Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

Information privacy research: an interdisciplinary review

HJ Smith, T Dinev, H Xu - MIS quarterly, 2011 - JSTOR
To date, many important threads of information privacy research have developed, but these
threads have not been woven together into a cohesive fabric. This paper provides an …

[图书][B] The data revolution: Big data, open data, data infrastructures and their consequences

R Kitchin - 2014 - books.google.com
" Carefully distinguishing between big data and open data, and exploring various data
infrastructures, Kitchin vividly illustrates how the data landscape is rapidly changing and …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

An identity-authentication system using fingerprints

AK Jain, L Hong, S Pankanti, R Bolle - Proceedings of the IEEE, 1997 - ieeexplore.ieee.org
Fingerprint verification is an important biometric technique for personal identification. We
describe the design and implementation of a prototype automatic identity-authentication …

[图书][B] Principles of cybercrime

J Clough - 2015 - books.google.com
Digital technology has transformed the way in which we socialise and do business. Proving
the maxim that crime follows opportunity, virtually every advance has been accompanied by …

[图书][B] Guide to biometrics

RM Bolle, JH Connell, S Pankanti, NK Ratha… - 2013 - books.google.com
Starting with fingerprints more than a hundred years ago, there has been ongoing research
in biometrics. Within the last forty years face and speaker recognition have emerged as …

Integrating faces and fingerprints for personal identification

L Hong, A Jain - IEEE transactions on pattern analysis and …, 1998 - ieeexplore.ieee.org
An automatic personal identification system based solely on fingerprints or faces is often not
able to meet the system performance requirements. We have developed a prototype …

[图书][B] The governance of privacy: Policy instruments in global perspective

CJ Bennett, CD Raab - 2017 - taylorfrancis.com
This book was published in 2003. This book offers a broad and incisive analysis of the
governance of privacy protection with regard to personal information in contemporary …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …