The general data protection regulation in the age of surveillance capitalism

J Andrew, M Baker - Journal of Business Ethics, 2021 - Springer
Clicks, comments, transactions, and physical movements are being increasingly recorded
and analyzed by Big Data processors who use this information to trace the sentiment and …

EdgeCare: Leveraging edge computing for collaborative data management in mobile healthcare systems

X Li, X Huang, C Li, R Yu, L Shu - IEEE Access, 2019 - ieeexplore.ieee.org
With the wide application of mobile healthcare systems, the total amount of healthcare data
is ever increasing rapidly as users interact with healthcare service providers frequently. This …

Community-structured evolutionary game for privacy protection in social networks

J Du, C Jiang, KC Chen, Y Ren… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social networks have attracted billions of users and supported a wide range of interests and
practices. Users of social networks can be connected with each other by different …

Trust-based collaborative privacy management in online social networks

L Xu, C Jiang, N He, Z Han… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. One …

Adaptive k-Anonymity Approach for Privacy Preserving in Cloud

K Arava, S Lingamgunta - Arabian Journal for Science and Engineering, 2020 - Springer
Data privacy is very essential attribute for information sharing in cloud applications. Many
end users find it challenging to adopt advanced technologies of cloud services, such as …

Integration of data mining and business intelligence in big data analytics: A research agenda on scholarly publications

A Kulakli - … Challenges for Analytics, Business Intelligence, and …, 2021 - igi-global.com
The purpose of this chapter is to analyze and explore the research studies for scholarly
publication trends and patterns related to the integration of data mining in particular …

Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards

L Xu, C Jiang, Y Qian, Y Zhao, J Li… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recently, the conflict between exploiting the value of personal data and protecting
individuals' privacy has attracted much attention. Personal data market provides a promising …

A multifactor ring signature based authentication scheme for quality assessment of iomt environment in covid-19 scenario

K Chatterjee, A Singh, Neha, K Yu - ACM Journal of Data and …, 2023 - dl.acm.org
The quality of the healthcare environment has become an essential factor for healthcare
users to access quality services. Smart healthcare systems use the Internet of Medical …

Human-in-the-loop mobile networks: A survey of recent advancements

L Duan, L Huang, C Langbort… - Ieee journal on …, 2017 - ieeexplore.ieee.org
Recent developments of smart devices and mobile applications have significantly increased
the level at which human users interact with mobile systems. As a result, human activities …

Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system

L Xu, C Jiang, N He, Y Qian, Y Ren… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With the growing popularity of mobile social networks, point-of-interest (POI)
recommendation, which utilizes users' check-in data to suggest interesting places for users …