AFPr-AM: A Novel Fuzzy-AHP based Privacy Risk Assessment Model For Strategic Information Management of Social Media Platforms

[1]  Milad Taleby Ahvanooey,et al.  CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks , 2022, J. Inf. Secur. Appl..

[2]  Abdul Majeed,et al.  A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks , 2022, Electronics.

[3]  Milad Taleby Ahvanooey,et al.  Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey , 2022, IEEE Internet of Things Journal.

[4]  G. Sudha Sadasivam,et al.  Budget optimized dynamic virtual machine provisioning in hybrid cloud using fuzzy analytic hierarchy process , 2021, Expert Syst. Appl..

[5]  Sudipta Roy,et al.  A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets , 2021, Expert Syst. Appl..

[6]  Nripendra P. Rana,et al.  Fifty years of information management research: A conceptual structure analysis using structural topic modeling , 2021, Int. J. Inf. Manag..

[7]  Shalini Chandra,et al.  Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm , 2021, Comput. Commun..

[8]  H. Eroglu Multi-criteria decision analysis for wind power plant location selection based on fuzzy AHP and geographic information systems , 2021, Environment, Development and Sustainability.

[9]  Jyoti Sekhar Banerjee,et al.  A decision model for selecting best reliable relay queue for cooperative relaying in cooperative cognitive radio networks: the extent analysis based fuzzy AHP solution , 2021, Wireless Networks.

[10]  Chia-Nan Wang,et al.  A Compromised Decision-Making Approach to Third-Party Logistics Selection in Sustainable Supply Chain Using Fuzzy AHP and Fuzzy VIKOR Methods , 2021, Mathematics.

[11]  José Ramón Saura,et al.  Evaluating security and privacy issues of social networks based information systems in Industry 4.0 , 2021, Enterp. Inf. Syst..

[12]  Yafei Wang,et al.  Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process , 2021, Wirel. Pers. Commun..

[13]  Pradeep Kumar,et al.  Privacy Preserving in Online Social Networks Using Fuzzy Rewiring , 2021, IEEE Transactions on Engineering Management.

[14]  A. Hausmann,et al.  How to address data privacy concerns when using social media data in conservation science , 2021, Conservation biology : the journal of the Society for Conservation Biology.

[15]  Nityesh Bhatt,et al.  Analysing the factors affecting the selection of ERP package: a fuzzy AHP approach , 2021, Inf. Syst. E Bus. Manag..

[16]  Fatma Kutlu Gündoğdu,et al.  Evaluating public transport service quality using picture fuzzy analytic hierarchy process and linear assignment model , 2021, Appl. Soft Comput..

[17]  Byeong Ho Kang,et al.  A decision model for blockchain applicability into knowledge-based conversation system , 2021, Knowl. Based Syst..

[18]  Mingwu Zhang,et al.  PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks , 2021, Comput. Stand. Interfaces.

[19]  Ali Osman Atahan,et al.  AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles , 2020, Appl. Soft Comput..

[20]  Noel Crespi,et al.  Impersonation on Social Media: A Deep Neural Approach to Identify Ingenuine Content , 2020, 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[21]  Raymond Y. K. Lau,et al.  Privacy preserving big data analytics: A critical analysis of state‐of‐the‐art , 2020, WIREs Data Mining Knowl. Discov..

[22]  Kim-Kwang Raymond Choo,et al.  Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective , 2020, Comput. Hum. Behav..

[23]  Sabine Trepte The Social Media Privacy Model: Privacy and Communication in the Light of Social Media Affordances , 2020 .

[24]  Myrna Holtz Wooders,et al.  Subgame-perfect cooperation in an extensive game , 2020, J. Econ. Theory.

[25]  Wu He,et al.  A meta-analysis to explore privacy cognition and information disclosure of internet users , 2020, Int. J. Inf. Manag..

[26]  Antonio F. Gómez-Skarmeta,et al.  ARIES: Evaluation of a reliable and privacy-preserving European identity management framework , 2020, Future Gener. Comput. Syst..

[27]  Ali Tamimi,et al.  A privacy-preserving model to control social interaction behaviors in social network sites , 2019, J. Inf. Secur. Appl..

[28]  Ghazaleh Beigi,et al.  Privacy Preserving Text Representation Learning , 2019, HT.

[29]  Muhammet Gul,et al.  AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis , 2019, Complex & Intelligent Systems.

[30]  Sigal Tifferet,et al.  Gender differences in privacy tendencies on social network sites: A meta-analysis , 2019, Comput. Hum. Behav..

[31]  Melih Yucesan,et al.  Risk evaluation and prevention in hydropower plant operations: A model based on Pythagorean fuzzy AHP , 2019, Energy Policy.

[32]  Stefan Rass,et al.  Game Theory for Security and Risk Management: From Theory to Practice , 2018 .

[33]  Ruggero G. Pensa,et al.  A privacy self-assessment framework for online social networks , 2017, Expert Syst. Appl..

[34]  Fang Liu,et al.  On Consistency in AHP and Fuzzy AHP , 2017 .

[35]  Shaolei Ren,et al.  Game Theory for Cyber Security and Privacy , 2017, ACM Comput. Surv..

[36]  David Hutchison,et al.  Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends , 2017, IEEE Communications Surveys & Tutorials.

[37]  Shona Leitch,et al.  Social media as an information system: improving the technological agility , 2017, Enterp. Inf. Syst..

[38]  Sylvain Kubler,et al.  A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications , 2016, Expert Syst. Appl..

[39]  Vladimir A. Oleshchuk,et al.  Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions , 2016, Int. J. Inf. Manag..

[40]  Brij B. Gupta,et al.  Social media security and trustworthiness: Overview and new direction , 2016, Future Gener. Comput. Syst..

[41]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[42]  Hong Wang,et al.  An application of nonlinear fuzzy analytic hierarchy process in safety evaluation of coal mine , 2016 .

[43]  Babajide Osatuyi,et al.  Personality Traits and Information Privacy Concern on Social Media Platforms , 2015, J. Comput. Inf. Syst..

[44]  Zeshui Xu,et al.  Intuitionistic Fuzzy Analytic Hierarchy Process , 2014, IEEE Transactions on Fuzzy Systems.

[45]  Mohammad Ali Shafia,et al.  Integrating Fuzzy Kano and Fuzzy TOPSIS for Classification of Functional Requirements in National Standardization System , 2014 .

[46]  Tsan-sheng Hsu,et al.  A logical framework for privacy-preserving social network publication , 2014, J. Appl. Log..

[47]  H. Raghav Rao,et al.  Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..

[48]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[49]  Seyed Jafar Sadjadi,et al.  Design a new intelligence expert decision making using game theory and fuzzy AHP to risk management in design, construction, and operation of tunnel projects (case studies: Resalat tunnel) , 2011 .

[50]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[51]  Stefan Weiss,et al.  Privacy threat model for data portability in social network applications , 2009, Int. J. Inf. Manag..

[52]  Michael Hadjimichael,et al.  A fuzzy expert system for aviation risk assessment , 2009, Expert Syst. Appl..

[53]  Manoj Kumar Tiwari,et al.  Global supplier selection: a fuzzy-AHP approach , 2008 .

[54]  Metin Dağdeviren,et al.  Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management , 2008, Inf. Sci..

[55]  D. Boyd Facebook's Privacy Trainwreck , 2008 .

[56]  N. Nisan Introduction to Mechanism Design (for Computer Scientists) , 2007 .

[57]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[58]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[59]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[60]  N. Nisan,et al.  Algorithmic Mechanism Design , 2001, Games Econ. Behav..

[61]  James J. Buckley,et al.  Fuzzy hierarchical analysis revisited , 2001, Eur. J. Oper. Res..

[62]  D. Chang Applications of the extent analysis method on fuzzy AHP , 1996 .

[63]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[64]  Mao-Jiun J. Wang,et al.  Ranking fuzzy numbers with integral value , 1992 .

[65]  Muhammad Azeem Akbar,et al.  Agile trends in Chinese global software development industry: Fuzzy AHP based conceptual mapping , 2021, Appl. Soft Comput..

[66]  Peng Jiang,et al.  The application of cloud model combined with nonlinear fuzzy analytic hierarchy process for the safety assessment of chemical plant production process , 2021 .

[67]  Suryanti Awang,et al.  Android mobile malware detection using fuzzy AHP , 2021, J. Inf. Secur. Appl..

[68]  Eliciane Maria da Silva,et al.  A fuzzy AHP approach to select suppliers in the Brazilian food supply chain , 2020 .

[69]  Yang Jie,et al.  Application of fuzzy analytic hierarchy process in the risk assessment of dangerous small-sized reservoirs , 2018, Int. J. Mach. Learn. Cybern..

[70]  David Sánchez,et al.  Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines , 2013, Inf. Sci..

[71]  Hock-Hai Teo,et al.  Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.

[72]  M. Bohanec,et al.  The Analytic Hierarchy Process , 2004 .

[73]  J. Buckley,et al.  Fuzzy hierarchical analysis , 1999, FUZZ-IEEE'99. 1999 IEEE International Fuzzy Systems. Conference Proceedings (Cat. No.99CH36315).