Towards a privacy impact assessment methodology to support the requirements of the general data protection regulation in a big data analytics context: A systematic …

G Georgiadis, G Poels - Computer Law & Security Review, 2022 - Elsevier
Abstract Big Data Analytics enables today's businesses and organisations to process and
utilise the raw data that is generated on a daily basis. While Big Data Analytics has improved …

Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city

MS Rahman, MAP Chamikara, I Khalil… - Journal of Industrial …, 2022 - Elsevier
We propose a hierarchical blockchain-based platform for ensuring the integrity of smart city
Internet-of-Things (IoT) data and blockchain interoperability in this paper. The well-defined …

Data governance taxonomy: Cloud versus non-cloud

M Al-Ruithe, E Benkhelifa, K Hameed - Sustainability, 2018 - mdpi.com
Forward-thinking organisations believe that the only way to solve the data problem is the
implementation of effective data governance. Attempts to govern data have failed before, as …

Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches

MJ Rooney, Y Levy, W Li, A Kumar - Information & Computer Security, 2024 - emerald.com
Purpose The increased use of Information Systems (IS) as a working tool for employees
increases the number of accounts and passwords required. Despite being more aware of …

[PDF][PDF] History of information: the case of privacy and security in social media

D Gritzalis, M Kandias, V Stavrou… - Proc. of the History of …, 2014 - infosec.aueb.gr
Web 2.0 and Social media have widened society's opportunities for communication
amusement and networking, while enabling internet users to contribute online content. The …

Securing resources in decentralized cloud storage

E Bacis, SDC di Vimercati, S Foresti… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Decentralized cloud storage services represent a promising opportunity for a different cloud
market, meeting the supply and demand for IT resources of an extensive community of …

Assurance of security and privacy requirements for cloud deployment models

S Islam, M Ouedraogo, C Kalloniatis… - … on Cloud Computing, 2015 - ieeexplore.ieee.org
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are
challenges specifically related to security and privacy. It is important that cloud users …

A risk management framework for cloud migration decision support

S Islam, S Fenz, E Weippl, H Mouratidis - Journal of Risk and Financial …, 2017 - mdpi.com
Managing risks is of paramount importance for enabling a widespread adoption of cloud
computing. Users need to understand the risks associated with the process of migrating …

A study on design requirement development and satisfaction for future virtual world systems

B Shen, W Tan, J Guo, H Cai, B Wang, S Zhuo - Future Internet, 2020 - mdpi.com
Virtual worlds have become global platforms connecting millions of people and containing
various technologies. For example, No Man's Sky (nomanssky. com), a cross-platform virtual …

Analysing potential data security losses in organisations based on subsequent users logins

B Aziz - Plos one, 2023 - journals.plos.org
Multi-user computer environments pose potential threats to users data in organisations, in
that unauthorised subsequent users who log on to the same computer could leak, alter or …