Suggested Topics within your search.
Suggested Topics within your search.
-
641
Students’ Perceptions of AI Digital Assistants (AIDAs): Should Institutions Invest in Their Own AIDAs?
Published 2025-04-01“…A cluster analysis identified three distinct student groups of highly critical, supportive, and keenly supportive learners, with key differences based on prior GenAI experience, educational background, and age. …”
Get full text
Article -
642
Unmasking privacy apprehension: A bibliometric review of mobile sharing economy applications
Published 2025-01-01“…This research identifies the key contributors and knowledge concerning privacy apprehensions and mobile sharing economy apps. …”
Get full text
Article -
643
Greening the justice system: assessing the legality, feasibility, and potential of artificial intelligence in advancing environmental sustainability within the Indian judiciary
Published 2025-05-01“…While AI integration shows significant promise in reducing environmental impact and improving judicial efficiency, the study identifies key challenges including the need for comprehensive legislation governing AI use in judiciary, substantial infrastructure requirements, and data privacy concerns. …”
Get full text
Article -
644
Carbon dioxide pipelines are disproportionally located in marginalized communities in the United States
Published 2025-05-01“…However, as this network grows, concerns about safety and environmental justice intensify, due to insufficient regulations that may disproportionately expose marginalized communities to risks. …”
Get full text
Article -
645
-
646
Effects of armed conflict on maternal and infant health: a mixed-methods study of Armenia and the 2020 Nagorno-Karabakh war
Published 2023-12-01“…Weekly average COVID-19 cases increased sevenfold during the 2020 Nagorno-Karabakh war. Key informants expressed concerns about the effects of stress and grief on maternal health and pregnancy outcomes and recommended investing in healthcare system reform. …”
Get full text
Article -
647
Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a...
Published 2025-04-01“…Although privacy remains a key issue, these fears can be effectively managed by restricting public reporting on performance to only what is essential for public assurance.…”
Get full text
Article -
648
LLM-Based Response Generation for Korean Adolescents: A Study Using the NAVER Knowledge iN Q&A Dataset with RAG
Published 2025-04-01“…Results RAG-based responses outperformed non-RAG responses across all evaluation metrics. Key findings indicate that RAG-based responses delivered more specific, empathetic, and actionable guidance, particularly when addressing complex emotional and situational concerns. …”
Get full text
Article -
649
Appropriately Matching Transport Care Units to Patients in Interhospital Transport Care: Implementation Study
Published 2024-12-01“…Performance was evaluated through key performance indicators such as data transaction times and scalability across transaction loads. …”
Get full text
Article -
650
Determinants of Ukrainian Mothers’ Intentions to Vaccinate Their Children in Poland: A Cross-Sectional Study
Published 2025-03-01“…The questionnaire assessed the importance placed on vaccination, knowledge of PNIP, and concerns related to displacement and vaccination. Hierarchical logistic regression identified key determinants. …”
Get full text
Article -
651
313 Engaging minority and vulnerable communities in genomic research: Navigating ethical, cultural, and practical considerations
Published 2025-04-01“…The proposed study also identifies key barriers to participation, such as mistrust of the research process and concerns about data privacy, which must be addressed to enhance community engagement. …”
Get full text
Article -
652
A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency
Published 2024-08-01Get full text
Article -
653
Complexities of the global plastics supply chain revealed in a trade-linked material flow analysis
Published 2025-04-01Get full text
Article -
654
Unique Optoelectronic Properties and Applications of Lead‐Free Perovskites and Derivatives
Published 2025-02-01Get full text
Article -
655
Application of Waste Tire Carbon for Iron-Containing Dust Reduction in Industrial Processes
Published 2025-06-01Get full text
Article -
656
Cyber Security for Smart Grid, Cryptography, and Privacy
Published 2011-01-01“…We will also see cryptography and key management techniques that are required to overcome these attacks. …”
Get full text
Article -
657
Mooting and Technology: To What Extent Does Using Technology Improve the Mooting Experience for Students?
Published 2010-01-01“…This paper reports on qualitative research into academics perceptions of assessment in an Australian law school. Some of the key concerns of academics teaching a professional degree course in the current higher education environment, in particular as it impacts on their assessment practices and student learning, are highlighted and discussed. …”
Get full text
Article -
658
Blockchain Applications in Higher Education Based on the NIST Cybersecurity Framework
Published 2024-02-01“…It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. …”
Get full text
Article -
659
EXAMINING THE RELATIONSHIP BETWEEN SUSTAINABLE DEVELOPMENT AND DIGITAL LEADERSHIP USING BIBLIOMETRIC ANALYSIS METHOD
Published 2024-10-01“…However, challenges like environmental concerns and the digital divide persist. Key themes in the literature include innovation, impact, management, and transformational leadership, with journals like Sustainability publishing high impact research. …”
Get full text
Article -
660
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model
Published 2016-01-01Get full text
Article