World Journal of Advanced Research and Reviews,
Journal Year:
2023,
Volume and Issue:
20(3), P. 1503 - 1521
Published: Dec. 28, 2023
This
paper
presents
a
comprehensive
survey
of
the
challenges
faced
by
economic
empowerment
digital
platforms.
As
these
online
platforms
revolutionize
landscape,
they
encounter
various
hurdles
that
hinder
their
potential
for
fostering
financial
inclusion
and
empowerment.
Through
an
extensive
analysis
existing
literature
empirical
studies,
this
identifies
categorizes
key
The
reveals
regulatory
frameworks
pose
significant
obstacles
to
Issues
such
as
unclear
or
outdated
regulations,
varying
legal
requirements
across
jurisdictions,
need
compliance
with
consumer
protection
data
privacy
laws
platform
operations
expansion.
Moreover,
absence
standardized
regulations
often
leads
uncertainties
in
ensuring
fair
competition.
Furthermore,
highlights
persistent
challenge
trust
reputation
management
within
rely
heavily
on
user-generated
content
interactions,
establishing
among
users
becomes
critical.
fraudulent
activities,
identity
verification,
dispute
resolution
mechanisms
emerge
must
address
maintain
user
credibility.
also
addresses
technological
cybersecurity
threats,
breaches,
concerns
risks
both
operators
users.
Platforms
invest
robust
security
measures
adopt
innovative
technologies
mitigate
safeguard
information
transactions.
Additionally,
examines
related
accessibility.
Despite
empowerment,
certain
groups,
individuals
from
low-income
communities
those
lacking
literacy,
may
face
barriers
accessing
utilizing
Bridging
divide
equal
opportunities
all
participate
benefit
remains
ongoing
challenge.
Finally,
collaboration
cooperation
stakeholders.
Platform
operators,
policymakers,
bodies,
engage
constructive
dialogue
effectively.
Collaborative
efforts
can
lead
development
frameworks,
industry
standards,
best
practices
foster
conducive
environment
thrive.
World Journal of Advanced Engineering Technology and Sciences,
Journal Year:
2024,
Volume and Issue:
11(1), P. 294 - 300
Published: Feb. 20, 2024
In
the
contemporary
landscape
of
big
data
analytics,
privacy
concerns
loom
large,
exacerbated
by
escalating
surveillance
measures.
This
review
delves
into
advancements
privacy-enhancing
technologies
(PETs)
amidst
this
era
heightened
scrutiny.
The
explores
evolving
PETs,
highlighting
their
pivotal
role
in
safeguarding
individual
while
enabling
meaningful
analysis.
Firstly,
elucidates
environment,
characterized
ubiquitous
collection
practices
and
proliferation
sophisticated
monitoring
mechanisms.
Against
backdrop,
imperative
for
robust
solutions
becomes
evident.
Subsequently,
navigates
through
array
encompassing
differential
privacy,
homomorphic
encryption,
secure
multi-party
computation,
federated
learning,
among
others.
Each
technology
is
scrutinized
its
efficacy
mitigating
risks
without
compromising
analytical
utility.
Furthermore,
delineates
notable
applications
PETs
across
diverse
domains,
including
healthcare,
finance,
social
media.
Case
studies
exemplify
how
facilitate
sharing
collaborative
analysis
preserving
confidentiality
compliance
with
regulatory
frameworks.
Moreover,
examines
challenges
hindering
widespread
adoption
such
as
computational
overhead,
interoperability
issues,
ambiguities.
Strategies
overcoming
these
hurdles
are
elucidated,
algorithmic
efficiency,
standardization
efforts,
policy
advocacy.
underscores
reconciling
imperatives
analytics
protection
surveillance.
It
emphasizes
necessity
interdisciplinary
collaboration
researchers,
policymakers,
industry
stakeholders
to
foster
development
deployment
effective
PET
solutions,
thereby
ensuring
a
harmonious
balance
between
utility
rights
digital
age.
International Journal of Information Systems and Supply Chain Management,
Journal Year:
2024,
Volume and Issue:
17(1), P. 1 - 19
Published: March 6, 2024
With
the
rapid
development
of
science
and
technology
China's
economy,
internet,
big
data,
computers,
multimedia
are
widely
used
in
all
walks
life
to
promote
application
improvement
visual
communication
design
concepts,
gradual
implementation
technology,
continuous
innovation.
In
this
paper,
from
transmission
based
on
network
coding,
some
key
technologies
data
video
streams
studied
depth
and,
transmission-quality
assessment
model,
working
effect
jitter-buffering
algorithm
WebRTC
is
compared
different
environments.
The
experimental
results
show
that
proposed
paper
has
better
effect.
This
research
great
significance
for
realization
next-generation
networks.
The
value
of
healthcare
records
has
skyrocketed
due
to
the
emergence
many
new
diseases
and
ongoing
pandemic
situations.
With
these
spread
across
numerous
provider
entities
in
various
locations,
it
become
time-consuming
manage
them
physical
form.
Consequently,
there
is
a
growing
need
transition
electronic
(EHRs).
However,
current
approach
managing
EHRs
at
centralized
level
creates
single
point
failure
exposes
users
security
risks
which
include
amateur-level
attacks
data
breaches
orchestrated
by
adversaries.
Handling
health
from
Internet
Medical
Things(IoMT)
poses
significant
challenges
sensitive
information
involved,
makes
prime
target
for
attackers.
Furthermore,
modern
systems
complex
expensive,
demanding
highly
secure
storage
space.
recent
COVID-19
inflicted
unprecedented
costs
human
suffering
on
scale
never
seen
before
world.
As
long
as
continue
resurface,
we
must
strive
slow
down
pandemics
leveraging
empowered
IT
technologies.
Blockchain
technology
emerges
one
potential
solution
achieving
this
goal.
By
enhancing
record
management,
blockchain
can
address
problems.
Its
rising
popularity
sparked
extensive
research
into
different
transaction
schemes
that
specialize
privacy
preservation
fields.
public
nature
blockchain,
information,
introduces
risks.
Therefore,
crucial
construct
an
efficient
scheme
flexible
ensures
contents
reliable
auditability,
aspects
previous
works
have
failed
adequately
address.
We
propose
framework
broadcast
encryption
specific
instance
provide
conditional
access
control.
It
relies
dedicated
asymmetric-key-based
scheme,
stores
user
encrypted
credentials
Simultaneously,
stored
off-chain
source
applicable
data.
environment
facilitates
interactive
communication
between
providers,
providing
necessary
control
information.
Our
proposed
based
enabled
privacy-preserving
construction
utilizes
asymmetric-key
method.
implementing
approach,
aim
overcome
limitations
ensure
private
handling
transactions
within
ecosystem.
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT,
Journal Year:
2024,
Volume and Issue:
08(04), P. 1 - 5
Published: April 29, 2024
In
today's
data-driven
healthcare
landscape,
the
secure
sharing
of
sensitive
medical
information
is
essential
for
improving
patient
care,
facilitating
research,
and
advancing
outcomes.
However,
ensuring
integrity,
confidentiality,
privacy
data
poses
significant
challenges,
particularly
in
context
big
environments.
This
presents
a
comprehensive
framework
privacy-preserving
healthcare,
leveraging
combination
cryptographic
techniques,
encryption,
computation
protocols.
The
encompasses
various
mechanisms,
including
Differential
Privacy
with
Data
Perturbation,
Secure
Multi-Party
Computation
(SMPC),
Homomorphic
Encryption,
to
protect
from
unauthorized
access
disclosure.
By
implementing
state-of-the-art
aims
enable
among
multiple
parties
while
complying
regulatory
requirements
such
as
HIPAA
GDPR.
Additionally,
paper
discusses
project
scope,
which
includes
cryptography,
decryption,
privacy,
policies,
procedures,
security,
infrastructure.
proposed
provides
practical
solution
organizations
research
institutions
collaborate
on
initiatives
safeguarding
maintaining
trust.
Evaluation
framework's
effectiveness
performance
metrics
conducted
validate
its
feasibility
efficacy
real-world
settings.
Keywords:
Privacy-preserving
sharing,
Privacy,
(SMPC)
Journal of Evaluation in Clinical Practice,
Journal Year:
2024,
Volume and Issue:
30(8), P. 1684 - 1716
Published: July 11, 2024
Abstract
Background
Visitation
has
a
positive
effect
on
patients
and
families,
yet,
it
can
disrupt
intensive
care
unit
(ICU)
increase
the
risk
of
patient
infections,
which
previously
favoured
face‐to‐face
visits.
The
coronavirus
disease
2019
(COVID‐19)
pandemic
raised
importance
virtual
visits
led
to
their
widespread
adoption
globally,
there
are
still
many
implementation
barriers
that
need
be
improved.
Therefore,
this
review
aimed
explore
use
ICU
visit
technology
during
COVID‐19
facilitators
improve
in
ICUs.
Methods
Following
Preferred
Reporting
Items
for
Systematic
Reviews
Meta‐Analyses
guidelines,
six
databases
(CINAHL,
China
National
Knowledge
Infrastructure
[CNKI],
PubMed,
Cochrane,
VIP
Wang
Fang
databases)
were
searched
empirical
studies
published
between
1
January
2020
22
October
2023.
Studies
investigated
reported
implementing
ICUs
included.
Evidence
from
included
was
identified
thematically
analysed
using
Thomas
Harden's
three‐step
approach.
Study
quality
appraised
with
Mixed‐Methods
Appraisal
Tool.
Results
A
total
6770
references
screened,
35
met
inclusion
criteria
after
full‐text
review.
Eight
main
identified:
technical
difficulties;
insufficient
resources;
lack
physical
presence
nonverbal
information;
low
literacy;
differences
families'
perceptions
visual
cues;
privacy
ethics
issues;
inequitable
access
technology;
advance
preparation.
Four
facilitating
factors
providing
multidimensional
professional
support;
strengthening
coordination
services;
understanding
preferences
families;
enhancing
security
protection.
In
appraisal
studies,
12
rated
as
low,
five
medium
18
high
methodological
quality.
Conclusion
This
key
visits,
foster
development
infrastructure,
visiting
workflows,
policies
systems
services.
Further
necessary
identify
potential
solutions
barriers.
International Journal of Applied Information Systems,
Journal Year:
2023,
Volume and Issue:
12(42), P. 1 - 14
Published: Nov. 21, 2023
Deepfakes
are
synthetic
media
that
replace
someone's
action
(source
person)
with
another
(target
person).Images
deepfakes,
commonly
known
as
"visual
deepfakes,"
depict
a
complicated
and
contentious
high-tech
avant-garde
phenomenon
in
the
sphere
of
digital
trickery
artificial
intelligence.These
highly
deceitful
computer-based
distortions
static
images,
photographs,
where
appearance
single
individual
is
painstakingly
superimposed
onto
sophisticated
manner
seems
to
be
real.Image
easy
generate
due
access
opensource
deepfake
generation
software
applications
such
FakeApp.Once
it
generated,
social
becomes
its
marketplace
easily
distributed
engage
deceive
millions
users.Most
research
this
area
focuses
on
using
deep-learning
algorithm
small
dataset
development
deepfakes
detection
model.Therefore
work
focused
building
robust
efficient
image
model
publicly
available
from
Kaggle
comprising
one
hundred
forty
thousand
(140,000)
images.The
was
developed
Convolutional
Neural
Networks
(CNN),
Support
Vector
Machines
(SVM),
Feed
Forward
Network
(FFNN),
Gated
Recurrent
Unit
(GRU).To
make
more
efficient,
ensemble
technique
employed
models
an
accuracy
94.91%
achieved.
Research Square (Research Square),
Journal Year:
2023,
Volume and Issue:
unknown
Published: April 20, 2023
Abstract
In
the
healthcare
industry,
online
data
sharing
has
become
increasingly
important,
but
it
also
raises
significant
security
concerns.
To
address
these
concerns,
we
propose
a
secure
and
efficient
scheme
that
uses
cryptographic
primitive
called
broadcast
encryption
with
personalised
message
system.
This
notion
is
applicable
to
many
realistic
services
supports
IoT
cloud
technology.
Specifically,
in
our
system,
owner
creates
personalized
for
each
legitimate
user
group
then
transmits
common
encrypted
entire
way
completely
hides
subscribed
set
from
outsiders.
Only
authorized
users
can
recover
data,
while
all
consumers
decrypt
data.
Proposed
employs
shamir
secret
fairly
distribute
reconstruct
among
various
up
authority
prevent
insider
attack
malicious
setup
authority.We
highlight
consideration
such
scenario
capture
requirements
model.
Subsequently,
present
concrete
scheme,
which
proven
CPA
under
decisional
bilinear
Diffie-Hellman
exponent
assumption.
addition,
asymmetric
pairings
whereas
rest
of
schemes
used
symmetric
pairings,
turn
leads
smaller
constant
compact
size
ciphertext,
decryption
keys,
reduced
channel
requirement,
fault
attacks
on
map,
and,
enhanced
performance.
Abstract
As
the
digital
landscape
changes,
privacy
concerns
in
machine
learning
applications
need
to
be
focused
on.
This
research
will
investigate
implications
of
LinkedIn
platform
related
targeted
advertising
and
user
profiling.
The
main
purpose
this
is
understand
algorithm
used
by
generate
profiles
way
they
provide
relevant
users.
use
different
methods,
like
interviews,
surveys,
data
analysis.
first
step
look
at
algorithms
processes
for
collecting
To
what
kind
collected
how
create
profiles,
evaluate
level
control
users
have
over
their
data.
In
process
gathering
information,
surveys
done
on
concern
awareness
platform's
policies.
A
sample
given
interviews
get
more
qualitative
feedback
users'
experiences.
check
types
are
that
keep
them
engaged
with
platform.
study
give
a
great
picture
taken
advantage
platform,
from
perspective
there
trade-off
between
content
end,
another
catalyst
huge
conversation
happening
now
giving
new
suggestions
industry
best
practices
improve
findings
open
discussion
ways,
itself
legislators