A systematic review of crime facilitated by the consumer Internet of Things

JM Blythe, SD Johnson - Security Journal, 2021 - Springer
The nature of crime is changing—estimates suggest that at least half of all crime is now
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …

A recommendation approach for user privacy preferences in the fitness domain

OR Sanchez, I Torre, Y He, BP Knijnenburg - User Modeling and User …, 2020 - Springer
Fitness trackers are undoubtedly gaining in popularity. As fitness-related data are
persistently captured, stored, and processed by these devices, the need to ensure users' …

Cyanobacterial risk prevention under global warming using an extended Bayesian network

P Jiang, X Liu, J Zhang, SH Te, KYH Gin… - Journal of Cleaner …, 2021 - Elsevier
Cyanobacterial blooms under global warming are increasing worldwide, producing
emerging contaminants, which threaten the health of human beings and aquatic …

Enhancing user awareness on inferences obtained from fitness trackers data

A Dini Kounoudes, GM Kapitsaki, I Katakis - User Modeling and User …, 2023 - Springer
In the IoT era, sensitive and non-sensitive data are recorded and transmitted to multiple
service providers and IoT platforms, aiming to improve the quality of our lives through the …

Leaking data from enterprise networks using a compromised smartwatch device

S Siboni, A Shabtai, Y Elovici - Proceedings of the 33rd Annual ACM …, 2018 - dl.acm.org
The recent proliferation of the Internet of Things (IoT) technology poses major security and
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …

Heart Rate-Based Identification of Users of IoT Wearables: A Supervised Learning Approach

SAJ Desa, B Suleiman, W Yaqub - International Conference on …, 2023 - Springer
Biometric identification from heart rate sequences provides a simple yet effective
mechanism, that can neither be reverse engineered nor replicated, to protect user privacy …

An attack scenario and mitigation mechanism for enterprise BYOD environments

S Siboni, A Shabtai, Y Elovici - ACM SIGAPP Applied Computing …, 2018 - dl.acm.org
The recent proliferation of the Internet of Things (IoT) technology poses major security and
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …

A Framework to Support Users' Privacy Preferences in the Proliferation of IoT

OR Sanchez - 2019 - tesidottorato.depositolegale.it
In the proliferation of personal IoT devices, the need for privacy protection becomes an
increasing concern. User's privacy preferences are not being respected in today's complex …

Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams.

D Zemeckytė - 2021 - epubl.ktu.edu
Abstract [eng] The use of smartphones is increasing every year. We do not just use them to
call or otherwise connect with friends or loved ones. These devices have practically become …

Personlig integritet i aktivitetsmätare

M Castmo - 2017 - diva-portal.org
Studien undersöker och sammanfattar vad det finns för risker i samband med användandet
av aktivitetsmätare, så som aktivitetsarmband och smartwatches. Det finns många studier …