Results 241 to 250 of about 2,873,813 (294)
Some of the next articles are maybe not open access.
Social Science Research Network, 2023
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of
Glorin Sebastian
semanticscholar +1 more source
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of
Glorin Sebastian
semanticscholar +1 more source
SSRN Electronic Journal, 2021
Abstract Against the background of the centrality of data for contemporary economies, the chapter contributes to a better understanding and contextualization of data protection and its interfaces with global trade law. It looks at existing international, transnational, and selected national frameworks for privacy protection and briefly ...
openaire +2 more sources
Abstract Against the background of the centrality of data for contemporary economies, the chapter contributes to a better understanding and contextualization of data protection and its interfaces with global trade law. It looks at existing international, transnational, and selected national frameworks for privacy protection and briefly ...
openaire +2 more sources
Information systems research, 2021
Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off.
Bailing Liu, P. Pavlou, Xiufeng Cheng
semanticscholar +1 more source
Companies face a trade-off between creating stronger privacy protection policies for consumers and employing more sophisticated data collection methods. Justice-driven privacy protection outlines a method to manage this trade-off.
Bailing Liu, P. Pavlou, Xiufeng Cheng
semanticscholar +1 more source
Nature Reviews Genetics, 2001
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to ...
Patricia A. Roche, George J. Annas
openaire +3 more sources
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to ...
Patricia A. Roche, George J. Annas
openaire +3 more sources
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT
IEEE Transactions on Industrial Informatics, 2020With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm of the industrial Internet of Things, has provided a promising opportunity to construct powerful industrial systems and
Jinbo Xiong+6 more
semanticscholar +1 more source
LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection
International Conference Geographic Information Science, 2020The prevalence of location-based services contributes to the explosive growth of individual-level trajectory data and raises public concerns about privacy issues.
Jinmeng Rao+3 more
semanticscholar +1 more source
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET
IEEE Transactions on Vehicular Technology, 2020While enjoying the convenience brought by Location Based Service (LBS), the location privacy of vehicles in VANET may be disclosed. Distributed k-anonymity, as one of the most popular privacy protection methods, fails to take the trustworthiness of ...
Bin Luo+4 more
semanticscholar +1 more source
Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing
IEEE Transactions on Cloud Computing, 2020With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care.
Min Chen+5 more
semanticscholar +1 more source
Privacy, Patience, and Protection
SSRN Electronic Journal, 2019We analyze repeated games in which players have private information about their levels of patience and in which they would like to maintain the privacy of this information vis-a-vis third parties. We show that privacy protection in the form of shielding players’ actions from outside observers is harmful, as it limits and sometimes eliminates the ...
Ronen Gradwohl, Rann Smorodinsky
openaire +3 more sources
BFOD: Blockchain-Based Privacy Protection and Security Sharing Scheme of Flight Operation Data
IEEE Internet of Things JournalWith the rapid growth of flight operation data, how to alleviate the contradiction between data sharing and privacy protection of civil aviation corporations has become a challenging problem.
Xinyan Li, Huimin Zhao, Wu Deng
semanticscholar +1 more source