Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,948)

Search Parameters:
Keywords = Security/privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
43 pages, 2712 KB  
Review
A Comprehensive Survey of Cybersecurity Threats and Data Privacy Issues in Healthcare Systems
by Ramsha Qureshi and Insoo Koo
Appl. Sci. 2026, 16(3), 1511; https://doi.org/10.3390/app16031511 - 2 Feb 2026
Abstract
The rapid digital transformation of healthcare has improved clinical efficiency, patient engagement, and data accessibility, but it has also introduced significant cyber security and data privacy challenges. Healthcare IT systems increasingly rely on interconnected networks, electronic health records (EHRs), tele-medicine platforms, cloud infrastructures, [...] Read more.
The rapid digital transformation of healthcare has improved clinical efficiency, patient engagement, and data accessibility, but it has also introduced significant cyber security and data privacy challenges. Healthcare IT systems increasingly rely on interconnected networks, electronic health records (EHRs), tele-medicine platforms, cloud infrastructures, and Internet of Medical Things (IoMT) devices, which collectively expand the attack surface for cyber threats. This scoping review maps and synthesizes recent evidence on cyber security risks in healthcare, including ransomware, data breaches, insider threats, and vulnerabilities in legacy systems, and examines key data privacy concerns related to patient confidentiality, regulatory compliance, and secure data governance. We also review contemporary security strategies, including encryption, multi-factor authentication, zero-trust architecture, blockchain-based approaches, AI-enabled threat detection, and compliance frameworks such as HIPAA and GDPR. Persistent challenges include integrating robust security with clinical usability, protecting resource-limited hospital environments, and managing human factors such as staff awareness and policy adherence. Overall, the findings suggest that effective healthcare cyber security requires a multi-layered defense combining technical controls, continuous monitoring, governance and regulatory alignment, and sustained organizational commitment to security culture. Future research should prioritize adaptive security models, improved standardization, and privacy-preserving analytics to protect patient data in increasingly complex healthcare ecosystems. Full article
Show Figures

Figure 1

43 pages, 6631 KB  
Systematic Review
Privacy and Security in Health Big Data: A NIST-Guided Systematic Review of Technologies, Challenges, and Future Directions
by Siyuan Zhang and Manmeet Mahinderjit Singh
Information 2026, 17(2), 148; https://doi.org/10.3390/info17020148 - 2 Feb 2026
Abstract
The rapid expansion of health big data, encompassing genomic profiles and wearable device telemetry, has significantly escalated personal privacy risks. This systematic literature review (SLR) synthesizes 86 peer-reviewed studies (2014–2025) through the dual lens of the NIST Cybersecurity and Privacy Frameworks to evaluate [...] Read more.
The rapid expansion of health big data, encompassing genomic profiles and wearable device telemetry, has significantly escalated personal privacy risks. This systematic literature review (SLR) synthesizes 86 peer-reviewed studies (2014–2025) through the dual lens of the NIST Cybersecurity and Privacy Frameworks to evaluate emerging risks, mitigation technologies, and regulatory landscapes. Our analysis identifies unauthorized access as the predominant threat, while blockchain-based solutions comprise 22.1% of proposed interventions. However, a comparative evaluation reveals critical performance trade-offs: differential privacy mechanisms incur a 15–35% utility loss, whereas blockchain implementations impose a 40–50% computational overhead. Furthermore, an assessment of major regulatory frameworks (GDPR, HIPAA, PIPL, and emerging regional laws in Sub-Saharan Africa) elucidates significant cross-jurisdictional conflicts. To address these challenges, we propose the Bio-inspired Adaptive Healthcare Privacy (BAHP) framework, validated through retrospective case study analysis, offering a dynamic approach to securing sensitive health ecosystems. Full article
(This article belongs to the Special Issue Digital Privacy and Security, 3rd Edition)
Show Figures

Graphical abstract

29 pages, 679 KB  
Article
Digital Boundaries and Consent in the Metaverse: A Comparative Review of Privacy Risks
by Sofia Sakka, Vasiliki Liagkou, Afonso Ferreira and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 24; https://doi.org/10.3390/jcp6010024 - 2 Feb 2026
Abstract
Metaverse presents significant opportunities for educational advancement by facilitating immersive, personalized, and interactive learning experiences through technologies such as virtual reality (VR), augmented reality (AR), extended reality (XR), and artificial intelligence (AI). However, this potential is compromised if digital environments fail to uphold [...] Read more.
Metaverse presents significant opportunities for educational advancement by facilitating immersive, personalized, and interactive learning experiences through technologies such as virtual reality (VR), augmented reality (AR), extended reality (XR), and artificial intelligence (AI). However, this potential is compromised if digital environments fail to uphold individuals’ privacy, autonomy, and equity. Despite their widespread adoption, the privacy implications of these environments remain inadequately understood, both in terms of technical vulnerabilities and legislative challenges, particularly regarding user consent management. Contemporary Metaverse systems collect highly sensitive information, including biometric signals, spatial behavior, motion patterns, and interaction data, often surpassing the granularity captured by traditional social networks. The lack of privacy-by-design solutions, coupled with the complexity of underlying technologies such as VR/AR infrastructures, 3D tracking systems, and AI-driven personalization engines, makes these platforms vulnerable to security breaches, data misuse, and opaque processing practices. This study presents a structured literature review and comparative analysis of privacy risks, consent mechanisms, and digital boundaries in metaverse platforms, with particular attention to educational contexts. We argue that privacy-aware design is essential not only for ethical compliance but also for supporting the long-term sustainability goals of digital education. Our findings aim to inform and support the development of secure, inclusive, and ethically grounded immersive learning environments by providing insights into systemic privacy and policy shortcomings. Full article
(This article belongs to the Special Issue Current Trends in Data Security and Privacy—2nd Edition)
Show Figures

Graphical abstract

29 pages, 3424 KB  
Article
Comprehensive Privacy Awareness Framework (CPAF): Assessing Privacy Awareness of Saudi E-Commerce Users
by Norah D. Alotaibi, Maysoon Abulkhair and Manal Bayousef
J. Theor. Appl. Electron. Commer. Res. 2026, 21(2), 50; https://doi.org/10.3390/jtaer21020050 - 2 Feb 2026
Abstract
With the rapid expansion of the Internet, it is crucial to be aware of the different aspects of privacy, especially in light of rising global cybersecurity threats and data breaches. While previous research has identified various factors when studying privacy awareness, these studies [...] Read more.
With the rapid expansion of the Internet, it is crucial to be aware of the different aspects of privacy, especially in light of rising global cybersecurity threats and data breaches. While previous research has identified various factors when studying privacy awareness, these studies often remain fragmented or examine key factors in isolation from one another, limiting their ability to provide a holistic view. To address this gap, this study proposes the Comprehensive Privacy Awareness Framework (CPAF), which is a theoretically grounded model that conceptualizes privacy awareness across four dimensions: individual, technological, organizational, and social. The framework is empirically validated through a case study of Saudi e-commerce users, a context chosen due to the sector’s rapid digital transformation under Vision 2030 and limited comprehensive privacy research. A CPAF-based survey was administered to 400 active e-commerce users. The quantitative results demonstrate that privacy awareness is a multidimensional construct, where each dimension is significantly associated with the others. Privacy awareness cannot be captured through a single and uniform measure. The findings further reveal notable gaps in users’ knowledge, behaviors, and perceptions of privacy risks, indicating insufficient preparedness when navigating e-commerce environments. These insights highlight the urgent need for targeted awareness initiatives and policy interventions to strengthen user protection and foster responsible digital participation. Full article
Show Figures

Figure 1

39 pages, 1657 KB  
Systematic Review
Harnessing Artificial Intelligence and Digital Technologies for Sustainable Healthcare Delivery in Saudi Arabia: A Comprehensive Review, Issues, and Future Perspectives
by Fayez Nahedh Alsehani
Sustainability 2026, 18(3), 1461; https://doi.org/10.3390/su18031461 - 2 Feb 2026
Abstract
The incorporation of artificial intelligence (AI) and digital technology in healthcare has revolutionized service delivery, improving diagnostic precision, patient outcomes, and operational efficacy. Nonetheless, despite considerable progress, numerous problems persist that impede the realization of full potential. Current reviews predominantly emphasize the advantages [...] Read more.
The incorporation of artificial intelligence (AI) and digital technology in healthcare has revolutionized service delivery, improving diagnostic precision, patient outcomes, and operational efficacy. Nonetheless, despite considerable progress, numerous problems persist that impede the realization of full potential. Current reviews predominantly emphasize the advantages of AI in disease detection and health guidance, neglecting significant concerns such as social opposition, regulatory frameworks, and geographical discrepancies. This SLR, executed in accordance with PRISMA principles, examined 21 publications from 2020 to 2025 to assess the present condition of AI and digital technologies inside Saudi Arabia’s healthcare industry. Initially, 863 publications were obtained, from which 21 were chosen for comprehensive examination. Significant discoveries encompass the extensive utilization of telemedicine, data analytics, mobile health applications, Internet of Things, electronic health records, blockchain technology, online platforms, cloud computing, and encryption methods. These technologies augment diagnostic precision, boost patient outcomes, optimize administrative procedures, and foster preventative medicine, contributing to cost-effectiveness, environmental sustainability, and enduring service provision. Nonetheless, issues include data privacy concerns, elevated implementation expenses, opposition to change, interoperability challenge, and regulatory issues persist as substantial barriers. Subsequent investigations must concentrate on the development of culturally relevant AI algorithms, the enhancement of Arabic natural language processing, and the establishment of AI-driven mental health systems. By confronting these challenges and utilizing emerging technologies, Saudi Arabia has the potential to establish its status as a leading nation in medical services innovation, guaranteeing patient-centered, efficient, and accessible healthcare delivery. Recommendations must include augmenting data privacy and security, minimizing implementation expenses, surmounting resistance to change, enhancing interoperability, fortifying regulatory frameworks, addressing regional inequities, and investing in nascent technologies. Full article
Show Figures

Figure 1

29 pages, 2816 KB  
Article
Library Systems and Digital-Rights Management: Towards a Blockchain-Based Solution for Enhanced Privacy and Security
by Patrick Laboso, Martin Aruldoss, P. Thiyagarajan, T. Miranda Lakshmi and Martin Wynn
Information 2026, 17(2), 137; https://doi.org/10.3390/info17020137 - 1 Feb 2026
Viewed by 145
Abstract
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address [...] Read more.
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address these challenges, this article puts forward a decentralized DRM framework for library systems by leveraging blockchain technology and decentralized DRM-key mechanisms. An integrative review of the available research literature provides an analysis of current blockchain-based DRM library systems, their limitations, and associated challenges. To address these issues, a controlled experiment is set up to implement and evaluate a possible solution. In the proposed model, digital content is encrypted and stored in the Inter-Planetary File System (IPFS), while blockchain smart contracts manage the generation, distribution, and validation of DRM-keys that regulate user-access rights. This approach ensures immutability, transparency, and fine-grained access control without reliance on centralized authorities. Security is enhanced through cryptographic techniques for authentication. The model not only mitigates issues of piracy, unauthorized redistribution, and vendor lock-in, but also provides a scalable and interoperable solution for modern digital libraries. The findings demonstrate how blockchain-enabled DRM-keys can enhance trust, accountability, and efficiency through the development of secure, decentralized, and user-centric digital library systems, which will be of interest to practitioners charged with library IT technology management and to researchers in the wider field of blockchain applications in organizations. Full article
Show Figures

Graphical abstract

42 pages, 7319 KB  
Review
A Comprehensive Survey on VANET–IoT Integration Toward the Internet of Vehicles: Architectures, Communications, and System Challenges
by Khalid Kandali, Said Nouh, Lamyae Bennis and Hamid Bennis
Future Transp. 2026, 6(1), 32; https://doi.org/10.3390/futuretransp6010032 - 31 Jan 2026
Viewed by 123
Abstract
The convergence of Vehicular Ad Hoc Networks (VANETs) and the Internet of Things (IoT) is giving rise to the Internet of Vehicles (IoV), a key enabler of next-generation intelligent transportation systems. This survey provides a comprehensive analysis of the architectural, communication, and computing [...] Read more.
The convergence of Vehicular Ad Hoc Networks (VANETs) and the Internet of Things (IoT) is giving rise to the Internet of Vehicles (IoV), a key enabler of next-generation intelligent transportation systems. This survey provides a comprehensive analysis of the architectural, communication, and computing foundations that support VANET–IoT integration. We examine the roles of cloud, edge, and in-vehicle computing, and compare major V2X and IoT communication technologies, including DSRC, C-V2X, MQTT, and CoAP. The survey highlights how sensing, communication, and distributed intelligence interact to support applications such as collision avoidance, cooperative perception, and smart traffic management. We identify four central challenges—security, scalability, interoperability, and energy constraints—and discuss how these issues shape system design across the network stack. In addition, we review emerging directions including 6G-enabled joint communication and sensing, reconfigurable surfaces, digital twins, and quantum-assisted optimization. The survey concludes by outlining open research questions and providing guidance for the development of reliable, efficient, and secure VANET–IoT systems capable of supporting future transportation networks. Full article
29 pages, 14020 KB  
Article
Multi-Objective Optimization and Federated Learning for Agri-Food Supply Chains via Dynamic Heterogeneous Graph Neural Networks
by Lin Xuan, Baidong Zhao, Dingkun Zheng, Madina Mansurova, Baurzhan Belgibaev, Gulshat Amirkhanova, Alikhan Amirkhanov and Chenghan Yang
Sustainability 2026, 18(3), 1426; https://doi.org/10.3390/su18031426 - 31 Jan 2026
Viewed by 90
Abstract
The intricate and dynamic nature of agricultural supply chains imposes stringent demands on optimization methodologies, necessitating multi-objective considerations, privacy safeguards, and decision transparency to address pivotal challenges in ensuring food security and sustainable development. This study introduces a Dynamic Heterogeneous Multi-Objective Graph Neural [...] Read more.
The intricate and dynamic nature of agricultural supply chains imposes stringent demands on optimization methodologies, necessitating multi-objective considerations, privacy safeguards, and decision transparency to address pivotal challenges in ensuring food security and sustainable development. This study introduces a Dynamic Heterogeneous Multi-Objective Graph Neural Network (DHMO-GNN) model, meticulously tailored for optimizing agricultural supply chains. It integrates five core modules: data preprocessing and heterogeneous graph construction, dynamic graph neural networks, multi-objective optimization, interpretability enhancement, and federated learning collaboration. The model adeptly captures temporal dynamics through sequential attention mechanisms and incremental updates, harmonizes cost, delivery time, and carbon emissions via multi-task learning and Pareto optimization, augments decision transparency with GNNExplainer and SHAP, and surmounts data silos by leveraging federated learning alongside differential privacy. Empirical evaluations on the Chengdu Hongguang Town Farmers’ Market dataset demonstrate that the centralized DHMO-GNN variant achieves a hypervolume indicator (HV) of 0.849, surpassing baseline models; the federated variant exhibits only a 2.6% decline under privacy constraints, underscoring its robustness. Ablation studies further corroborate the synergistic contributions of each module. This research furnishes an efficacious and trustworthy framework for the intelligent management of agricultural supply chains, holding profound implications for advancing digital transformation and green development. Full article
(This article belongs to the Section Sustainable Management)
Show Figures

Figure 1

36 pages, 807 KB  
Review
An Overview of Technical Aspects and Challenges in Designing Edge-Cloud Systems
by Mohammadsadeq Garshasbi Herabad, Javid Taheri, Bestoun S. Ahmed and Calin Curescu
Appl. Sci. 2026, 16(3), 1454; https://doi.org/10.3390/app16031454 - 31 Jan 2026
Viewed by 84
Abstract
Edge–cloud computing has emerged as a key enabling paradigm for augmented and virtual reality (AR/VR) systems because of the stringent computational and ultra-low-latency requirements of AR/VR workloads. Designing efficient edge–cloud systems for such workloads involves multiple technical aspects, including communication technologies, service placement, [...] Read more.
Edge–cloud computing has emerged as a key enabling paradigm for augmented and virtual reality (AR/VR) systems because of the stringent computational and ultra-low-latency requirements of AR/VR workloads. Designing efficient edge–cloud systems for such workloads involves multiple technical aspects, including communication technologies, service placement, task offloading and caching, service migration, and security and privacy. This paper provides a structured and technical analysis of these aspects from an AR/VR perspective. We adopt a two-stage literature analysis, in which Google Scholar is used to identify fundamental technical aspects and solution approaches, followed by a focused analysis of recent research trends and future directions using academic databases (e.g., IEEE Xplore, ACM Digital Library, and ScienceDirect). We present an organized classification of the core technical aspects and investigate existing solution approaches, including heuristic, metaheuristic, learning-based, and hybrid strategies. Rather than introducing application-specific designs, the analysis focuses on workload-driven challenges and trade-offs that arise in AR/VR systems. Based on this classification, we analyze recent research trends, identify underexplored technical areas, and highlight key research gaps that hinder the efficient deployment of AR/VR services over edge–cloud infrastructures. The findings of this study provide practical insights for researchers and system designers and help guide future research toward more responsive, scalable, and reliable edge–cloud AR/VR systems. Full article
(This article belongs to the Special Issue Edge Computing and Cloud Computing: Latest Advances and Prospects)
22 pages, 324 KB  
Article
Digital Panopticon: How Remote Work Monitoring Shapes Employee Behavior and Motivation
by Aleksandar Nikodinovski, Darjan Karabašević and Vuk Mirčetić
Businesses 2026, 6(1), 6; https://doi.org/10.3390/businesses6010006 - 30 Jan 2026
Viewed by 119
Abstract
Through systematic literature synthesis (2000–2024) integrating Foucault’s disciplinary power theory, Nissenbaum’s contextual integrity framework, and job design theory, this paper develops the Autonomy-Surveillance Conceptual Framework to explain differential psychological impacts of digital workplace surveillance. The embrace of remote work has increased surveillance practices [...] Read more.
Through systematic literature synthesis (2000–2024) integrating Foucault’s disciplinary power theory, Nissenbaum’s contextual integrity framework, and job design theory, this paper develops the Autonomy-Surveillance Conceptual Framework to explain differential psychological impacts of digital workplace surveillance. The embrace of remote work has increased surveillance practices among organizations as an increased need to ensure employee productivity in remote settings appears, along with a drive to ensure data security and streamline workflows. Many employees perceive such practices as a breach of privacy, signifying employer distrust. The framework predicts that surveillance creates varying degrees of contextual integrity violation based on job autonomy: high-autonomy knowledge workers experience severe violations through trust erosion, procedural injustice, and temporal autonomy loss, while low-autonomy workers evaluate surveillance primarily through fairness criteria. This paper addresses a critical gap in existing research, which has focused on low-autonomy roles. By examining which roles are most impacted by digital surveillance, this paper seeks to highlight transparency and autonomy-sensitive policies to maximize the associated benefits of digital surveillance, while calling attention to employee well-being, trust, and organizational performance. Full article
Show Figures

Figure 1

39 pages, 1649 KB  
Review
The Network and Information Systems 2 Directive: Toward Scalable Cyber Risk Management in the Remote Patient Monitoring Domain: A Systematic Review
by Brian Mulhern, Chitra Balakrishna and Jan Collie
IoT 2026, 7(1), 14; https://doi.org/10.3390/iot7010014 - 29 Jan 2026
Viewed by 100
Abstract
Healthcare 5.0 and the Internet of Medical Things (IoMT) is emerging as a scalable model for the delivery of customised healthcare and chronic disease management, through Remote Patient Monitoring (RPM) in patient smart home environments. Large-scale RPM initiatives are being rolled out by [...] Read more.
Healthcare 5.0 and the Internet of Medical Things (IoMT) is emerging as a scalable model for the delivery of customised healthcare and chronic disease management, through Remote Patient Monitoring (RPM) in patient smart home environments. Large-scale RPM initiatives are being rolled out by healthcare providers (HCPs); however, the constrained nature of IoMT devices and proximity to poorly administered smart home technologies create a cyber risk for highly personalised patient data. The recent Network and Information Systems (NIS 2) directive requires HCPs to improve their cyber risk management approaches, mandating heavy penalties for non-compliance. Current research into cyber risk management in smart home-based RPM does not address scalability. This research examines scalability through the lens of the Non-adoption, Abandonment, Scale-up, Spread and Sustainability (NASSS) framework and develops a novel Scalability Index (SI), informed by a PRISMA guided systematic literature review. Our search strategy identified 57 studies across major databases including ACM, IEEE, MDPI, Elsevier, and Springer, authored between January 2016 and March 2025 (final search 21 March 2025), which focussed on cyber security risk management in the RPM context. Studies focussing solely on healthcare institutional settings were excluded. To mitigate bias, a sample of the papers (30/57) were assessed by two other raters; the resulting Cohen’s Kappa inter-rater agreement statistic (0.8) indicating strong agreement on study selection. The results, presented in graphical and tabular format, provide evidence that most cyber risk approaches do not consider scalability from the HCP perspective. Applying the SI to the 57 studies in our review resulted in a low to medium scalability potential of most cyber risk management proposals, indicating that they would not support the requirements of NIS 2 in the RPM context. A limitation of our work is that it was not tested in a live large-scale setting. However, future research could validate the proposed SI, providing guidance for researchers and practitioners in enhancing cyber risk management of large-scale RPM initiatives. Full article
(This article belongs to the Topic Applications of IoT in Multidisciplinary Areas)
Show Figures

Graphical abstract

32 pages, 7289 KB  
Article
G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems
by Daniel Ayo Oladele, Ayokunle Ige, Olatunbosun Agbo-Ajala, Olufisayo Ekundayo, Sree Ganesh Thottempudi, Malusi Sibiya and Ernest Mnkandla
IoT 2026, 7(1), 13; https://doi.org/10.3390/iot7010013 - 29 Jan 2026
Viewed by 63
Abstract
Intrusion detection in IoT networks is challenged by data heterogeneity, label scarcity, and privacy constraints. Traditional federated learning (FL) methods often assume IID data or require supervised labels, limiting their practicality. We propose G-PFL-ID, a graph-driven personalized federated learning framework for unsupervised intrusion [...] Read more.
Intrusion detection in IoT networks is challenged by data heterogeneity, label scarcity, and privacy constraints. Traditional federated learning (FL) methods often assume IID data or require supervised labels, limiting their practicality. We propose G-PFL-ID, a graph-driven personalized federated learning framework for unsupervised intrusion detection in non-IID IoT systems. Our method trains a global graph encoder (GCN or GAE) with a DeepSVDD objective under a federated regularizer (FedReg) that combines proximal and variance penalties, then personalizes local models via a lightweight fine-tuning head. We evaluate G-PFL-ID on the IoT-23 (Mirai-based captures) and N-BaIoT (device-level dataset) under realistic heterogeneity (Dirichlet-based partitioning with concentration parameters α{0.1,0.5,} and client counts K{10,15,20} for IoT-23, and natural device-based partitioning for N-BaIoT). G-PFL-ID outperforms global FL baselines and recent graph-based federated anomaly detectors, achieving up to 99.46% AUROC on IoT-23 and 97.74% AUROC on N-BaIoT. Ablation studies confirm that the proximal and variance penalties reduce inter-round drift and representation collapse, and that lightweight personalization recovers local sensitivity—especially for clients with limited data. Our work bridges graph-based anomaly detection with personalized FL for scalable, privacy-preserving IoT security. Full article
42 pages, 1410 KB  
Article
When Advice Isn’t Trusted: Privacy, Transparency, and Accountability Risks Driving AI Mistrust and Consumer Resistance in Financial Advisory Services
by Pichit Sungkarungsri and Supaporn Kiattisin
Sustainability 2026, 18(3), 1354; https://doi.org/10.3390/su18031354 - 29 Jan 2026
Viewed by 170
Abstract
The application of AI in financial planning services has the potential to enhance universal access to financial services. However, AI still faces common consumer mistrust and resistance, hindering the long-term sustainability of AI-powered financial planning. This research aims to explain why consumers resist [...] Read more.
The application of AI in financial planning services has the potential to enhance universal access to financial services. However, AI still faces common consumer mistrust and resistance, hindering the long-term sustainability of AI-powered financial planning. This research aims to explain why consumers resist AI in financial planning and the mechanisms that lead to this resistance and negative customer behavior. This research developed a conceptual model by integrating the S-O-B-C framework with Innovation Resistance Theory, AI ethical risks, and social influence that influence AI mistrust and intention to resist, which lead to negative outcomes such as negative word-of-mouth and customer disloyalty in the context of digital financial planning services in Thailand. The research collected data from a sample of 420 persons and the data was analyzed using PLS-SEM. The research identified social influence and the risks associated with AI transparency and accountability as primary factors contributing to AI mistrust, whereas privacy risk serves as a more fundamental catalyst for resistance. This resistance contributes to negative word-of-mouth and leads to customer disloyalty. It emphasizes that developing sustainable AI financial advisors must go beyond technically secure design to transparent, accountable, and socially legitimate governance to maintain long-term relationships with customers in the digital financial system. Full article
19 pages, 473 KB  
Article
Privacy Protection Optimization Method for Cloud Platforms Based on Federated Learning and Homomorphic Encryption
by Jing Wang and Yun Wang
Sensors 2026, 26(3), 890; https://doi.org/10.3390/s26030890 - 29 Jan 2026
Viewed by 128
Abstract
With the wide application of cloud computing in multi-tenant, heterogeneous nodes and high-concurrency environments, model parameters frequently interact during distributed training, which easily leads to privacy leakage, communication redundancy, and decreased aggregation efficiency. To realize the collaborative optimization of privacy protection and computing [...] Read more.
With the wide application of cloud computing in multi-tenant, heterogeneous nodes and high-concurrency environments, model parameters frequently interact during distributed training, which easily leads to privacy leakage, communication redundancy, and decreased aggregation efficiency. To realize the collaborative optimization of privacy protection and computing performance, this study proposes the Heterogeneous Federated Homomorphic Encryption Cloud (HFHE-Cloud) model, which integrates federated learning (FL) and homomorphic encryption and constructs a secure and efficient collaborative learning framework for cloud platforms. Under the condition of not exposing the original data, the model effectively reduces the performance bottleneck caused by encryption calculation and communication delay through hierarchical key mapping and dynamic scheduling mechanism of heterogeneous nodes. The experimental results show that HFHE-Cloud is significantly superior to Federated Averaging (FedAvg), Federated Proximal (FedProx), Federated Personalization (FedPer) and Federated Normalized Averaging (FedNova) in comprehensive performance, Homomorphically Encrypted Federated Averaging (HE-FedAvg) and other five baseline models. In the dimension of privacy protection, the global accuracy is up to 94.25%, and the Loss is stable within 0.09. In terms of computing performance, the encryption and decryption time is shortened by about one third, and the encryption overhead is controlled at 13%. In terms of distributed training efficiency, the number of communication rounds is reduced by about one fifth, and the node participation rate is stable at over 90%. The results verify the model’s ability to achieve high security and high scalability in multi-tenant environment. This study aims to provide cloud service providers and enterprise data holders with a technical solution of high-intensity privacy protection and efficient collaborative training that can be deployed in real cloud platforms. Full article
(This article belongs to the Section Sensor Networks)
44 pages, 2025 KB  
Review
Precision Farming with Smart Sensors: Current State, Challenges and Future Outlook
by Bonface O. Manono, Boniface Mwami, Sylvester Mutavi and Faith Nzilu
Sensors 2026, 26(3), 882; https://doi.org/10.3390/s26030882 - 29 Jan 2026
Cited by 1 | Viewed by 328
Abstract
The agricultural sector, a vital industry for human survival and a primary source of food and raw materials, faces increasing pressure due to global population growth and environmental strains. Productivity, efficiency, and sustainability constraints are preventing traditional farming methods from adequately meeting the [...] Read more.
The agricultural sector, a vital industry for human survival and a primary source of food and raw materials, faces increasing pressure due to global population growth and environmental strains. Productivity, efficiency, and sustainability constraints are preventing traditional farming methods from adequately meeting the growing demand for food. Precision farming has emerged as a transformative paradigm to address these issues. It integrates advanced technologies to improve decision making, optimize yield, and conserve resources. This approach leverages technologies such as wireless sensor networks, the Internet of Things (IoT), robotics, drones, artificial intelligence (AI), and cloud computing to provide effective and cost-efficient agricultural services. Smart sensor technologies are foundational to precision farming. They offer crucial information regarding soil conditions, plant growth, and environmental factors in real time. This review explores the status, challenges, and prospects of smart sensor technologies in precision farming. The integration of smart sensors with the IoT and AI has significantly transformed how agricultural data is collected, analyzed, and utilized to optimize yield, conserve resources, and enhance overall farm efficiency. The review delves into various types of smart sensors used, their applications, and emerging technologies that promise to further innovate data acquisition and decision making in agriculture. Despite progress, challenges persist. They include sensor calibration, data privacy, interoperability, and adoption barriers. To fully realize the potential of smart sensors in ensuring global food security and promoting sustainable farming, the challenges need to be addressed. Full article
(This article belongs to the Section Smart Agriculture)
Show Figures

Figure 1

Back to TopTop