A map** of IoT user-centric privacy preserving approaches to the GDPR
AD Kounoudes, GM Kapitsaki - Internet of Things, 2020 - Elsevier
The vast amount of personal data collected and shared in the Internet of Things (IoT) is
causing increasing concerns regarding the user privacy in IoT. The recently introduced …
causing increasing concerns regarding the user privacy in IoT. The recently introduced …
Adoption of Metaverse in South East Asia: Vietnam, Indonesia, Malaysia
HLC Julian, T Chung, Y Wang - Strategies and Opportunities for …, 2023 - igi-global.com
Despite massive support for blockchain startups, countries in Southeast Asia have yet to fully
launch themselves into metaverse. The appeal of playing lucrative crypto games such as …
launch themselves into metaverse. The appeal of playing lucrative crypto games such as …
IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey
Massive data management or data stream handling has become a prominent study topic as
a result of recent breakthroughs in the Internet of Things (IoT). With the developments in big …
a result of recent breakthroughs in the Internet of Things (IoT). With the developments in big …
A social economic analysis of the impact of GDPR on security and privacy practices
R Layton, S Elaluf-Calderwood - 2019 12th CMI Conference on …, 2019 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA) have been presented by many policymakers as fundamental, welfare enhancing …
(CCPA) have been presented by many policymakers as fundamental, welfare enhancing …
On the Contents and Utility of IoT Cybersecurity Guidelines
Cybersecurity concerns of Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT security guidelines to …
each year. In response, organizations worldwide have published IoT security guidelines to …
[Retracted] Economic Information Analysis and Its Application in Decision‐Making under the Background of Big Data
S Chen, I Sanweng - Mobile Information Systems, 2021 - Wiley Online Library
In the Internet age, data information is expanding at an alarming rate, and at the same time,
it is showing a trend of diversification and fragmentation. How to make reasonable use of …
it is showing a trend of diversification and fragmentation. How to make reasonable use of …
More than malware: unmasking the hidden risk of cybersecurity regulations
Cybersecurity investments are made within a complex and ever-evolving environment,
where regulatory changes represent a significant risk factor. While cybersecurity regulations …
where regulatory changes represent a significant risk factor. While cybersecurity regulations …
Federated Learning for 6G Networks: Navigating Privacy Benefits and Challenges
The upcoming Sixth Generation (6G) networks aim for fully automated, intelligent network
functionalities and services. Therefore, Machine Learning (ML) is essential for these …
functionalities and services. Therefore, Machine Learning (ML) is essential for these …
Public procurement of smart city services: an exploration of data protection related ex ante transaction costs
Purpose This paper examines data protection related ex ante transaction costs borne by the
private sector in the context of smart city service (SCS) public tendering in the European …
private sector in the context of smart city service (SCS) public tendering in the European …
A Unified Taxonomy and Evaluation of IoT Security Guidelines
J Chen, D Anandayuvaraj, JC Davis… - arxiv preprint arxiv …, 2023 - arxiv.org
Cybersecurity concerns about Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT cybersecurity …
each year. In response, organizations worldwide have published IoT cybersecurity …