Navigating the path to economic empowerment: overcoming challenges in digital platforms for economic empowerment DOI Creative Commons

Otuma O. Andako

World Journal of Advanced Research and Reviews, Journal Year: 2023, Volume and Issue: 20(3), P. 1503 - 1521

Published: Dec. 28, 2023

This paper presents a comprehensive survey of the challenges faced by economic empowerment digital platforms. As these online platforms revolutionize landscape, they encounter various hurdles that hinder their potential for fostering financial inclusion and empowerment. Through an extensive analysis existing literature empirical studies, this identifies categorizes key The reveals regulatory frameworks pose significant obstacles to Issues such as unclear or outdated regulations, varying legal requirements across jurisdictions, need compliance with consumer protection data privacy laws platform operations expansion. Moreover, absence standardized regulations often leads uncertainties in ensuring fair competition. Furthermore, highlights persistent challenge trust reputation management within rely heavily on user-generated content interactions, establishing among users becomes critical. fraudulent activities, identity verification, dispute resolution mechanisms emerge must address maintain user credibility. also addresses technological cybersecurity threats, breaches, concerns risks both operators users. Platforms invest robust security measures adopt innovative technologies mitigate safeguard information transactions. Additionally, examines related accessibility. Despite empowerment, certain groups, individuals from low-income communities those lacking literacy, may face barriers accessing utilizing Bridging divide equal opportunities all participate benefit remains ongoing challenge. Finally, collaboration cooperation stakeholders. Platform operators, policymakers, bodies, engage constructive dialogue effectively. Collaborative efforts can lead development frameworks, industry standards, best practices foster conducive environment thrive.

Language: Английский

Reviewing advancements in privacy-enhancing technologies for big data analytics in an era of increased surveillance DOI Creative Commons
Olakunle Abayomi Ajala,

Chuka Anthony Arinze,

Onyeka Chrisanctus Ofodile

et al.

World Journal of Advanced Engineering Technology and Sciences, Journal Year: 2024, Volume and Issue: 11(1), P. 294 - 300

Published: Feb. 20, 2024

In the contemporary landscape of big data analytics, privacy concerns loom large, exacerbated by escalating surveillance measures. This review delves into advancements privacy-enhancing technologies (PETs) amidst this era heightened scrutiny. The explores evolving PETs, highlighting their pivotal role in safeguarding individual while enabling meaningful analysis. Firstly, elucidates environment, characterized ubiquitous collection practices and proliferation sophisticated monitoring mechanisms. Against backdrop, imperative for robust solutions becomes evident. Subsequently, navigates through array encompassing differential privacy, homomorphic encryption, secure multi-party computation, federated learning, among others. Each technology is scrutinized its efficacy mitigating risks without compromising analytical utility. Furthermore, delineates notable applications PETs across diverse domains, including healthcare, finance, social media. Case studies exemplify how facilitate sharing collaborative analysis preserving confidentiality compliance with regulatory frameworks. Moreover, examines challenges hindering widespread adoption such as computational overhead, interoperability issues, ambiguities. Strategies overcoming these hurdles are elucidated, algorithmic efficiency, standardization efforts, policy advocacy. underscores reconciling imperatives analytics protection surveillance. It emphasizes necessity interdisciplinary collaboration researchers, policymakers, industry stakeholders to foster development deployment effective PET solutions, thereby ensuring a harmonious balance between utility rights digital age.

Language: Английский

Citations

19

Visual Communication Design Method in Folk Art Based on Multimedia Data Transmission Technology DOI Open Access

Linran Sun,

Nojun Kwak

International Journal of Information Systems and Supply Chain Management, Journal Year: 2024, Volume and Issue: 17(1), P. 1 - 19

Published: March 6, 2024

With the rapid development of science and technology China's economy, internet, big data, computers, multimedia are widely used in all walks life to promote application improvement visual communication design concepts, gradual implementation technology, continuous innovation. In this paper, from transmission based on network coding, some key technologies data video streams studied depth and, transmission-quality assessment model, working effect jitter-buffering algorithm WebRTC is compared different environments. The experimental results show that proposed paper has better effect. This research great significance for realization next-generation networks.

Language: Английский

Citations

4

A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System DOI

Snehlata Yadav,

Vivek Yadav

Published: Jan. 1, 2024

The value of healthcare records has skyrocketed due to the emergence many new diseases and ongoing pandemic situations. With these spread across numerous provider entities in various locations, it become time-consuming manage them physical form. Consequently, there is a growing need transition electronic (EHRs). However, current approach managing EHRs at centralized level creates single point failure exposes users security risks which include amateur-level attacks data breaches orchestrated by adversaries. Handling health from Internet Medical Things(IoMT) poses significant challenges sensitive information involved, makes prime target for attackers. Furthermore, modern systems complex expensive, demanding highly secure storage space. recent COVID-19 inflicted unprecedented costs human suffering on scale never seen before world. As long as continue resurface, we must strive slow down pandemics leveraging empowered IT technologies. Blockchain technology emerges one potential solution achieving this goal. By enhancing record management, blockchain can address problems. Its rising popularity sparked extensive research into different transaction schemes that specialize privacy preservation fields. public nature blockchain, information, introduces risks. Therefore, crucial construct an efficient scheme flexible ensures contents reliable auditability, aspects previous works have failed adequately address. We propose framework broadcast encryption specific instance provide conditional access control. It relies dedicated asymmetric-key-based scheme, stores user encrypted credentials Simultaneously, stored off-chain source applicable data. environment facilitates interactive communication between providers, providing necessary control information. Our proposed based enabled privacy-preserving construction utilizes asymmetric-key method. implementing approach, aim overcome limitations ensure private handling transactions within ecosystem.

Language: Английский

Citations

1

Privacy-Preserving Data Sharing Platform DOI Open Access
Abhishek Mishra

INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, Journal Year: 2024, Volume and Issue: 08(04), P. 1 - 5

Published: April 29, 2024

In today's data-driven healthcare landscape, the secure sharing of sensitive medical information is essential for improving patient care, facilitating research, and advancing outcomes. However, ensuring integrity, confidentiality, privacy data poses significant challenges, particularly in context big environments. This presents a comprehensive framework privacy-preserving healthcare, leveraging combination cryptographic techniques, encryption, computation protocols. The encompasses various mechanisms, including Differential Privacy with Data Perturbation, Secure Multi-Party Computation (SMPC), Homomorphic Encryption, to protect from unauthorized access disclosure. By implementing state-of-the-art aims enable among multiple parties while complying regulatory requirements such as HIPAA GDPR. Additionally, paper discusses project scope, which includes cryptography, decryption, privacy, policies, procedures, security, infrastructure. proposed provides practical solution organizations research institutions collaborate on initiatives safeguarding maintaining trust. Evaluation framework's effectiveness performance metrics conducted validate its feasibility efficacy real-world settings. Keywords: Privacy-preserving sharing, Privacy, (SMPC)

Language: Английский

Citations

1

The facilitators and barriers to implementing virtual visits in intensive care units: A mixed‐methods systematic review DOI
Mengyao Li,

Tian Shi,

Juan Chen

et al.

Journal of Evaluation in Clinical Practice, Journal Year: 2024, Volume and Issue: 30(8), P. 1684 - 1716

Published: July 11, 2024

Abstract Background Visitation has a positive effect on patients and families, yet, it can disrupt intensive care unit (ICU) increase the risk of patient infections, which previously favoured face‐to‐face visits. The coronavirus disease 2019 (COVID‐19) pandemic raised importance virtual visits led to their widespread adoption globally, there are still many implementation barriers that need be improved. Therefore, this review aimed explore use ICU visit technology during COVID‐19 facilitators improve in ICUs. Methods Following Preferred Reporting Items for Systematic Reviews Meta‐Analyses guidelines, six databases (CINAHL, China National Knowledge Infrastructure [CNKI], PubMed, Cochrane, VIP Wang Fang databases) were searched empirical studies published between 1 January 2020 22 October 2023. Studies investigated reported implementing ICUs included. Evidence from included was identified thematically analysed using Thomas Harden's three‐step approach. Study quality appraised with Mixed‐Methods Appraisal Tool. Results A total 6770 references screened, 35 met inclusion criteria after full‐text review. Eight main identified: technical difficulties; insufficient resources; lack physical presence nonverbal information; low literacy; differences families' perceptions visual cues; privacy ethics issues; inequitable access technology; advance preparation. Four facilitating factors providing multidimensional professional support; strengthening coordination services; understanding preferences families; enhancing security protection. In appraisal studies, 12 rated as low, five medium 18 high methodological quality. Conclusion This key visits, foster development infrastructure, visiting workflows, policies systems services. Further necessary identify potential solutions barriers.

Language: Английский

Citations

1

Enhancing the Fight against Social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes DOI Open Access

Ejike Joseph Aloke,

Joshua Abah

International Journal of Applied Information Systems, Journal Year: 2023, Volume and Issue: 12(42), P. 1 - 14

Published: Nov. 21, 2023

Deepfakes are synthetic media that replace someone's action (source person) with another (target person).Images deepfakes, commonly known as "visual deepfakes," depict a complicated and contentious high-tech avant-garde phenomenon in the sphere of digital trickery artificial intelligence.These highly deceitful computer-based distortions static images, photographs, where appearance single individual is painstakingly superimposed onto sophisticated manner seems to be real.Image easy generate due access opensource deepfake generation software applications such FakeApp.Once it generated, social becomes its marketplace easily distributed engage deceive millions users.Most research this area focuses on using deep-learning algorithm small dataset development deepfakes detection model.Therefore work focused building robust efficient image model publicly available from Kaggle comprising one hundred forty thousand (140,000) images.The was developed Convolutional Neural Networks (CNN), Support Vector Machines (SVM), Feed Forward Network (FFNN), Gated Recurrent Unit (GRU).To make more efficient, ensemble technique employed models an accuracy 94.91% achieved.

Language: Английский

Citations

3

Secure and efficient online data sharing scheme using broadcast encryption with personalised message system DOI Creative Commons

Snehlata Yadav,

Namita Tiwari

Research Square (Research Square), Journal Year: 2023, Volume and Issue: unknown

Published: April 20, 2023

Abstract In the healthcare industry, online data sharing has become increasingly important, but it also raises significant security concerns. To address these concerns, we propose a secure and efficient scheme that uses cryptographic primitive called broadcast encryption with personalised message system. This notion is applicable to many realistic services supports IoT cloud technology. Specifically, in our system, owner creates personalized for each legitimate user group then transmits common encrypted entire way completely hides subscribed set from outsiders. Only authorized users can recover data, while all consumers decrypt data. Proposed employs shamir secret fairly distribute reconstruct among various up authority prevent insider attack malicious setup authority.We highlight consideration such scenario capture requirements model. Subsequently, present concrete scheme, which proven CPA under decisional bilinear Diffie-Hellman exponent assumption. addition, asymmetric pairings whereas rest of schemes used symmetric pairings, turn leads smaller constant compact size ciphertext, decryption keys, reduced channel requirement, fault attacks on map, and, enhanced performance.

Language: Английский

Citations

1

Privacy in the Machine Learning: A Study on User Profiling and Targeted Advertising on LinkedIn DOI Creative Commons

Eric UWAYEZU

Published: May 14, 2024

Abstract As the digital landscape changes, privacy concerns in machine learning applications need to be focused on. This research will investigate implications of LinkedIn platform related targeted advertising and user profiling. The main purpose this is understand algorithm used by generate profiles way they provide relevant users. use different methods, like interviews, surveys, data analysis. first step look at algorithms processes for collecting To what kind collected how create profiles, evaluate level control users have over their data. In process gathering information, surveys done on concern awareness platform's policies. A sample given interviews get more qualitative feedback users' experiences. check types are that keep them engaged with platform. study give a great picture taken advantage platform, from perspective there trade-off between content end, another catalyst huge conversation happening now giving new suggestions industry best practices improve findings open discussion ways, itself legislators

Language: Английский

Citations

0

Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata DOI Creative Commons
Nisha P. Shetty,

Balachandra Muniyal,

Aman Priyanshu

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 86403 - 86424

Published: Jan. 1, 2024

Language: Английский

Citations

0

Using Blockchain to Secure Passenger Name Records and Effectively Protect Citizen Rights DOI
Michal Koutenský, Vladimír Veselý,

Martin Perešíni

et al.

Published: Oct. 9, 2024

Language: Английский

Citations

0