{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:48:07Z","timestamp":1772041687383,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/sds64317.2024.10883898","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:19:35Z","timestamp":1739902775000},"page":"80-88","source":"Crossref","is-referenced-by-count":7,"title":["Balancing Usability and Protection in AI and Data Security: A Human-Centric Approach"],"prefix":"10.1109","author":[{"given":"Mohammed Jassim","family":"Al Ansari","sequence":"first","affiliation":[{"name":"University of Central Lancashire,School of Business,Preston,UK"}]},{"given":"Yazan","family":"Al Ahmed","sequence":"additional","affiliation":[{"name":"Al Ain University,Faculty of Engineering,Abu Dhabi,U.A.E."}]},{"given":"Hadeel Hesham","family":"El Bahnaswi","sequence":"additional","affiliation":[{"name":"Al Ain University,Faculty of Engineering,Abu Dhabi,U.A.E."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3011208"},{"key":"ref2","article-title":"ai privacy: AI and Privacy: The privacy concerns surrounding AI, its potential impact on personal data - The Economic Times"},{"key":"ref3","article-title":"Risks of AI & Cybersecurity | Risks of Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2020.3032074"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0029-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app11010367"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105297"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101805"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169137"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1799-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2196\/22959"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsm.2023.06.001"},{"key":"ref14","article-title":"(PDF) Qualitative Exploration of AI\u2019s Influence on E-commerce Satisfaction in C2C Platforms: A WEBQUAL Framework Perspective"},{"issue":"12","key":"ref15","first-page":"7082","article-title":"Re-Thinking Data Strategy and Integration for Artificial Intelligence: Concepts, Opportunities, and Challenges","volume":"13","author":"Re-Thinking","year":"2023","journal-title":"Appl. Sci. 2023, Vol. 13, Page 7082"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/20552076231177144"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804"},{"key":"ref20","article-title":"Balancing Security and Privacy in the Age of Artificial Intelligence: A Global Challenge"},{"key":"ref21","article-title":"(PDF) AI and Predictive Analytics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2024.100215"},{"key":"ref23","article-title":"What Is Human-Centered AI (HCAI)? \u2014 updated 2024 | IxDF"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1702071"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app12115672"},{"key":"ref26","article-title":"Artificial intelligence usage in multi-factor authentication | Blog - Future Processing"},{"key":"ref27","article-title":"What Is Human-Centered AI (HCAI)? \u2014 updated 2024 | IxDF"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081920"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2017.05.015"},{"key":"ref30","article-title":"Data security in AI systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0300-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2022.2025545"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900275"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046325"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14704\/WEB\/V18SI04\/WEB18140"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.53664"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCNA63144.2024.10703950"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNS58795.2023.10192993"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS60348.2023.10375450"},{"issue":"3","key":"ref40","first-page":"3034","article-title":"Bridging the Gap Between Ethical AI Implementations","volume-title":"International Journal of membrane science and technology","volume":"10","author":"Alahmed","year":"2023"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT58888.2023.10453850"}],"event":{"name":"2024 11th International Conference on Software Defined Systems (SDS)","location":"Gran Canaria, Spain","start":{"date-parts":[[2024,12,9]]},"end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 11th International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10883772\/10883884\/10883898.pdf?arnumber=10883898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:13Z","timestamp":1740081913000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10883898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/sds64317.2024.10883898","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}