Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Ethical and privacy principles for learning analytics

A Pardo, G Siemens - British journal of educational technology, 2014 - Wiley Online Library
The massive adoption of technology in learning processes comes with an equally large
capacity to track learners. Learning analytics aims at using the collected information to …

Privacy in the Internet of Things: threats and challenges

JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and
cooperation of smart things over the current and future Internet infrastructure. The Internet of …

Privacy design strategies

JH Hoepman - IFIP International Information Security Conference, 2014 - Springer
In this paper we define the notion of a privacy design strategy. These strategies help IT
architects to support privacy by design early in the software development life cycle, during …

" I need a better description": An Investigation Into User Expectations For Differential Privacy

R Cummings, G Kaptchuk, EM Redmiles - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Despite recent widespread deployment of differential privacy, relatively little is known about
what users think of differential privacy. In this work, we seek to explore users' privacy …

Privacy, security and trust in cloud computing

S Pearson - Privacy and security for cloud computing, 2012 - Springer
Cloud computing refers to the underlying infrastructure for an emerging model of service
provision that has the advantage of reducing cost by sharing computing and storage …

Research note—effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services

H Xu, HH Teo, BCY Tan… - Information systems …, 2012 - pubsonline.informs.org
This study seeks to clarify the nature of control in the context of information privacy to
generate insights into the effects of different privacy assurance approaches on context …

A hybrid solution for privacy preserving medical data sharing in the cloud environment

JJ Yang, JQ Li, Y Niu - Future Generation computer systems, 2015 - Elsevier
Storing and sharing of medical data in the cloud environment, where computing resources
including storage is provided by a third party service provider, raise serious concern of …

Cybersecurity and privacy solutions in smart cities

R Khatoun, S Zeadally - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
The increasing proliferation and deployment of ICT in the infrastructure of cities has
increased interest in smart cities. The long-term objective of a smart city is to enhance the …