Skip Content
You are currently on the new version of our website. Access the old version .

98 Results Found

  • Article
  • Open Access
7 Citations
3,797 Views
25 Pages

A User-Centered Framework for Data Privacy Protection Using Large Language Models and Attention Mechanisms

  • Shutian Zhou,
  • Zizhe Zhou,
  • Chenxi Wang,
  • Yuzhe Liang,
  • Liangyu Wang,
  • Jiahe Zhang,
  • Jinming Zhang and
  • Chunli Lv

5 August 2024

This paper introduces a user-centered data privacy protection framework utilizing large language models (LLMs) and user attention mechanisms, which are tailored to address urgent privacy concerns in sensitive data processing domains like financial co...

  • Article
  • Open Access
7 Citations
3,244 Views
25 Pages

12 October 2024

This study explores the integration of blockchain technology in wearable health devices through the design and development of a Smart Fidget Toy. We aimed to investigate design challenges and opportunities of blockchain-based health devices, examine...

  • Article
  • Open Access
8 Citations
4,535 Views
21 Pages

A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners

  • Lorenzo Porcelli,
  • Michele Mastroianni,
  • Massimo Ficco and
  • Francesco Palmieri

1 February 2024

Despite growing concerns about privacy and an evolution in laws protecting users’ rights, there remains a gap between how industries manage data and how users can express their preferences. This imbalance often favors industries, forcing users...

  • Article
  • Open Access
7 Citations
4,888 Views
17 Pages

19 March 2025

Usable security and privacy in public services are critical considerations in today’s digital age, where governments increasingly rely on technology to deliver services efficiently while safeguarding sensitive information. Successful usage of t...

  • Article
  • Open Access
11 Citations
3,236 Views
12 Pages

Multidimensional Study on Users’ Evaluation of the KRAKEN Personal Data Sharing Platform

  • Silvia Gabrielli,
  • Silvia Rizzi,
  • Oscar Mayora,
  • Stefan More,
  • Juan Carlos Pérez Baun and
  • Wim Vandevelde

23 March 2022

Background: Recent advances in the design of blockchain-based personal data sharing platforms bring the benefit of empowering users with more control and privacy-preserving measures in sharing data products. However, so far very little is known about...

  • Article
  • Open Access
5 Citations
3,035 Views
14 Pages

Attribute Based Pseudonyms: Anonymous and Linkable Scoped Credentials

  • Francesc Garcia-Grau,
  • Jordi Herrera-Joancomartí and
  • Aleix Dorca Josa

22 July 2022

Attribute-based credentials (ABCs) provide an efficient way to transfer custody of personal and private data to the final user, while minimizing the risk of sensitive data revelation and thus granting anonymity. Nevertheless, this method cannot detec...

  • Article
  • Open Access
2,701 Views
24 Pages

As digital media companies pursue sustainable revenue, AI-based strategies like personalized advertising and dynamic paywalls have become prevalent. These monetization models involve different forms of consumer data collection, raising distinct priva...

  • Article
  • Open Access
20 Citations
4,533 Views
20 Pages

User Identification Utilizing Minimal Eye-Gaze Features in Virtual Reality Applications

  • Sarker Monojit Asish,
  • Arun K. Kulshreshth and
  • Christoph W. Borst

Emerging Virtual Reality (VR) displays with embedded eye trackers are currently becoming a commodity hardware (e.g., HTC Vive Pro Eye). Eye-tracking data can be utilized for several purposes, including gaze monitoring, privacy protection, and user au...

  • Article
  • Open Access
4 Citations
1,159 Views
15 Pages

Proactive Data Categorization for Privacy in DevPrivOps

  • Catarina Silva,
  • João P. Barraca and
  • Paulo Salvador

28 February 2025

Assessing privacy within data-driven software is challenging due to its subjective nature and the diverse array of privacy-enhancing technologies. A simplistic personal/non-personal data classification fails to capture the nuances of data specificati...

  • Systematic Review
  • Open Access
9 Citations
9,705 Views
26 Pages

What influences Information Communications and Technology (ICT) users’ privacy behavior? Several studies have shown that users state to care about their personal data. Contrary to that though, they perform unsafe privacy actions, such as ignori...

  • Article
  • Open Access
4,806 Views
21 Pages

As data becomes a core driver of modern business innovation, mobile applications increasingly collect and process users’ personal information, posing significant challenges to the effectiveness of informed consent and the legitimacy of user aut...

  • Article
  • Open Access
1 Citations
1,572 Views
36 Pages

Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication

  • Sofia Sakka,
  • Nikolaos Pavlidis,
  • Vasiliki Liagkou,
  • Ioannis Panges,
  • Despina Elizabeth Filippidou,
  • Chrysostomos Stylios and
  • Anastasios Manos

The growing influence of technology in the healthcare industry has led to the creation of innovative applications that improve convenience, accessibility, and diagnostic accuracy. However, health applications face significant challenges concerning us...

  • Article
  • Open Access
2 Citations
3,016 Views
18 Pages

In the rapidly evolving digital healthcare market, ensuring both the activation of the market and the fulfillment of the product’s social role is essential. This study addresses the service quality of smart running applications by utilizing big...

  • Article
  • Open Access
3,848 Views
24 Pages

Privacy Concerns in ChatGPT Data Collection and Its Impact on Individuals

  • Leena Mohammad Alzamil,
  • Alawiayyah Mohammed Alhasani and
  • Suhair Alshehri

10 November 2025

With the rapid adoption of generative AI technologies across various sectors, it has become increasingly important to understand how these systems handle personal data. The study examines users’ awareness of the types of data collected, the ris...

  • Article
  • Open Access
9 Citations
4,999 Views
18 Pages

Characterization of User-Centered Security in Telehealth Services

  • Mario Vega-Barbas,
  • Fernando Seoane and
  • Iván Pau

Emerging information and communication technologies are expected to foster new, efficient and accessible services for citizens, while guaranteeing the core principles of equality and privacy. Telehealth services are a clear example of a service in wh...

  • Review
  • Open Access
4 Citations
4,518 Views
32 Pages

30 March 2025

As the interest in social and assistive support robots (SASRs) grows, a review of 17 systematic reviews was conducted to assess their use in healthcare, emotional well-being, and therapy for diverse populations, including older adults, children, and...

  • Article
  • Open Access
267 Citations
38,723 Views
18 Pages

Technology to Support Aging in Place: Older Adults’ Perspectives

  • Shengzhi Wang,
  • Khalisa Bolling,
  • Wenlin Mao,
  • Jennifer Reichstadt,
  • Dilip Jeste,
  • Ho-Cheol Kim and
  • Camille Nebeker

The U.S. population over 65 years of age is increasing. Most older adults prefer to age in place, and technologies, including Internet of things (IoT), Ambient/Active Assisted Living (AAL) robots and other artificial intelligence (AI), can support in...

  • Article
  • Open Access
12 Citations
4,586 Views
20 Pages

Background: Mobile health (mHealth) applications play a crucial role in enhancing healthcare accessibility, patient engagement, and chronic disease management. However, technical, usability, accessibility, and privacy-related barriers continue to hin...

  • Article
  • Open Access
1 Citations
1,150 Views
14 Pages

Adolescents living with HIV (ALHIV) face significant challenges in self-managing their chronic condition. Digital health technology (DHT) has become increasingly common and understanding ALHIVs’ preferences is essential for developing intervent...

  • Article
  • Open Access
30 Citations
7,298 Views
20 Pages

Spatial Information Gaps on Deprived Urban Areas (Slums) in Low-and-Middle-Income-Countries: A User-Centered Approach

  • Monika Kuffer,
  • Jon Wang,
  • Dana R. Thomson,
  • Stefanos Georganos,
  • Angela Abascal,
  • Maxwell Owusu and
  • Sabine Vanhuysse

26 September 2021

Routine and accurate data on deprivation are needed for urban planning and decision support at various scales (i.e., from community to international). However, analyzing information requirements of diverse users on urban deprivation, we found that da...

  • Article
  • Open Access
1 Citations
1,214 Views
17 Pages

Your Eyes Under Pressure: Real-Time Estimation of Cognitive Load with Smooth Pursuit Tracking

  • Pierluigi Dell’Acqua,
  • Marco Garofalo,
  • Francesco La Rosa and
  • Massimo Villari

Understanding and accurately estimating cognitive workload is crucial for the development of adaptive, user-centered interactive systems across a variety of domains including augmented reality, automotive driving assistance, and intelligent tutoring...

  • Article
  • Open Access
43 Citations
11,578 Views
18 Pages

Accessible Metaverse: A Theoretical Framework for Accessibility and Inclusion in the Metaverse

  • Achraf Othman,
  • Khansa Chemnad,
  • Aboul Ella Hassanien,
  • Ahmed Tlili,
  • Christina Yan Zhang,
  • Dena Al-Thani,
  • Fahriye Altınay,
  • Hajer Chalghoumi,
  • Hend S. Al-Khalifa and
  • Zehra Altınay
  • + 3 authors

The following article investigates the Metaverse and its potential to bolster digital accessibility for persons with disabilities. Through qualitative analysis, we examine responses from eleven experts in digital accessibility, Metaverse development,...

  • Article
  • Open Access
23 Citations
6,816 Views
16 Pages

9 September 2020

Global aging and increasing multimorbidity are questioning the sustainability of healthcare systems. Healthy aging is at the top of the world political agenda, as a possible means for hindering the collapse of care systems. In the aging process, the...

  • Article
  • Open Access
869 Views
22 Pages

K-means, as a commonly used clustering method, has been widely applied in data analysis for smart meters. However, this method requires repeatedly computing the similarity between all data points and cluster centers in each iteration, which leads to...

  • Systematic Review
  • Open Access
1,469 Views
19 Pages

Blockchains’ Impact on Enhancing Physical Activity, Rehabilitation, Sport, and Exercise-Based Therapeutics: A Systematic Review

  • Shahryar Eivazzadeh,
  • Sravan Mutyala,
  • Jaideep Chinthala,
  • Farnoosh Fotrousi and
  • Siamak Khatibi

27 March 2025

Blockchain technology is increasingly recognized as a promising solution for managing health-related data, particularly in promoting well-being through physical activity. This is becoming more significant as the Internet of Things (IoT) and sport mon...

  • Article
  • Open Access
15 Citations
11,378 Views
16 Pages

Digital Transformation of Land Services in Indonesia: A Readiness Assessment

  • Kusmiarto Kusmiarto,
  • Trias Aditya,
  • Djurdjani Djurdjani and
  • Subaryono Subaryono

27 January 2021

In 2020, digital transformation was a major theme to commemorate Indonesia’s main agrarian law’s anniversary. This theme is a reminder of the need to fully implement digital services to improve the quality of land registration products th...

  • Review
  • Open Access
8 Citations
5,519 Views
34 Pages

2 October 2021

Ambient Intelligence (AmI) encompasses technological infrastructures capable of sensing data from environments and extracting high-level knowledge to detect or recognize users’ features and actions, as well as entities or events in their surroundings...

  • Article
  • Open Access
1,880 Views
23 Pages

28 December 2023

The data hierarchical Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme implements multiple hierarchical data encryption of a single access policy, which reduces the computation and storage overhead. However, existing data hierarchical CP-...

  • Review
  • Open Access
3 Citations
14,527 Views
47 Pages

Blockchain’s promise of decentralised, tamper-resistant services is gaining real traction in three arenas: decentralized finance (DeFi), blockchain gaming, and data-driven analytics. These sectors span finance, entertainment, and information se...

  • Perspective
  • Open Access
910 Views
17 Pages

4 December 2025

Background: Attention-Deficit/Hyperactivity Disorder (ADHD) is a prevalent neurodevelopmental condition affecting children, adolescents, and adults worldwide. Despite evidence-based treatments, long-term functional outcomes remain variable due to het...

  • Article
  • Open Access
8 Citations
3,638 Views
22 Pages

Volunteers in the Smart City: Comparison of Contribution Strategies on Human-Centered Measures

  • Stefano Bennati,
  • Ivana Dusparic,
  • Rhythima Shinde and
  • Catholijn M. Jonker

31 October 2018

Provision of smart city services often relies on users contribution, e.g., of data, which can be costly for the users in terms of privacy. Privacy risks, as well as unfair distribution of benefits to the users, should be minimized as they undermine u...

  • Article
  • Open Access
3 Citations
2,980 Views
21 Pages

IoT Privacy Risks Revealed

  • Kai-Chih Chang,
  • Haoran Niu,
  • Brian Kim and
  • Suzanne Barber

29 June 2024

A user’s devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user’s devices. These IoT devices may or may not seek explicit user consent, thus leaving the...

  • Review
  • Open Access
1 Citations
4,483 Views
28 Pages

Brain–Computer Interfaces in Parkinson’s Disease Rehabilitation

  • Emmanuel Ortega-Robles,
  • Ruben I. Carino-Escobar,
  • Jessica Cantillo-Negrete and
  • Oscar Arias-Carrión

Parkinson’s disease (PD) is a progressive neurological disorder with motor and non-motor symptoms that are inadequately addressed by current pharmacological and surgical therapies. Brain–computer interfaces (BCIs), particularly those base...

  • Article
  • Open Access
10 Citations
5,573 Views
18 Pages

25 February 2025

Background: Mobile health (mHealth) applications have transformed healthcare delivery by enhancing accessibility, patient monitoring, and clinician communication. Despite these advantages, significant barriers hinder their adoption among healthcare p...

  • Article
  • Open Access
8 Citations
4,023 Views
30 Pages

29 October 2024

This study takes a unique approach by investigating the integration of Brain–Computer Interfaces (BCIs) and Building Information Modeling (BIM) within residential architecture. It explores their combined potential to foster neuro-responsive, su...

  • Article
  • Open Access
1 Citations
2,114 Views
15 Pages

Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer

  • Hao Zhang,
  • Yue Zhao,
  • Jintao Meng,
  • Xue Wang and
  • Kaijun Wu

1 November 2023

Attribute-based encryption enables users to flexibly exchange and share files with others. In these schemes, users utilize their own attributes to acquire public-private key pairs from the key generation center. However, achieving this for users who...

  • Article
  • Open Access
3,571 Views
28 Pages

This paper explored the temporary facilities created during the pandemic for use as COVID-19 test centers at Zaventem Airport, the main airport for the city of Brussels, Belgium. The possibilities of modular construction technology and the impact of...

  • Review
  • Open Access
64 Citations
12,527 Views
43 Pages

28 July 2022

Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains and controls their data in this model. When a service provider requests data from the user, the user sends it directly to the service provider, bypassing thir...

  • Article
  • Open Access
6 Citations
3,133 Views
25 Pages

GLPS: A Geohash-Based Location Privacy Protection Scheme

  • Bin Liu,
  • Chunyong Zhang,
  • Liangwei Yao and
  • Yang Xin

21 November 2023

With the development of mobile applications, location-based services (LBSs) have been incorporated into people’s daily lives and created huge commercial revenues. However, when using these services, people also face the risk of personal privacy...

  • Review
  • Open Access
2 Citations
2,387 Views
21 Pages

12 September 2025

Background: Healthcare organizations face major challenges in protecting staff health and ensuring business continuity, particularly in high-risk settings. Wearable technologies are emerging tools to monitor occupational health indicators, improve st...

  • Article
  • Open Access
2 Citations
1,957 Views
20 Pages

30 November 2023

The pursuit of environmental sustainability, energy conservation, and emissions reduction has become a global focal point. Electricity is the primary source of energy in our daily lives. Through the analysis of smart power systems, we can efficiently...

  • Article
  • Open Access
21 Citations
2,228 Views
16 Pages

Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic

  • Nour Bahbouh,
  • Abdullah Basahel,
  • Sandra Sendra and
  • Adnan Ahmed Abi Sen

22 December 2022

Privacy and security are unavoidable challenges in the future of smart health services and systems. Several approaches for preserving privacy have been provided in the Internet of Health Things (IoHT) applications. However, with the emergence of COVI...

  • Article
  • Open Access
10 Citations
3,698 Views
15 Pages

19 April 2022

Smart grids integrate modern Internet of Things technologies with the traditional grid systems, aiming to achieve effective and reliable electricity distribution as well as promote clean energy development. Nowadays, it is an indispensable infrastruc...

  • Article
  • Open Access
22 Citations
3,043 Views
19 Pages

An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality

  • Kranthi Kumar Singamaneni,
  • Ali Nauman,
  • Sapna Juneja,
  • Gaurav Dhiman,
  • Wattana Viriyasitavat,
  • Yasir Hamid and
  • Joseph Henry Anajemba

28 October 2022

Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It is accountable for data management and processing through virtual machines and is independent of end users’ syst...

  • Feature Paper
  • Article
  • Open Access
23 Citations
4,908 Views
17 Pages

Video surveillance systems (VSS), used as a measure of security strengthening as well as investigation, are provided principally in heavily crowded public places. They record images of moving objects and transmit them to the control center. Typically...

  • Article
  • Open Access
15 Citations
4,544 Views
18 Pages

The Metaverse brings together components of parallel processing computing platforms, the digital development of physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties to...

  • Article
  • Open Access
16 Citations
1,528 Views
15 Pages

30 December 2023

Safeguarding the data collected by smart meters is essential because the disclosure of this information may threaten the privacy of the consumer. By obtaining them, hackers can find out the behavior of the person and use that information for maliciou...

  • Systematic Review
  • Open Access
2,047 Views
37 Pages

Background: The increasing prevalence of dementia and mild cognitive impairment (MCI) among the elderly population is a global health issue. Information and Communication Technology (ICT)-based interventions hold promises for maintaining cognition, b...

  • Article
  • Open Access
60 Citations
7,626 Views
24 Pages

Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System

  • P. Chinnasamy,
  • P. Deepalakshmi,
  • Ashit Kumar Dutta,
  • Jinsang You and
  • Gyanendra Prasad Joshi

26 December 2021

People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cloud servers...

  • Article
  • Open Access
18 Citations
3,605 Views
15 Pages

1 January 2023

The extensive application of the Internet of Things in the industrial field has formed the industrial Internet of Things (IIoT). By analyzing and training data from the industrial Internet of Things, intelligent manufacturing can be realized. Due to...

of 2