Results 1 to 10 of about 2,428,237 (192)
Big Data Warehouse for Healthcare-Sensitive Data Applications [PDF]
Obesity is a major public health problem worldwide, and the prevalence of childhood obesity is of particular concern. Effective interventions for preventing and treating childhood obesity aim to change behaviour and exposure at the individual, community,
Arsalan Shahid +2 more
doaj +5 more sources
FanFAIR: sensitive data sets semi-automatic fairness assessment [PDF]
Background Research has shown how data sets convey social bias in Artificial Intelligence systems, especially those based on machine learning. A biased data set is not representative of reality and might contribute to perpetuate societal biases within ...
Chiara Gallese +4 more
doaj +2 more sources
Protecting and Securing Sensitive Data in a Big Data Using Encryption [PDF]
The Transaction data which contains a sensitive data, a program like a android app or a browser, does not adequatelyprotect information such as unique values or related payment information, more or likely a privacy concern.
Praveen Banasode, Sunita Padmannavar
doaj +1 more source
Introduction Clinical practice guidelines (CPGs) are a powerful instrument to ensure evidence-based practice in clinical diagnostics and disease management.
Sabine Oertelt-Prigione +3 more
doaj +1 more source
MANAGING SENSITIVE DATA IN CLOUD COMPUTING FOR EFFECTIVE INFORMATION SYSTEMS’ DECISIONS [PDF]
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed, a structured interview with experts working on cloud computing and a pilot study conduct to ...
Haifaa Jassim Muhasin, +3 more
doaj +1 more source
Automatic Detection of Sensitive Data Using Transformer- Based Classifiers
The General Data Protection Regulation (GDPR) has allowed EU citizens and residents to have more control over their personal data, simplifying the regulatory environment affecting international business and unifying and homogenising privacy legislation ...
Michael Petrolini +2 more
doaj +1 more source
Implementing GDPR-Compliant Surveys Using Blockchain
The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases.
Ricardo Martins Gonçalves +2 more
doaj +1 more source
A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year.
Zoltán Szabó, Vilmos Bilicki
doaj +1 more source
Blockchain Technology in the Educational Environment [PDF]
Blockchain popularity is growing every day and its potential is seen in various domains. One field of application is the educational system, where the blockchain technology could be used in several areas like admission, student records, exams and ...
Alin ZAMFIROIU, Paul POCATILU
doaj +1 more source
Protecting Sensitive Data Early in the Research Data Lifecycle
How do researchers in fieldwork-intensive disciplines protect sensitive data in the field, how do they assess their own practices, and how do they arrive at them? This article reports the results of a qualitative study with 36 semi-structured interviews
Sebastian Karcher, Sefa Secen, Nic Weber
doaj +1 more source

