[HTML][HTML] A new approach to web application security: Utilizing gpt language models for source code inspection

Z Szabó, V Bilicki - Future Internet, 2023 - mdpi.com
Due to the proliferation of large language models (LLMs) and their widespread use in
applications such as ChatGPT, there has been a significant increase in interest in AI over the …

[HTML][HTML] Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter

N Pattnaik, S Li, JRC Nurse - Computers & Security, 2023 - Elsevier
Many researchers have studied non-expert users' perspectives of cyber security and privacy
aspects of computing devices at home, but their studies are mostly small-scale empirical …

An investigation into the sensitivity of personal information and implications for disclosure: a UK perspective

R Belen-Saglam, JRC Nurse, D Hodges - Frontiers in Computer …, 2022 - frontiersin.org
The perceived sensitivity of information is a crucial factor in both security and privacy
concerns and the behaviors of individuals. Furthermore, such perceptions motivate how …

The Regulation of Personal and Non-Personal Data in the Context of Big Data

D Supriyadi - Journal of Human Rights, Culture and Legal System, 2023 - jhcls.org
Data protection laws provide minimum protections for personal data, as well as facilitate the
free flow of such data, by setting out principles and rules for legitimate data processing. In …

Understanding Chinese Internet users' information sensitivity in big data and artificial intelligence era

X Chen, P Zheng, J Mou - Policy & Internet, 2024 - Wiley Online Library
The online environment has evolved with the development of emerging information
technologies. In response to rising voices discussing the boundaries of collecting and using …

A novel 1-dimensional cosine chaotic equation and digital image encryption technique

F Ullah, M Faheem, MA Hashmi, R Bashir… - IEEE …, 2024 - ieeexplore.ieee.org
In the 21st century, the digital era, chaotic systems become the backbone in designing the
secure ciphers for image cryptography because of their intrinsic features like dynamical …

Privacy and security evaluation of mobile payment applications through user-generated reviews

U Kishnani, N Noah, S Das, R Dewri - … of the 21st Workshop on Privacy …, 2022 - dl.acm.org
Mobile payment applications are crucial to ensure seamless day-to-day digital transactions.
However, users' perceived privacy-and security-related concerns are continually rising …

PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm

S Madhusudhanan, AC Jose, J Sahoo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper proposes a novel agglomerated privacy-preservation model integrated with data
mining and evolutionary Genetic Algorithm (GA). Privacy-pReservIng with Minimum Epsilon …

Formation of the institute of personal data protection and experience of its implementation in the countries of the EU

B Yakymenko - Scientific Journal of the National Academy of …, 2023 - lawscience.com.ua
The development of digital technologies in the modern world led to an increase in
interference in the private life of a person and the number of human rights violations related …

The Role of Information and Communication Technology in Improving the Efficiency of Human Resource Management Administration

S Sutrisno - Jurnal Minfo Polgan, 2023 - jurnal.polgan.ac.id
The use of ICT has fundamentally changed the way organisations work and operate in
various sectors, including HRM. Along with technological advancements, organisations …