Enabling Mobile and Wireless Technologies for Smart Cities: Part 2

The articles in this special section focus on communications technologies for use in smart cities. Due to advancements in communication and computing technologies, smart cities have become the main innovation agenda of research organizations, technology vendors, and governments. To make a city smart, a strong communications infrastructure is required for connecting smart objects, people, and sensors. Smart cities rely on wireless and mobile technologies for providing services such as healthcare assistance, security and safety, real-time traffic monitoring, and managing the environment, to name a few. Such applications have been a main driving force in the development of smart cities. Without the appropriate communication networks, it is really difficult for a city to facilitate its citizens in a sustainable, efficient, and safer manner/environment. Considering the significance of mobile and wireless technologies for realizing the vision of smart cities, there is a need to conduct research to further investigate the standardization efforts and explore different issues/challenges in wireless technologies, mobile computing, and smart environments.

[1]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[2]  Niall Sclater,et al.  Code of practice for learning analytics , 2015 .

[3]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[4]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Jenni Swenson,et al.  Establishing an ethical literacy for learning analytics , 2014, LAK.

[6]  Daniel J. Solove,et al.  Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[7]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[8]  Seda F. Gürses Can you engineer privacy? , 2014, CACM.

[9]  P. Prinsloo,et al.  Learning Analytics , 2013 .

[10]  George Siemens,et al.  Learning analytics and educational data mining: towards communication and collaboration , 2012, LAK.

[11]  M. A. Crook The Risks of Absolute Medical Confidentiality , 2013, Sci. Eng. Ethics.

[12]  Mandy Lupton,et al.  Learning analytics beyond the LMS: the connected learning analytics toolkit , 2015, LAK.

[13]  Leah P. Macfadyen,et al.  Embracing Big Data in Complex Educational Systems: The Learning Analytics Imperative and the Policy Challenge. , 2014 .

[14]  Basit Shafiq,et al.  Differentially Private Naive Bayes Classification , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[15]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[16]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[17]  Yücel Saygin,et al.  Privacy-Preserving Publishing of Hierarchical Data , 2016, ACM Trans. Priv. Secur..

[18]  Arvind Narayanan,et al.  No silver bullet: De-identification still doesn't work , 2014 .

[19]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[20]  Paul Prinsloo,et al.  An evaluation of policy frameworks for addressing ethical considerations in learning analytics , 2013, LAK '13.

[21]  Yufei Tao,et al.  Anatomy: simple and effective privacy preservation , 2006, VLDB.

[22]  Eitel J. M. Lauría,et al.  Early Alert of Academically At-Risk Students: An Open Source Analytics Initiative , 2014, J. Learn. Anal..

[23]  Traian Marius Truta,et al.  Protection : p-Sensitive k-Anonymity Property , 2006 .

[24]  Hendrik Drachsler,et al.  Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics , 2016, LAK.

[25]  Yufei Tao,et al.  The hardness and approximation algorithms for l-diversity , 2009, EDBT '10.

[26]  George Siemens,et al.  Ethical and privacy principles for learning analytics , 2014, Br. J. Educ. Technol..

[27]  Frank McSherry,et al.  Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.

[28]  Chris Clifton,et al.  On syntactic anonymity and differential privacy , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).

[29]  Hae Okimoto,et al.  The PAR Framework Proof of Concept: Initial Findings from a Multi-Institutional Analysis of Federated Postsecondary Data , 2012 .

[30]  Paul Prinsloo,et al.  Student privacy self-management: implications for learning analytics , 2015, LAK.

[31]  Jennifer Heath,et al.  Contemporary Privacy Theory Contributions to Learning Analytics , 2014, J. Learn. Anal..

[32]  Daniel J. Solove The Digital Person , 2022 .

[33]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[34]  Benjamin C. M. Fung,et al.  Anonymizing sequential releases , 2006, KDD '06.

[35]  Seeta Peña Gangadharan,et al.  Digital inclusion and data profiling , 2012, First Monday.

[36]  K. Crawford The Hidden Biases in Big Data , 2013 .

[37]  Chris Clifton,et al.  Thoughts on k-Anonymization , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[38]  D. Boyd,et al.  Six Provocations for Big Data , 2011 .

[39]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[40]  Chris Clifton,et al.  Multirelational k-Anonymity , 2009, IEEE Trans. Knowl. Data Eng..

[41]  Mathieu d'Aquin,et al.  The learning analytics & knowledge (LAK) data challenge 2014 , 2014, LAK '14.