Research Topics Ideas of Information Privacy

Prof. Fazal Rehman Shamil

Research Topics Ideas of Information Privacy

1. Governance strategy for digital platforms: Differentiation through information privacy
2. Towards the development of an information privacy protection awareness inititiative for data subjects and organizations
3. Implementing COVIDSafe: The Role of Trustworthiness and Information Privacy Law
4. Evaluating if trust and personal information privacy concerns are barriers to using health insurance that explicitly utilizes AI
5. Revisiting Trust and Privacy Concern in Consumers’ Perceptions of Marketing Information Management Practices: Replication and Extension
6. Towards an understanding of privacy management architecture in big data: an experimental research
7. Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts
8. An overview of information-theoretic security and privacy: Metrics, limits and applications
9. ‘Okay google, what about my privacy?’: User’s privacy perceptions and acceptance of voice based digital assistants
10. Analysis of using blockchain to protect the privacy of drone big data
11. Biometric Information Privacy Act: Statutes, Litigation, and Future
12. Achieving privacy preservation and billing via delayed information release
13. Do information and service quality affect perceived privacy protection, satisfaction, and loyalty? Evidence from a Chinese O2O-based mobile shopping application
14. Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study
15. Telemedicine, privacy, and information security in the age of COVID-19
16. The effect of fair information practices and data collection methods on privacy-related behaviors: A study of mobile apps
17. Individuals’ privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective
18. An Empirical Study: Privacy and Security Analysis of Companion Robot System Development
19. The legal construction of personal information protection and privacy under the Chinese Civil Code
20. Transformative or Not? How Privacy Violation Experiences Influence Online Privacy Concerns and Online Information Disclosure
21. Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy
22. Blockchain-based security & privacy for biomedical and healthcare information exchange systems
23. DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark
24. The good, the bad, and the ugly: impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing
25. Bolder is Better: Raising User Awareness through Salient and Concise Privacy Notices
26. Optimal Privacy-aware Estimation
27. Quantifying Membership Privacy via Information Leakage
28. Privacy-Preserving Authentication and Key-Management Protocol for Health Information Systems
29. URGENCY OF THE PERSONAL DATA PROTECTION BILL ON PRIVACY RIGHTS IN INDONESIA
30. Towards a utility theory of privacy and information sharing and the introduction of hyper-hyperbolic discounting in the digital big data age
31. Medical Sports Data Privacy Protection Method Based on Legal Risk Control
32. Privacy, Biometrics, and the Individual
33. Attention Paid to Privacy Policy Statements
34. A Privacy-Preserving Approach to Extraction of Personal Information through Automatic Annotation and Federated Learning
35. No trespassing: Exploring privacy boundaries in personalized advertisement and its effects on ad attitude and purchase intentions on social media
36. I Presume We’re (Commercially) Speaking Privately: Clarifying the Court’s Approach to the First Amendment Implications of Data Privacy Regulations
37. Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries
38. Valuing Personal Data with Privacy Consideration
39. Fundamental limits of caching for demand privacy against colluding users
40. Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool.
41. Application of Lah transform for security and privacy of data through information hiding in telecommunication
42. From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets
43. ” It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security
44. Inference under information constraints III: Local privacy constraints
45. A utility theory of privacy and information sharing
46. The Privacy Policy Permission Model: A Unified View of Privacy Policies.
47. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
48. Towards Privacy Paradigm Shift Due to the Pandemic: A Brief Perspective
49. Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
50. Biometric Monitoring Devices: Modern Solutions to Protecting Athletes’ Data Privacy
51. Typologies of Mobile Privacy Behavior and Attitude: A Case Study Comparing German and American Library and Information Science Students
52. Governing Privacy in Knowledge Commons
53. On the relationship between it privacy and security behavior: A survey among german private users
54. Privacy and smart speakers: A multi-dimensional approach
55. Privacy Protection and Data Utilization
56. Privacy and Security in Cognitive Cities: A Systematic Review
57. INVESTIGATING PRIVACY PARADOX: CONSUMER DATA PRIVACY BEHAVIOURAL INTENTION AND DISCLOSURE BEHAVIOUR
58. Privacy and Knowledge Commons
59. Privacy preserving big data analytics: A critical analysis of state-of-the-art
60. An Overview of Recent Development in Privacy Regulations and Future Research Opportunities
61. Privacy protections to encourage use of health-relevant digital data in a learning health system
62. A survey on privacy preserving dynamic data publishing
63. Privacy and Knowledge Production Across Contexts
64. Privacy-oriented analysis of ubiquitous computing systems: A 5-D approach
65. Consumer privacy during (and after) the COVID-19 pandemic
66. TILT: A GDPR-Aligned Transparency Information Language and Toolkit for Practical Privacy Engineering
67. The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces
68. A user collaboration privacy protection scheme with threshold scheme and smart contract
69. PriView–Exploring Visualisations to Support Users’ Privacy Awareness
70. Data analytics in a privacy-concerned world
71. ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing
72. An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof
73. What Can Fitness Apps Teach Us About Group Privacy?
74. Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security
75. Privacy-preserving video fall detection using visual shielding information
76. Research on Adaptive Relationship between Trust and Privacy in Cloud Service
77. On perfect privacy
78. Privacy preserving data visualizations
79. A bio-inspired privacy-preserving framework for healthcare systems
80. Outsourcing Privacy
81. A Study of Social Networking Site Use from a Three-Pronged Security and Privacy Threat Assessment Perspective
82. Philippine Data Privacy Law: Is it Implemented in a Private University Library, or Not?
83. Privacy Online A Concern Around the World
84. Privacy Asymmetries: Access to Data in Criminal Investigations
85. Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptions
86. Conceptual Research Framework of Consumer Resilience to Privacy Violation Online
87. Privacy Norms for Smart Home Personal Assistants
88. The Dark Side of Privacy Nudging–An Experimental Study in the Context of a Digital Work Environment
89. Privacy-preserving point-of-interest recommendation based on geographical and social influence
90. “Developers Are Responsible”: What Ad Networks Tell Developers About Privacy
91. Agents in a privacy-preserving world.
92. Data, data, everywhere: quantifying software developers’ privacy attitudes
93. Modeling the C (o) urse of Privacy-critical Location-based Services–Exposing Dark Side Archetypes of Location Tracking
94. Public acceptance of privacy-encroaching policies to address the COVID-19 pandemic in the United Kingdom
95. What rules the internet? A study of the troubled relation between web standards and legal instruments in the field of privacy
96. A uniformization-based approach to preserve individuals’ privacy during process mining analyses
97. Image Privacy in Social Network Using Invisible Watermarking Techniques
98. “I still need my privacy”: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots
99. Protect and Project: Names, Privacy, and the Boundary Negotiations of Online Video Game Players
100. DIPP: Information Diffusion for Privacy in Multi-agent Systems
101. Privacy rights at the Canadian border: judicial assumptions and the limits of the Charter
102. Privacy and the Internet of Things- An experiment in discrete choice
103. A privacy-preserving cross-domain healthcare wearables recommendation algorithm based on domain-dependent and domain-independent feature fusion
104. Privacy Types
105. A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19
106. The Data Privacy Paradox and Digital Demand
107. Late adoption of preventive measures of online privacy in Mexican and Colombian university students
108. A Survey on Privacy Preservation in Location-Based Mobile Business: Research Directions
109. The Federal Privacy Bill of Rights Act
110. A blockchain-based approach for saving and tracking differential-privacy cost
111. EMERGING APPLICATIONS ON SMART PHONES: THE ROLE OF PRIVACY CONCERNS AND ITS ANTECEDENTS ON SMART PHONES USAGE
112. Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents
113. Codedprivateml: A fast and privacy-preserving framework for distributed machine learning
114. Reversible Data Hiding in Jpeg Images for Privacy Protection
115. LEGAL PROTECTION OF THE PRIVACY INFORMATION RIGHTS OF COVID-19 PATIENTS AT DR. M. DJAMIL HOSPITAL
116. Privacy Enforcement on Subscribers Data in Cloud Computing
117. Privacy Aspects of Provenance Queries
118. Exploring The Design Space of Sharing and Privacy Mechanisms in Wearable Fitness Platforms
119. An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation
120. A survey of privacy-preserving mechanisms for heterogeneous data types
121. A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
122. Targeting and privacy in mobile advertising
123. Privacy Preservation Approaches for Social Network Data Publishing
124. Privacy preserving distributed extremely randomized trees
125. The Role of Ad Sequence and Privacy Concerns in Personalized Advertising: An Eye-Tracking Study into Synced Advertising Effects
126. GA-PPARM: constraint-based objective function and genetic algorithm for privacy preserved association rule mining
127. PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
128. Behavioral Intentions towards adoption of Information Protection and Cyber security (Email Security and Online Privacy): SEM model
129. APPLSS: Adaptive privacy preserved location sharing scheme based on attribute-based encryption
130. Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation
131. Experimental Evaluation of Security and Privacy in GSM Network Using RTL-SDR
132. Privacy Policy Compliance of Chronic Disease Management Apps in China: Scale Development and Content Evaluation
133. The Law of Employee Data: Privacy, Property, Governance
134. Security and privacy awareness of smartphone users in Indonesia
135. Securing Critical Information Assets, Sensitive Business Data and Privacy in the ‘New Normal’
136. Privacy preserving and data transpiration in multiple cloud using secure and robust data access management algorithm
137. Fedgnn: Federated graph neural network for privacy-preserving recommendation
138. Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability
139. The Design of a System for Online Psychosocial Care: Balancing Privacy and Accountability in Sensitive Online Healthcare Environments
140. Visual Interactive Privacy Policy: The Better Choice?
141. Research on Big Data Privacy Protection based on the Three-Dimensional Integration of Technology, Law, and Management
142. Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers
143. Learning With Differential Privacy
144. A Quantitative Metric for Privacy Leakage in Federated Learning
145. Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers
146. Challenges of Implementing Privacy Policies Across the Globe
147. Beyond Privacy: Protecting Data Interests in the Age of Artificial Intelligence
148. Pulling Together or Pulling Apart: Opportunities for Privacy in a Pandemic?
149. Us and Them (and It): Social Orientation, Privacy Concerns, and Expected Use of Pandemic-Tracking Apps in the United States
150. From the Filing Cabinet to the Cloud: Updating the Privacy Act of 1974
151. Inherent privacy limitations of decentralized contact tracing apps
152. User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes
153. Recommendations to Enhance Privacy and Usability of Smart Toys
154. The relationship between moral sensitivity, ethical climate, and job strain with patient privacy from viewpoint of operating room staffs
155. CIVIL LIABILITY REGULATIONS FOR PRIVACY IN CYBERSPACE IN LINE WITH INFORMATION SECURITY
156. Pitfall! Navigating the Tunnels With a Privacy-By-Design Framework
157. Language and Intercultural Information Ethics Concepts: A Preliminary Discussion of Privacy
158. Privacy Issues of Public Wi-Fi Networks
159. A blockchain-based preserving and sharing system for medical data privacy
160. Ethics, Encryption, and Evolving Concepts of Personal Privacy in the ‘Black Box Library’
161. Post-Pandemic Privacy Law
162. Learning-Empowered Privacy Preservation in Beyond 5G Edge Intelligence Networks
163. Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy
164. Data Privacy in Social Media Platform: Issues and Challenges
165. DIMY: Enabling privacy-preserving contact tracing
166. Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System
167. Preserving Privacy of Smart Meter Data in a Smart Grid Environment
168. A multi-disciplinary perspective for conducting artificial intelligence-enabled privacy analytics: Connecting data, algorithms, and systems
169. Privacy concerns can explain unwillingness to download and use contact tracing apps when COVID-19 concerns are high
170. “We think you may like this”: An investigation of electronic commerce personalization for privacy-conscious consumers
171. Building trust/distrust relationships on signed social service network through privacy-aware link prediction process
172. Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making
173. An account of how critical information about privacy is missing in indigneous languages of India and ways to avoid it
174. Privacy and Surveillance Implications of Google’s G Suite for Education
175. UK GDPR Privacy Policy
176. On privacy of dynamical systems: An optimal probabilistic mapping approach
177. Evaluating privacy of individuals in medical data
178. PPM-InVIDS: Privacy Protection Model for In-Vehicle Intrusion Detection System Based Complex-Valued Neural Network
179. Data Privacy and Security
180. Asymmetric Differential Privacy
181. Balancing User Privacy and Innovation in Augmented and Virtual Reality
182. Data protection and privacy in Canada: A balanced approach
183. Introduction to the special issue on privacy and security for location-based services and devices
184. Private Linear Transformation: The Joint Privacy Case
185. Unified Expression of Achievable Region in Privacy-Constrained Source Coding
186. Adaptive Privacy Preserving Deep Learning Algorithms for Medical Data
187. The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications
188. Hide and seek: The right to privacy against freedom of information
189. A MADM Location Privacy Protection Method Based on Blockchain
190. Analysis on the Privacy of DID Service Properties in the DID Document
191. Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation
192. Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography
193. Privacy preservation for image data: A GAN-based method
194. Privacy Enhanced Speech Emotion Communication using Deep Learning Aided Edge Computing
195. Privacy Preserving Information Hub Identification in Social Networks
196. A Comprehensive Study of Privacy and Security Risk Awareness Among Mobile Internet Users for Social Networks Sites in Malaysia
197. Do Privacy Concerns About Social Robots Affect Use Intentions? Evidence From an Experimental Vignette Study
198. Does Education Impact the Use of Privacy Enhancing Behavior? A Longitudinal Study
199. PLVA: privacy-preserving and lightweight V2I authentication protocol
200. Blockchain data privacy access control based on searchable attribute encryption
201. Smoothing-Averse Control: Covertness and Privacy from Smoothers
202. Social Computing and Privacy
203. ChildShield: A rating system for assessing privacy and security of internet of toys
204. Privacy Care: A Tangible Interaction Framework for Privacy Management
205. The role of attitude toward chatbots and privacy concern on the relationship between attitude toward mobile advertising and behavioral intent to use chatbots
206. Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective
207. Exploring the role of personality, trust, and privacy in customer experience performance during voice shopping: Evidence from SEM and fuzzy set qualitative …
208. Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms
209. Connecting with the future: The role of science fiction movies in helping consumers understand privacy-technology trade-offs
210. Improved privacy preserving method for periodical SRS publishing
211. A Faithful Mechanism for Incremental Multi-Agent Agreement Problems with Self-Interested and Privacy-Preserving Agents
212. Context-Aware Privacy Preserving in Edge Computing
213. Designing a Comprehensive Privacy Policy
214. PRIVACY POLICY OF
215. How Privacy Is Threatened From Social Media Communication?
216. Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
217. The DibiChain protocol: Privacy-preserving discovery and exchange of supply chain information
218. Global Tables of Data Privacy Laws and Bills (January 2021)
219. Enhanced models for privacy and utility in continuous-time diffusion networks
220. A secure and privacy-preserving protocol for holding double auctions in smart grid
221. Relative convenience, relative advantage, perceived security, perceived privacy, and continuous use intention of China’s WeChat Pay: A mixed-method two-phase …
222. Privacy Protection and Secure Transmission of Smart Meter Data
223. Privacy versus public health? A reassessment of centralised and decentralised digital contact tracing
224. A Secure Remote Clinical Sensor Network Approach for Privacy Enhancement
225. Introduction to the Minitrack on Privacy and Economics
226. A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
227. Integrating Metamaterial Antenna Node and LiFi for Privacy Preserving Intelligent COVID-19 Hospital Patient Management
228. Ghosts in the Dark: How to Prepare for Times of Hyper-Privacy.
229. XGBoost Algorithm under Differential Privacy Protection
230. Privacy and trust redefined in federated machine learning
231. Privacy Preserving with Surfed Social Media Content
232. A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing
233. Privacy Preserving in Digital Health: Main Issues, Technologies, and Solutions
234. PRIVACY PROTECTION OF ENCRYPTED MEDICAL DATA OVER MULTI-AUTHORITY CLOUD SYSTEM
235. Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities
236. Privacy challenges of IoT-based blockchain: a systematic review
237. Privacy concerns over the use of webcams in online medical education during the COVID-19 pandemic
238. Cybersecurity Analysis: Investigating the Data Integrity and Privacy in AWS and Azure Cloud Platforms
239. Security and Privacy Techniques in IoT Environment
240. Malicious Privacy Invasive Android Application Detection Using Machine Learning-Based Permission Analysis Technique
241. Privacy-preserving healthcare informatics: a review
242. Metrics for Ensuring Security and Privacy of Information Sharing Platforms for Improved City Resilience: A Review Approach
243. Creating a sense of digital privacy in the private sector
244. Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems
245. Deduplication Supporting Strong Privacy Protection for Cloud Storage
246. A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ
247. On the Security of a Lightweight Conditional Privacy-Preserving Authentication in VANETs
248. Privacy Paradox in Facebook: An Online Social Networking Site
249. PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains
250. Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems
251. How to address data privacy concerns when using social media data in conservation science
252. Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
253. PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling
254. “Sensitive but Essential Information”: Policy Debates on Fitness Application Privacy and Data Security
255. You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording
256. On the principle of privacy by design and its limits: Technology, ethics and the rule of law
257. A Novel Study of Different Privacy Frameworks Metrics and Patterns
258. PRIVACY POLICY OF: ALAN FULLER ALBION CHAMBERS, BROAD STREET, BRISTOL, BS1 1DR Z4637049
259. A novel communication efficient peer-to-peer energy trading scheme for enhanced privacy in microgrids
260. When machine learning meets privacy: A survey and outlook
261. Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches
262. Privacy characterization and quantification in data publishing
263. Modular control under privacy protection: Fundamental trade-offs
264. Privacy-preserving and verifiable online crowdsourcing with worker updates
265. Novel Privacy Preserving Authentication Scheme Based on Physical Layer Signatures for Mobile Payments
266. Analysing and extending privacy patterns with architectural context
267. Privacy Preserving Social Network Data Publishing
268. Social Media and Privacy Issues
269. Privacy rights in online interactions and litigation dynamics: A social custom view
270. Privacy Threat and Defense for Federated Learning with Non-iid Data in AIoT
271. Big Data and Privacy State of the Art
272. Security and privacy issue in multi-cloud accommodating Intrusion Detection System
273. Overview of Five Techniques Used for Security and Privacy Insurance in Smart Cities
274. Peer-to-peer Approach for Distributed Privacy-preserving Deep Learning
275. Privacy protected blockchain based architecture and implementation for sharing of students’ credentials
276. Towards privacy-friendly smart products
277. An exploratory experiment on privacy patterns: limitations and possibilities
278. PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks
279. LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications
280. Differential privacy of hierarchical census data: An optimization approach
281. Security and Privacy in FinTech: A Policy Enforcement Framework
282. The emergence of surveillance culture: The relationships between Facebook privacy management, online government surveillance, and online political expression
283. Secure and privacy preserving consensus for second-order systems based on paillier encryption
284. Achieving privacy-preserving and lightweight truth discovery in mobile crowdsensing
285. P-STORE: Extension of STORE methodology to elicit privacy requirements
286. Pseudonym changing strategy with mix zones based authentication protocol for location privacy in road networks
287. Verifiable dynamic ranked search with forward privacy over encrypted cloud data
288. FREQUENCY ITEM SET MINING WITH DIFFERENTIAL PRIVACY OVER LARGE SCALE DATA
289. Privacy-Preserving Video Classification with Convolutional Neural Networks
290. Police Visibility: Privacy, Surveillance, and the False Promise of Body-Worn Cameras
291. Wearable Devices and Privacy Concerns: Data Collection, Analysis, and Interpretation
292. An Anti-Collusion Information Sharing Scheme Provides Secure Scheme for Data Privacy in Cloud Computing
293. TRACING THE INVISIBLE: INFORMATION FIDUCIARIES AND THE PANDEMIC.
294. A GAN-based image transformation scheme for privacy-preserving deep neural networks
295. A secure multi-user privacy technique for wireless IoT networks using stochastic privacy optimization
296. Environment in Cloud Computing: Privacy Preservation and Security Solutions
297. Design of multimedia blockchain privacy protection system based on distributed trusted communication
298. Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges
299. Decoy technique for preserving the privacy in fog computing
300. Privacy disclosure by de-anonymization using music preferences and selections
301. Preserving Privacy with Federated Learning in Route Choice Behavior Modeling
302. A Study on Privacy Issues in Internet of Things (IoT)
303. Big Data Privacy and Security Risk and Solutions
304. IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments
305. Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles
306. Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care
307. Privacy-preserving big data publication:(K, L) anonymity
308. SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
309. A blockchain empowered and privacy preserving digital contact tracing platform
310. Security and Privacy Aspects Using Quantum Internet
311. Conceptual Research Framework of Consumer Resilience to Privacy Violation Online. Sustainability 2021, 13, 1238
312. Privacy rights and ‘naked’statistical evidence
313. Design of Authentication and Privacy Schemes for a Generic Social Network
314. Disclosure, privacy and workplace accommodation of episodic disabilities: organizational perspectives on disability communication-support processes to …
315. A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
316. A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly
317. Heterogeneous differential privacy for vertically partitioned databases
318. Kaleido: Real-time privacy control for eye-tracking systems
319. Making the Case for Victims’ Privacy in Civil Sexual Abuse Lawsuits
320. A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent
321. Multimedia Security and Privacy on Real-Time Behavioral Monitoring in Machine Learning IoT Application Using Big Data Analytics
322. Privacy policy
323. Privacy Enhanced Speech Emotion Communication using Deep Learning Aided Edge Computing
324. Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring
325. The myth of the privacy paradox
326. My Mouse, My Rules: Privacy Issues of Behavioral User Profiling via Mouse Tracking
327. Law in books and law in action: the readability of privacy policies and the gdpr
328. A Review of Zcash as a Cryptocurrency Platform Aimed Towards Maintaining Privacy Between All Parties
329. PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service
330. PPSA: Privacy preserved and secured architecture for internet of vehicles
331. Utility-Preserving Privacy Protection of Textual Documents via Word Embeddings
332. Privacy policy
333. Digital Divides in Political Participation: The Mediating Role of Social Media Self-Efficacy and Privacy Concerns
334. Monitoring-based Differential Privacy Mechanism Against Query Flooding-based Model Extraction Attack
335. Distributed Privacy-Preserving Active Power Sharing and Frequency Regulation in Microgrids
336. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining
337. Differential privacy for industrial internet of things: opportunities, applications and challenges
338. Do They Even Care? Measuring Instructor Value of Student Privacy in the Context of Learning Analytics
339. Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption
340. Privacy-preserving Distributed Learning for Renewable Energy Forecasting
341. The panoptic sort: A political economy of personal information
342. Breaking the Privacy Gridlock: A Broader Look at Remedies
343. Privacy Harms
344. An In-depth Review of Privacy Concerns Raised by the COVID-19 Pandemic
345. A Privacy-Preserving Homomorphic Scheme with Multiple Dimensions and Fault Tolerance for Metering Data Aggregation in Smart Grid
346. Blockchain Technologies Towards Data Privacy—Hyperledger Sawtooth as Unit of Analysis
347. Balancing’privacy and open science in the context of COVID-19: a response to Ifenthaler & Schumacher (2016)
348. Privacy protection for fog computing and the internet of things data based on blockchain
349. Privacy-Preserving System for Enriched-Integrated Service
350. A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining
351. Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption
352. A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment
353. User-Level Privacy-Preserving Federated Learning: Analysis and Performance Optimization
354. Privacy notice
355. A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
356. Private Linear Transformation: The Individual Privacy Case
357. Temporal and cultural limits of privacy in smartphone app usage
358. Estimating Sparse Discrete Distributions Under Privacy and Communication Constraints
359. EPPAS: Energy-efficient privacy-preserving and physically secure mutual authentication scheme for secure communication in smart grid systems
360. Privacy-preserving data publishing through anonymization, statistical disclosure control, and de-identification
361. Security and privacy issues in unified IoT-based skin monitoring system
362. Data Protection and Privacy in Healthcare: Research and Innovations
363. Efficient and privacy-preserving range-max query in fog-based agricultural IoT
364. PrivacyMic: Utilizing Inaudible Frequencies for Privacy Preserving Daily Activity Recognition
365. Privacy-preserving neural networks with Homomorphic encryption: C hallenges and opportunities
366. On Optimizing the Trade-off between Privacy and Utility in Data Provenance
367. Towards Automatic Comparison of Data Privacy Documents: A Preliminary Experiment on GDPR-like Laws
368. PRIVFACE: Fast Privacy-preserving Face Authentication with Revocable and Reusable Biometric Credentials
369. Security and Privacy in the Emerging Cyber-Physical World: A Survey
370. The Stumbling Balance between Public Health and Privacy amid the Pandemic in China
371. Investigating Propensity for Patient Telemedicine Technology Adoption Utilizing Trust, Distrust, Spatial Accessibility, Privacy, and Demographics
372. Altruism Extension of the Privacy Calculus
373. Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
374. A privacy-preserving resource trading scheme for Cloud Manufacturing with edge-PLCs in IIoT
375. A Review on Data Privacy Detection in Social Networks using Data Mining, Machine Learning and Blockchain technologies
376. Technology, Privacy, and User Opinions of COVID-19 Mobile Apps for Contact Tracing: Systematic Search and Content Analysis
377. Towards the creation of a Profile of the Information Privacy Aware User through a Systematic Literature review of Information Privacy Awareness
378. Privacy-preserving blockchain-based federated learning for traffic flow prediction
379. Data Aggregation and Privacy Preserving Using Computational Intelligence
380. Your Photo is so Funny that I don’t Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors
381. Designing for the Privacy Commons
382. A New Noise Generating Method Based on Gaussian Sampling for Privacy Preservation
383. Differential privacy on the unit simplex via the dirichlet mechanism
384. Monetizing Privacy
385. Privacy-Preserving Zero Knowledge Scheme for Attribute-based Matchmaking
386. Health Data Privacy in the COVID-19 Pandemic Context: Discourses on HIPAA
387. Decision Making with Differential Privacy under a Fairness Lens
388. Privacyeye: A privacy-preserving and computationally efficient deep learning-based mobile video analytics system
389. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
390. Privacy as a precondition to social protection: On why there is a need to conceptualise privacy from a Marxist perspective
391. An evolutionary computation-based privacy-preserving data mining model under a multithreshold constraint
392. An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
393. Consumer privacy protection using flexible thermal loads: Theoretical limits and practical considerations
394. Trust but Verify: Cryptographic Data Privacy for Mobility Management
395. Privacy Detection and Protection for Intelligent Transportation Shared Travel Service
396. Inferring Sociodemographic Attributes of Wikipedia Editors: State-of-the-art and Implications for Editor Privacy
397. Privacy Attributes-aware Message Passing Neural Network for Visual Privacy Attributes Classification
398. A Data Security Model for Improving the Privacy Cloud Computing
399. Interfacing Privacy and Trade
400. Security and Privacy Aspects for Internet of Things (IoT)
401. Analysis of How Critical Privacy Factors Influence Intentions to Use Internet of Things Applications
402. Remodeling: improved privacy preserving data mining (PPDM)
403. Face Image Publication Based on Differential Privacy
404. Role of privacy/safety risk and trust on the development of prosumption and value co-creation under the sharing economy: a moderated mediation model
405. Connecting robust shuffle privacy and pan-privacy
406. Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi” pious”Muslim Communities
407. Privacy and security issues in the future: A social media
408. Das Privacy Paradox aus psychologischer Perspektive
409. The Balance Between Security, Privacy and Data Protection in IoT Data Sharing: a Critique to Traditional” Security&Privacy” Surveys
410. ENCRYPTED DATA SHARING AND MUTUAL INFLUENCE BASED PRIVACY-PRESERVING VERIFICATION TO ENHANCE THE SECURITY IN CLOUD
411. Privacy Concern and Likelihood of Paying a Privacy Fee
412. Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications
413. A privacy-preserving distributed control of optimal power flow
414. Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service
415. Applications of Differential Privacy in Social Network Analysis: A Survey
416. Data privacy and confidentiality from the perspectives of general public and health care providers in Jordan
417. Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey
418. A Novel Study for Spatio-Temporal Query Processing using Privacy Preservation
419. Distributed Trust Evaluation protocol with Privacy Protection for Inter-cloud
420. Privacy-Preserving RFID-Based Search System
421. Privacy-preserving density-based clustering
422. Privacy-preserving identity transactions online: the use case of brokered identity federations
423. Integrating domain and constraint privacy reasoning in the distributed stochastic algorithm with breakouts
424. Advanced security and privacy technique for digital text in smart grid communications
425. Female US military veterans'(non) disclosure of mental health issues with family and friends: Privacy rules and boundary management
426. A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud
427. PRIVACY POLICY OF
428. Sustainability Calculus in Adopting Smart Speakers—Personalized Services and Privacy Risks. Sustainability 2021, 13, 602
429. Lightweight Privacy-Preserving Scheme using Homomorphic Encryption in Industrial Internet of Things
430. A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server
431. AI and Data Privacy: Managing Risk in the Boardroom
432. A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open Issues
433. Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
434. Keep Your Data Locally: Federated-Learning-Based Data Privacy Preservation in Edge Computing
435. The Computer for the 21st Century–Second Edition for Europe: Open-source Projects, Consumer Activism, and Collaboration Will Make Privacy the Central Pillar of …
436. Pandemic Containment with Digital Measures: Acceptance and Privacy Aspects of Contact Tracing Apps
437. Privacy Risks in Prenatal Aneuploidy and Carrier Screening: What Obstetricians and Their Patients Need to Know
438. Transaction privacy preservations for blockchain technology
439. Cookies, Privacy and Data Protection
440. Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
441. Protecting genetic privacy in biobanking through data protection law
442. Understanding Factors Influencing Intention to Use E-government Services in Vietnam: Focused on Privacy and Security Concerns
443. Freedom of Expression and the Right to Privacy and Ethics in Dialectic of Human Rights in This Complex and Turbulent Society
444. PulseEdit: Editing Physiological Signal in Facial Videos for Privacy Protection
445. Big data analytics, online terms of service and privacy policies
446. E-money, Credit Cards, and Privacy
447. Algorithms for Selecting the Optimum Dataset While Providing Personalized Privacy and Compensation to its Participants
448. Separ: Towards Regulating Future of Work Multi-Platform Crowdworking Environments with Privacy Guarantees
449. Interest group lobbying in the European Union: privacy, data protection and the right to be forgotten
450. Incorporating individual and group privacy preferences in the internet of things
451. PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals
452. A secure and privacy-preserving approach to protect user data across cloud based online social networks
453. A bigger threat to patient privacy when doctors use Facebook
454. Privacy preserving and data publication for vehicular trajectories with differential privacy
455. Preserving Information Security Using Fractal-Based Cryptosystem
456. A survey on IoT platforms: Communication, security, and privacy perspectives
457. Secure signal processing for genomic privacy protection
458. Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication
459. An Efficient and Privacy-Preserving Billing Protocol for Smart Metering.
460. Verifiable and privacy preserving federated learning without fully trusted centers
461. Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom
462. An Efficient Probabilistic Multi Labeled Big Data Clustering Model for Privacy Preservation Using Linked Weight Optimization Model
463. FedLearnSP: Preserving Privacy and Security using Federated Learning and Edge Computing
464. Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid
465. Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks
466. Design of a privacy-preserving decentralized energy trading scheme in blockchain network environment
467. Blockchain-based multi-party proof of assets with privacy preservation
468. Unregulated drones and an emerging threat to right to privacy: A critical overview
469. Too much info: Data surveillance and reasons to favor the control account of the right to privacy
470. Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric
471. Enhanced Privacy With Disrupted Data By Choosing Features
472. A Synergistic Approach to Digital Privacy
473. An Auditability, Transparent, and Privacy-Preserving for Supply Chain Traceability Based on Blockchain
474. Privacy, Patience, and Protection
475. Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating
476. Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario
477. Efficient privacy-preserving authentication for V2G networks
478. Awareness of mobile device security and data privacy tools.
479. Why Should I Trust a Model is Private? Using Shifts in Model Explanation for Evaluating Privacy-Preserving Emotion Recognition Model
480. Fed-NILM: A Federated Learning-based Non-Intrusive Load Monitoring Method for Privacy-Protection
481. CompLicy: Evaluating the GDPR Alignment of Privacy Policies-A Study on Web Platforms
482. Privacy-preserving multilevel obfuscation scheme for vehicular network
483. Security Challenges of Location Privacy in VANETs and State-of-The Art Solutions: A Survey
484. A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities
485. Robustness of Meta Matrix Factorization Against Strict Privacy Constraints
486. Optimization of the Mainzelliste software for fast privacy-preserving record linkage
487. A novel Double Tier Cryptographic System (nDTCS) to Reinforce Patients’ Privacy in Contemporary COVID-19 Telemedicine
488. Right to Privacy with special reference to the Cyber world.
489. Gender and the privacy paradox in Chinese college students’ locative dating communication
490. Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United States
491. Privacy-aware smart card based biometric authentication scheme for e-health
492. Privacy-Preserving Distributed Optimal Power Flow with Partially Homomorphic Encryption
493. Parenting Program to Protect Children’s Privacy: The Phenomenon of Sharenting Children on social media
494. Data-Sharing Economy: Value-Addition from Data meets Privacy
495. Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage
496. NovidChain: Blockchain-based privacy-preserving platform for COVID-19 test/vaccine certificates
497. Scalable l-diversity: An extension to scalable k-anonymity for privacy preserving big data publishing
498. Privacy-preserving feature selection with secure multiparty computation
499. PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
500. Injunctions and public figures: the changing value in injunctions for privacy protection
501. Constructing dummy query sequences to protect location privacy and query privacy in location-based services
502. Scalable Privacy-Preserving Distributed Extremely Randomized Trees for Structured Data With Multiple Colluding Parties
503. A Secure Protocol for High-Dimensional Big Data Providing Data Privacy
504. A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
505. A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
506. Membership Privacy for Machine Learning Models Through Knowledge Transfer
507. Privacy as a public good: a case for electronic cash
508. Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications
509. Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors
510. A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy
511. Blockchain and the GDPR: New Challenges for Privacy and Security
512. Obfuscation of images via differential privacy: from facial images to general images
513. Privacy-preserving distributed optimal scheduling of regional integrated energy system considering different heating modes of buildings
514. Privacy and Security Evaluation of Amazon Echo Voice Assistant
515. Design and Implementation of a privacy-preserving framework for Machine Learning
516. FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts
517. Privacy-Preserving Data Analysis: Providing Traceability without Big Brother
518. A Privacy Preserving and Efficient Randomness Routing in Adhoc Wireless Network
519. Delay-aware privacy-preserving location-based services under spatiotemporal constraints
520. Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices
521. Designing Strong Privacy Metrics Suites Using Evolutionary Optimization
522. Evaluating privacy-determining user privacy expectations on the web
523. Privacy Laws and Privacy by Design Schemes for the Internet of Things: A Developer’s Perspective
524. Does self-disclosure matter? A dynamic two-stage perspective for the personalization-privacy paradox
525. Verifiable, reliable, and privacy-preserving data aggregation in fog-assisted mobile crowdsensing
526. Novel Privacy Preserving Classification Mining Approach Applied to A City Public Security Big Data Analysis
527. Security Concerns and Privacy Preservation in Blockchain based IoT Systems: Opportunities and Challenges
528. Collaborative and efficient privacy-preserving critical incident management system
529. Blockchain-Based Data Market (BCBDM) Framework for Security and Privacy: An Analysis
530. Shuffled Model of Differential Privacy in Federated Learning
531. Motivators and concerns for real-time online classes: focused on the security and privacy issues
532. A Privacy-Preserving Asynchronous Averaging Algorithm based on State Decomposition
533. Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking
534. Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments
535. Mobile Apps Prioritizing Privacy, Efficiency and Equity: A Decentralized Approach to COVID-19 Vaccination Coordination
536. Towards a Collection of Security and Privacy Patterns
537. The effect of renewal privacy policy whatsapp to customer behavior
538. Cascading Bandit under Differential Privacy
539. A comprehensive and holistic knowledge model for cloud privacy protection
540. Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain
541. Double-blinded finder: A two-side privacy-preserving approach for finding missing children
542. Compressive learning with privacy guarantees
543. A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications
544. REACT: Real-Time Contact Tracing and Risk Monitoring via Privacy-Enhanced Mobile Tracking
545. Fusion of machine learning and privacy preserving for secure facial expression recognition
546. Privacy and digital ethics after the pandemic
547. Optimal Privacy Preserving Scheme Based on Modified ANN and PSO in Cloud
548. A resourceful and privacy conserve cloud computing bio-metric recognition scheme
549. A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks
550. Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System
551. A Privacy-Preserving Route Leak Protection Mechanism Based on Blockchain
552. The Ontological Interpretation of Informational Privacy
553. Security and privacy issues in fog computing for healthcare 4.0
554. A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning
555. ConfIs: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design.
556. Security and Privacy in IoT Smart Healthcare
557. Privacy and transparency in cbdcs: A regulation-by-design aml/cft scheme
558. Privacy-Breaching Patterns in NoSQL Databases
559. A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications
560. Differential Privacy-Based Online Allocations towards Integrating Blockchain and Edge Computing
561. POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
562. Artificial Intelligence and the International Information and Psychological Security
563. Safepaths: Vaccine Diary Protocol and Decentralized Vaccine Coordination System using a Privacy Preserving User Centric Experience
564. A comprehensive report on security and privacy challenges in Software as a Service
565. Sink Location Privacy Protection Algorithm Based on Virtual Circle in WSNs
566. Ensuring Security and Privacy in IoT for Healthcare Applications
567. Accuracy-Privacy Trade-off in Deep Ensemble
568. Privacy Preserving and Data Integrity in Social Networking
569. Privacy preserving in indoor fingerprint localization and radio map expansion
570. Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems
571. Strategy, privacy, protection management, sustainable development, privacy of Tehran metropolis, privacy of Tehran region 4 and privacy of developed metropolises
572. Enhanced Source Location Privacy Preservation Using Randomly Selected Intermediate Node Scheme in Wireless Sensor Network
573. Privacy Preserving Misbehavior Detection in IoV using Federated Machine Learning
574. Digital phenotyping-a global tool for psychiatry but a global threat to privacy.
575. Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
576. Privacy Policy on Smart Contracts in E-Commerce Transactions
577. A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps
578. Internet of Things: Applications, security and privacy: A survey
579. Privacy-Preserving Teacher-Student Deep Reinforcement Learning
580. Reasoning about privacy in mobile application install decisions: Risk perception and framing
581. Techniques for Preserving Privacy in Data Mining for Cloud Storage: A Survey
582. A novel privacy-preserving federated genome-wide association study framework and its application in identifying potential risk variants in ankylosing spondylitis
583. Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia
584. Privacy, Personalization, and Price Discrimination
585. ARTYCUL: A Privacy-Preserving ML-Driven Framework to Determine the Popularity of a Cultural Exhibit on Display
586. CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development
587. A Note on Privacy in Constant Function Market Makers
588. SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks
589. Survey on multi-access edge computing security and privacy
590. Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geospatial Technologies
591. Security and Privacy Issues in Biomedical AI Systems and Potential Solutions
592. A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy
593. Privacy Preservation-Based Access Control Intelligence for Cloud Data Storage in Smart Healthcare Infrastructure
594. On the differential privacy of dynamic location obfuscation with personalized error bounds
595. Privacy preserving biometric authentication using Chaos on remote untrusted server
596. Insights from People’s Experiences with AI: Privacy Management Processes
597. Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
598. Histogram Publication over Numerical Values under Local Differential Privacy
599. Entity Of Privacy In The Era Of Technology
600. PRIVACY-A RIGHT PROTECTED AND GUARANTEED BY THE STATE I

Prof.Fazal Rehman Shamil (Available for Professional Discussions)
1. Message on Facebook page for discussions,
2. Video lectures on Youtube
3. Email is only for Advertisement/business enquiries.