Results 21 to 30 of about 2,428,237 (192)

The Concept and Examples of Personal Data [PDF]

open access: yesحقوق فناوریهای نوین
In our time, the use of virtual space has become inevitable. Legislation and protection of users' rights is also a necessity of virtual life. In the meantime, the definition of personal data as a standard for data subject to data protection laws has a ...
Abbas Mirshekari   +2 more
doaj   +1 more source

Protection of Patient Data in Digital Oral and General Health Care: A Scoping Review with Respect to the Current Regulations

open access: yesOral, 2023
The use of digital health technologies, including telemedicine and teledentistry, has become a necessity in healthcare due to the SARS-CoV-19 pandemic. These technologies allow for the reduction of the workload of healthcare providers and the improvement
Olga Di Fede   +3 more
doaj   +1 more source

National Addiction and HIV Data Archive Program: Developing an Approach for Reuse of Sensitive and Confidential Data

open access: yesThe Journal of Privacy and Confidentiality, 2023
Sharing data produced through health research projects has been increasingly recognized as a way to advance science more rapidly by facilitating discovery and increasing rigor and reproducibility.
Kathy Etz, Heather Kimmel, Amy Pienta
doaj   +1 more source

Applying BERT for Early-Stage Recognition of Persistence in Chat-Based Social Engineering Attacks

open access: yesApplied Sciences, 2022
Chat-based social engineering (CSE) attacks are attracting increasing attention in the Small-Medium Enterprise (SME) environment, given the ease and potential impact of such an attack.
Nikolaos Tsinganos   +2 more
doaj   +1 more source

DataSHIELD – New Directions and Dimensions

open access: yesData Science Journal, 2017
In disciplines such as biomedicine and social sciences, sharing and combining sensitive individual-level data is often prohibited by ethical-legal or governance constraints and other barriers such as the control of intellectual property or the huge ...
Rebecca C. Wilson   +7 more
doaj   +1 more source

Is Your Model Sensitive? SPEDAC: A New Resource for the Automatic Classification of Sensitive Personal Data

open access: yesIEEE Access, 2023
In recent years, there has been an exponential growth of applications, including dialogue systems, that handle sensitive personal information. This has brought to light the extremely important issue of personal data protection in virtual environments ...
Gaia Gambarelli   +2 more
doaj   +1 more source

Wireless Volatile Organic Compound Detection for Restricted Internet of Things Environments Based on Cataluminescence Sensors

open access: yesChemosensors, 2022
Cataluminescence-based sensors do not require external light sources and complex circuitry, which enables them to avoid light scattering with high sensitivity, selectivity, and widely linear range.
Xinyi Shen   +3 more
doaj   +1 more source

Exploiting Data Sensitivity on Partitioned Data [PDF]

open access: yes, 2018
This chapter will appear in the book titled: From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th ...
Mehrotra, Sharad   +2 more
openaire   +2 more sources

Federated learning framework for mobile edge computing networks

open access: yesCAAI Transactions on Intelligence Technology, 2019
The continuous growth of smart devices needing processing has led to moving storage and computation from cloud to the network edges, giving rise to the edge computing paradigm.
Romano Fantacci, Benedetta Picano
doaj   +1 more source

An Empirical Study on Group Fairness Metrics of Judicial Data

open access: yesIEEE Access, 2021
Group fairness means that different groups have an equal probability of being predicted for one aspect. It is a significant fairness definition, which is conducive to maintaining social harmony and stability.
Yanjun Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy