An extensive study on the evolution of context-aware personalized travel recommender systems

S Renjith, A Sreekumar, M Jathavedan - Information Processing & …, 2020 - Elsevier
Ever since the beginning of civilization, travel for various causes exists as an essential part
of human life so as travel recommendations, though the early form of recommendations …

Are we aware? an empirical study on the privacy and security awareness of smartphone sensors

AI Champa, MF Rabbi, FZ Eishita… - 2023 IEEE/ACIS 21st …, 2023 - ieeexplore.ieee.org
Smartphones are equipped with a wide variety of sensors, which can pose significant
security and privacy risks if not properly protected. To assess the privacy and security risks of …

SeCoMan: A semantic-aware policy framework for developing privacy-preserving and context-aware smart applications

AH Celdrán, FJG Clemente, MG Pérez… - IEEE Systems …, 2014 - ieeexplore.ieee.org
This paper is intended to provide a solution for developing context-aware smart applications
preserving the users' privacy in the Internet of Things (IoT). In this sense, we present a …

Knowledge management and social media: A scientometrics survey

E Zarei, A Jabbarzadeh - International Journal of Data and …, 2019 - m.growingscience.com
The purpose of this research is to study the role of the social media for knowledge sharing.
The study presents a comprehensive review of the researches associated with the effect of …

Context sensitive access control in smart home environments

S Dutta, SSL Chukkapalli, M Sulgekar… - 2020 IEEE 6th Intl …, 2020 - ieeexplore.ieee.org
The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and
security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart …

Privacy leakage in mobile computing: Tools, methods, and characteristics

M Haris, H Haddadi, P Hui - arXiv preprint arXiv:1410.4978, 2014 - arxiv.org
The number of smartphones, tablets, sensors, and connected wearable devices are rapidly
increasing. Today, in many parts of the globe, the penetration of mobile computers has …

Securing enterprise data on smartphones using run time information flow control

P Kodeswaran, V Nandakumar… - 2012 IEEE 13th …, 2012 - ieeexplore.ieee.org
There is an increasing penetration of smart phones within enterprises. Most smart phone
users now run both enterprise as well as personal applications simultaneously on their …

User-centric social context information management: an ontology-based approach and platform

MA Kabir, J Han, J Yu, A Colman - Personal and Ubiquitous Computing, 2014 - Springer
Social context information has been used with encouraging results in developing socially
aware applications in different domains. However, users' social context information is …

Privacy control in smart phones using semantically rich reasoning and context modeling

D Ghosh, A Joshi, T Finin… - 2012 IEEE symposium on …, 2012 - ieeexplore.ieee.org
We present our ongoing work on user data and contextual privacy preservation in mobile
devices through semantic reasoning. Recent advances in context modeling, tracking and …

PRECISE: Privacy-aware recommender based on context information for cloud service environments

AH Celdrán, MG Pérez, FJG Clemente… - IEEE …, 2014 - ieeexplore.ieee.org
Context-aware systems based on location open up new possibilities to users in terms of
acquiring custom services by gathering context information, especially in systems where the …