Personalised information retrieval: survey and classification

MR Ghorab, D Zhou, A O'connor, V Wade - User Modeling and User …, 2013 - Springer
Abstract Information Retrieval (IR) systems assist users in finding information from the
myriad of information resources available on the Web. A traditional characteristic of IR …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

A decision-support framework for data anonymization with application to machine learning processes

L Caruccio, D Desiato, G Polese, G Tortora… - Information …, 2022 - Elsevier
The application of machine learning techniques to large and distributed data archives might
result in the disclosure of sensitive information about the data subjects. Data often contain …

Privacy-aware cloud service composition based on QoS optimization in Internet of Things

P Asghari, AM Rahmani, HHS Javadi - Journal of Ambient Intelligence and …, 2022 - Springer
With the advent of Internet of Things (IoT), cloud service composition problem has gotten
more complex along with the composition of large number of cloud services and numerous …

A machine learning solution to assess privacy policy completeness: (short paper)

E Costante, Y Sun, M Petković… - Proceedings of the 2012 …, 2012 - dl.acm.org
A privacy policy is a legal document, used by websites to communicate how the personal
data that they collect will be managed. By accepting it, the user agrees to release his data …

Linking data and process perspectives for conformance analysis

M Alizadeh, X Lu, D Fahland, N Zannone… - Computers & …, 2018 - Elsevier
The detection of data breaches has become a major challenge for most organizations. The
problem lies in the fact that organizations often lack proper mechanisms to control and …

[HTML][HTML] An analysis of the strategies for overcoming digital supply chain implementation barriers

VK Dixit, RK Malviya, V Kumar, R Shankar - Decision Analytics Journal, 2024 - Elsevier
This study aims to identify and prioritize the strategies for overcoming digital supply chain
(DSC) implementation barriers. Twenty-five DSC barriers and seventeen DSC strategies are …

A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies

H Ibrahim - Wasit Journal of Computer and Mathematics …, 2022 - wjcm.uowasit.edu.iq
There is no doubting that contemporary technology creates new hazards, and these threats
are many and significant, directly harming people's lives and threatening their stability …

[PDF][PDF] A critical review of 10 years of privacy technology

G Danezis, S Gürses - Proceedings of surveillance cultures …, 2010 - fahrplan.events.ccc.de
This paper is still being revised. It will eventually appear in the proceedings of the 2010
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …