Results 11 to 20 of about 2,873,813 (294)
IntroductionIn recent years, there have been numerous online privacy violation incidents caused by the leakage of personal information of social media users, yet there seems to be a tendency for users to burn out when it comes to privacy protection ...
Subai Chen+3 more
doaj +1 more source
Ethics of Artificial Intelligence in Education: Student Privacy and Data Protection
Rapid advances in artificial intelligence (AI) technology are profoundly altering human societies and lifestyles. Individuals face a variety of information security threats while enjoying the conveniences and customized services made possible by AI.
Lan Huang
semanticscholar +1 more source
Survey on blockchain privacy protection techniques in cryptography
In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy ...
Feng LIU, Jie YANG, Jiayin QI
doaj +3 more sources
Review on Video Privacy Protection [PDF]
With the rapid development of video processing technology and the continuous reduction of hardware costs,surveillance equipment has become more and more widely used.The leakage of privacy issues brought about by the popularity of video surveillance has ...
JIN Hua, ZHU Jing-yu, WANG Chang-da
doaj +1 more source
Advanced artificial intelligence (AI) technologies are now widely employed in China’s medical and healthcare fields. Enormous amounts of personal data are collected from various sources and inserted into AI algorithms for medical purposes, producing ...
Chao Wang+3 more
semanticscholar +1 more source
Privacy literacy is recognized as a crucial skill for safeguarding personal privacy online. However, self-assessed privacy literacy often diverges from actual literacy, revealing the presence of cognitive biases. The protection motivation theory (PMT) is
Shuai Ma, Chen Chen
doaj +1 more source
Review of semantic-based privacy-preserving approaches in LBS
The development of location-based services (LBS) caused serious privacy concerns.Semantic-based pri-vacy-preserving approaches is an important part of privacy protection in LBS.The recent work on location privacy protection based on semantics were ...
Ming-jie MA,Feng-hua LI+2 more
doaj +3 more sources
DPLQ: Location‐based service privacy protection scheme based on differential privacy
The existing privacy protection schemes for Location‐Based Service (LBS) only protect users' location privacy or query privacy, which can not adopt both of the privacy protections simultaneously in the LBS system. Moreover, these schemes cannot take into
Qingyun Zhang+3 more
doaj +1 more source
A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcing
With the rise of the Internet of Things (IoT) and fifth‐generation (5G) networks, which have led to a surge in data processing and increased data transfer time, traditional cloud computing could no longer meet the needs of workers, so edge computing has ...
Zice Sun+5 more
semanticscholar +1 more source
Privacy protection methods of location services in big data
The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure.
Liu Wenfeng, Wu Juanjuan, Xi Zhong
doaj +1 more source