Search
Search Results
-
A Review of Anonymization Algorithms and Methods in Big Data
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of...
-
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams,...
-
Balancing Privacy and Progress in Artificial Intelligence: Anonymization in Histopathology for Biomedical Research and Education
The advancement of biomedical research heavily relies on access to large amounts of medical data. In the case of histopathology, Whole Slide Images... -
Exploring design elements of personal data markets
Since the emerging information economy relies heavily on data for advancement and growth, data markets have gained increasing attention. However,...
-
-
Designing incentive systems for participation in digital ecosystems—An integrated framework
Digital ecosystems are a highly relevant phenomenon in contemporary practice, offering unprecedented value creation opportunities for both companies...
-
A Conceptual Model of the Benefits and Concerns of Wearable Health Data Management
The wealth of data provided by wearable technologies can provide many advantages to stakeholders. As a result, empowered consumers have developed... -
Data Sensitivity and Domain Specificity in Reuse of Machine Learning Applications
Data sensitivity and domain specificity challenges arise in reuse of machine learning applications. We identify four types of machine learning...
-
A taxonomy of data governance decision domains in data marketplaces
Commercializing data and data-related services has gained in importance in recent years. Driven by digitalization and the Internet-of-Things (IoT),...
-
Data Governance
Data-intensive products and services aim to turn big data to a value or strategic asset for the organizations. However, the inherent risk and cost of... -
Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning-based forensics
In sha** the Internet of Money, the application of blockchain and distributed ledger technologies (DLTs) to the financial sector triggered...
-
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models
Ever since databases became an ubiquitous part of enterprises or businesses, security and privacy became a requirement. Traditionally, privacy was...
-
Exploring the General Data Protection Regulation (GDPR) compliance in cloud services: insights from Swedish public organizations on privacy compliance
The adoption of cloud services offers manifold advantages to public organizations; however, ensuring data privacy during data transfers has become...
-
Big Data and Precision Medicine
The increasing availability of biological data collected at different levels (e.g., cellular, tissue and whole-body levels) in large cohorts of... -
Performing web analytics with Google Analytics 4: a platform review
In March 2022, Google announced that their flagship Universal Analytics (UA) platform would stop processing new website sessions on July 1, 2023...
-
It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing
Firms are often reluctant to share data because of mistrust, concerns over control, and other risks. Multi-party computation (MPC) is a new technique...
-
GenAI Data Security
This chapter provides an in-depth exploration of data security within the realm of GenAI. Highlighting the pivotal role of data, often likened to the... -
Future Scenarios and the Most Probable Future for Next Generation Manufacturing
Based on the results of a rigorous Delphi study, we present scenarios that portray a most probable future of Next Generation Manufacturing in 2030,... -
-