reported on the perceptions of the potential for AI in healthcare. However, fewer studies have examined the lived experiences that healthcare professionals (HCPs) have with the use of AI ...
Juan I. Baeza +3 more
wiley +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source

