An analytical review of industrial privacy frameworks and regulations for organisational data sharing

SR Ghorashi, T Zia, M Bewong, Y Jiang - Applied Sciences, 2023 - mdpi.com
This study examines the privacy protection challenges in data sharing between
organisations and third-party entities, focusing on changing collaborations in the digital age …

A new scheme for ransomware classification and clustering using static features

B Yamany, MS Elsayed, AD Jurcut, N Abdelbaki… - Electronics, 2022 - mdpi.com
Ransomware is a strain of malware that disables access to the user's resources after
infiltrating a victim's system. Ransomware is one of the most dangerous malware …

[HTML][HTML] A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system

D An, D Hao, R Zhao, J Lu, Y Li, Y Zhang - Journal of King Saud University …, 2023 - Elsevier
As the saying goes, one image is worth ten thousand words. Because of the rich visual
information carried by the image itself, previewers can easily find what they need. On the …

Multi-Party Secured Collaboration Architecture from Cloud to Edge

R Gafni, I Aviv, D Haim - Journal of Computer Information Systems, 2023 - Taylor & Francis
ABSTRACT Distributed Federated Collaboration Secured Services is a proposed novel
secure distributed Unified Communication and Collaboration (UCC) reference architecture …

Unified Communication: What do Digital Activists need?

T Reisinger, I Wagner, EA Boiten - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Digital activists use tools and platforms such as Facebook, WhatsApp, and Twitter to
organize networked protest. However, these tools appear to lack the necessary features to …

Securing user privacy in cloud-based whiteboard services against health attribute inference attacks

AR Shahid, A Imteaj - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
Cloud-based whiteboard services have gained immense popularity, facilitating seamless
collaboration and communication. However, the open-ended and persistent nature of …

Interplay of Security, Privacy and Usability in Videoconferencing

L Weinberger, C Eichenmüller… - Extended Abstracts of the …, 2023 - dl.acm.org
In the period from August to October 2022, we conducted an online survey concerning users'
perception and use of videoconferencing systems. We collected and analyzed a total of 245 …

Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System

R Maleckas, KG Paterson, MR Albrecht - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Jitsi Meet is an open-source video conferencing system, and a popular alternative to
proprietary services such as Zoom and Google Meet. The Jitsi project makes strong privacy …

How to dissolve the “privacy paradox” in social networks? A game approach based on privacy calculus

X Zhang, Y Cai, F Liu, F Zhou - Kybernetes, 2024 - emerald.com
Purpose This paper aims to propose a solution for dissolving the “privacy paradox” in social
networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning …

Exploring the General Data Protection Regulation (GDPR) compliance in cloud services: insights from Swedish public organizations on privacy compliance

A Issaoui, J Örtensjö, MS Islam - Future Business Journal, 2023 - Springer
The adoption of cloud services offers manifold advantages to public organizations; however,
ensuring data privacy during data transfers has become increasingly complex since the …