C. Hummert, Jannik Weber, D. Pawlaszczyk, Ralf Zimmermann
{"title":"Android apps and advertising networks - a survey on data privacy","authors":"C. Hummert, Jannik Weber, D. Pawlaszczyk, Ralf Zimmermann","doi":"10.1504/IJIPSI.2020.10038203","DOIUrl":"https://doi.org/10.1504/IJIPSI.2020.10038203","url":null,"abstract":"","PeriodicalId":176873,"journal":{"name":"International Journal of Information Privacy, Security and Integrity","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Policies and Trust Issues in Cloud Computing","authors":"V. Sudharshan","doi":"10.1504/ijipsi.2023.10056432","DOIUrl":"https://doi.org/10.1504/ijipsi.2023.10056432","url":null,"abstract":"","PeriodicalId":176873,"journal":{"name":"International Journal of Information Privacy, Security and Integrity","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Privacy Laws in the United States","authors":"Yousuf Muhammad","doi":"10.1504/ijipsi.2023.10056234","DOIUrl":"https://doi.org/10.1504/ijipsi.2023.10056234","url":null,"abstract":"","PeriodicalId":176873,"journal":{"name":"International Journal of Information Privacy, Security and Integrity","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis for intelligent urban freight transport","authors":"El Arbi Abdellaoui Alaoui, M. El Moudden","doi":"10.1504/ijipsi.2019.10025221","DOIUrl":"https://doi.org/10.1504/ijipsi.2019.10025221","url":null,"abstract":": The actual evolution of the traditional transport functions resulted from to the prominent digital revolution, the emergence of the internet of things (IoT), the use of intelligent transport systems (ITS) and the development of communication technologies. In fact, the development of the internet of things (IoT) and geo-localisation contributes significantly in the actual evolution, meanwhile allowing the emergence of new mobility services such as e-commerce, carpooling, car sharing and management vehicle fleet. Hence, impacting strongly the traditional economic means. In this context, one of the important obstacles to consider is the security. In this paper, we will analyse the interaction between selfish smart vehicles/parcels and malicious smart vehicles/parcels, that was formulated as a game model. As a result, we have calculated the Nash equilibrium and the utilities for the both selfish smart vehicles/parcels and malicious smart vehicles/parcels, evaluate the parameters that can maximise the selfish smart vehicles/parcels’ utility when the smart parcels are transported by vehicles between different centres (shops, supermarket, ...) was planned and identify the potential malicious smart vehicles/parcels.","PeriodicalId":176873,"journal":{"name":"International Journal of Information Privacy, Security and Integrity","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122221033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}