A map** of IoT user-centric privacy preserving approaches to the GDPR

AD Kounoudes, GM Kapitsaki - Internet of Things, 2020 - Elsevier
The vast amount of personal data collected and shared in the Internet of Things (IoT) is
causing increasing concerns regarding the user privacy in IoT. The recently introduced …

Adoption of Metaverse in South East Asia: Vietnam, Indonesia, Malaysia

HLC Julian, T Chung, Y Wang - Strategies and Opportunities for …, 2023 - igi-global.com
Despite massive support for blockchain startups, countries in Southeast Asia have yet to fully
launch themselves into metaverse. The appeal of playing lucrative crypto games such as …

IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey

S Patidar, N Kumar, R **dal - Wireless Personal Communications, 2024 - Springer
Massive data management or data stream handling has become a prominent study topic as
a result of recent breakthroughs in the Internet of Things (IoT). With the developments in big …

A social economic analysis of the impact of GDPR on security and privacy practices

R Layton, S Elaluf-Calderwood - 2019 12th CMI Conference on …, 2019 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA) have been presented by many policymakers as fundamental, welfare enhancing …

On the Contents and Utility of IoT Cybersecurity Guidelines

J Chen, D Anandayuvaraj, JC Davis… - Proceedings of the ACM …, 2024 - dl.acm.org
Cybersecurity concerns of Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT security guidelines to …

[Retracted] Economic Information Analysis and Its Application in Decision‐Making under the Background of Big Data

S Chen, I Sanweng - Mobile Information Systems, 2021 - Wiley Online Library
In the Internet age, data information is expanding at an alarming rate, and at the same time,
it is showing a trend of diversification and fragmentation. How to make reasonable use of …

More than malware: unmasking the hidden risk of cybersecurity regulations

M Kianpour, S Raza - International Cybersecurity Law Review, 2024 - Springer
Cybersecurity investments are made within a complex and ever-evolving environment,
where regulatory changes represent a significant risk factor. While cybersecurity regulations …

Federated Learning for 6G Networks: Navigating Privacy Benefits and Challenges

C Sandeepa, E Zeydan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The upcoming Sixth Generation (6G) networks aim for fully automated, intelligent network
functionalities and services. Therefore, Machine Learning (ML) is essential for these …

Public procurement of smart city services: an exploration of data protection related ex ante transaction costs

L Vandercruysse, M Dooms, C Buts - Digital Policy, Regulation and …, 2024 - emerald.com
Purpose This paper examines data protection related ex ante transaction costs borne by the
private sector in the context of smart city service (SCS) public tendering in the European …

A Unified Taxonomy and Evaluation of IoT Security Guidelines

J Chen, D Anandayuvaraj, JC Davis… - arxiv preprint arxiv …, 2023 - arxiv.org
Cybersecurity concerns about Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT cybersecurity …