AFPr-AM: A Novel Fuzzy-AHP based Privacy Risk Assessment Model For Strategic Information Management of Social Media Platforms
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Milad Taleby Ahvanooey | W. Mazurczyk | H. D. Mazraeh | Shiyan Ou | M. Zhu | Chuan Li
[1] Milad Taleby Ahvanooey,et al. CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks , 2022, J. Inf. Secur. Appl..
[2] Abdul Majeed,et al. A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks , 2022, Electronics.
[3] Milad Taleby Ahvanooey,et al. Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey , 2022, IEEE Internet of Things Journal.
[4] G. Sudha Sadasivam,et al. Budget optimized dynamic virtual machine provisioning in hybrid cloud using fuzzy analytic hierarchy process , 2021, Expert Syst. Appl..
[5] Sudipta Roy,et al. A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets , 2021, Expert Syst. Appl..
[6] Nripendra P. Rana,et al. Fifty years of information management research: A conceptual structure analysis using structural topic modeling , 2021, Int. J. Inf. Manag..
[7] Shalini Chandra,et al. Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm , 2021, Comput. Commun..
[8] H. Eroglu. Multi-criteria decision analysis for wind power plant location selection based on fuzzy AHP and geographic information systems , 2021, Environment, Development and Sustainability.
[9] Jyoti Sekhar Banerjee,et al. A decision model for selecting best reliable relay queue for cooperative relaying in cooperative cognitive radio networks: the extent analysis based fuzzy AHP solution , 2021, Wireless Networks.
[10] Chia-Nan Wang,et al. A Compromised Decision-Making Approach to Third-Party Logistics Selection in Sustainable Supply Chain Using Fuzzy AHP and Fuzzy VIKOR Methods , 2021, Mathematics.
[11] José Ramón Saura,et al. Evaluating security and privacy issues of social networks based information systems in Industry 4.0 , 2021, Enterp. Inf. Syst..
[12] Yafei Wang,et al. Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process , 2021, Wirel. Pers. Commun..
[13] Pradeep Kumar,et al. Privacy Preserving in Online Social Networks Using Fuzzy Rewiring , 2021, IEEE Transactions on Engineering Management.
[14] A. Hausmann,et al. How to address data privacy concerns when using social media data in conservation science , 2021, Conservation biology : the journal of the Society for Conservation Biology.
[15] Nityesh Bhatt,et al. Analysing the factors affecting the selection of ERP package: a fuzzy AHP approach , 2021, Inf. Syst. E Bus. Manag..
[16] Fatma Kutlu Gündoğdu,et al. Evaluating public transport service quality using picture fuzzy analytic hierarchy process and linear assignment model , 2021, Appl. Soft Comput..
[17] Byeong Ho Kang,et al. A decision model for blockchain applicability into knowledge-based conversation system , 2021, Knowl. Based Syst..
[18] Mingwu Zhang,et al. PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks , 2021, Comput. Stand. Interfaces.
[19] Ali Osman Atahan,et al. AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles , 2020, Appl. Soft Comput..
[20] Noel Crespi,et al. Impersonation on Social Media: A Deep Neural Approach to Identify Ingenuine Content , 2020, 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[21] Raymond Y. K. Lau,et al. Privacy preserving big data analytics: A critical analysis of state‐of‐the‐art , 2020, WIREs Data Mining Knowl. Discov..
[22] Kim-Kwang Raymond Choo,et al. Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective , 2020, Comput. Hum. Behav..
[23] Sabine Trepte. The Social Media Privacy Model: Privacy and Communication in the Light of Social Media Affordances , 2020 .
[24] Myrna Holtz Wooders,et al. Subgame-perfect cooperation in an extensive game , 2020, J. Econ. Theory.
[25] Wu He,et al. A meta-analysis to explore privacy cognition and information disclosure of internet users , 2020, Int. J. Inf. Manag..
[26] Antonio F. Gómez-Skarmeta,et al. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework , 2020, Future Gener. Comput. Syst..
[27] Ali Tamimi,et al. A privacy-preserving model to control social interaction behaviors in social network sites , 2019, J. Inf. Secur. Appl..
[28] Ghazaleh Beigi,et al. Privacy Preserving Text Representation Learning , 2019, HT.
[29] Muhammet Gul,et al. AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis , 2019, Complex & Intelligent Systems.
[30] Sigal Tifferet,et al. Gender differences in privacy tendencies on social network sites: A meta-analysis , 2019, Comput. Hum. Behav..
[31] Melih Yucesan,et al. Risk evaluation and prevention in hydropower plant operations: A model based on Pythagorean fuzzy AHP , 2019, Energy Policy.
[32] Stefan Rass,et al. Game Theory for Security and Risk Management: From Theory to Practice , 2018 .
[33] Ruggero G. Pensa,et al. A privacy self-assessment framework for online social networks , 2017, Expert Syst. Appl..
[34] Fang Liu,et al. On Consistency in AHP and Fuzzy AHP , 2017 .
[35] Shaolei Ren,et al. Game Theory for Cyber Security and Privacy , 2017, ACM Comput. Surv..
[36] David Hutchison,et al. Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends , 2017, IEEE Communications Surveys & Tutorials.
[37] Shona Leitch,et al. Social media as an information system: improving the technological agility , 2017, Enterp. Inf. Syst..
[38] Sylvain Kubler,et al. A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications , 2016, Expert Syst. Appl..
[39] Vladimir A. Oleshchuk,et al. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions , 2016, Int. J. Inf. Manag..
[40] Brij B. Gupta,et al. Social media security and trustworthiness: Overview and new direction , 2016, Future Gener. Comput. Syst..
[41] Xiaohui Liang,et al. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.
[42] Hong Wang,et al. An application of nonlinear fuzzy analytic hierarchy process in safety evaluation of coal mine , 2016 .
[43] Babajide Osatuyi,et al. Personality Traits and Information Privacy Concern on Social Media Platforms , 2015, J. Comput. Inf. Syst..
[44] Zeshui Xu,et al. Intuitionistic Fuzzy Analytic Hierarchy Process , 2014, IEEE Transactions on Fuzzy Systems.
[45] Mohammad Ali Shafia,et al. Integrating Fuzzy Kano and Fuzzy TOPSIS for Classification of Functional Requirements in National Standardization System , 2014 .
[46] Tsan-sheng Hsu,et al. A logical framework for privacy-preserving social network publication , 2014, J. Appl. Log..
[47] H. Raghav Rao,et al. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..
[48] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[49] Seyed Jafar Sadjadi,et al. Design a new intelligence expert decision making using game theory and fuzzy AHP to risk management in design, construction, and operation of tunnel projects (case studies: Resalat tunnel) , 2011 .
[50] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[51] Stefan Weiss,et al. Privacy threat model for data portability in social network applications , 2009, Int. J. Inf. Manag..
[52] Michael Hadjimichael,et al. A fuzzy expert system for aviation risk assessment , 2009, Expert Syst. Appl..
[53] Manoj Kumar Tiwari,et al. Global supplier selection: a fuzzy-AHP approach , 2008 .
[54] Metin Dağdeviren,et al. Developing a fuzzy analytic hierarchy process (AHP) model for behavior-based safety management , 2008, Inf. Sci..
[55] D. Boyd. Facebook's Privacy Trainwreck , 2008 .
[56] N. Nisan. Introduction to Mechanism Design (for Computer Scientists) , 2007 .
[57] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[58] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[59] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[60] N. Nisan,et al. Algorithmic Mechanism Design , 2001, Games Econ. Behav..
[61] James J. Buckley,et al. Fuzzy hierarchical analysis revisited , 2001, Eur. J. Oper. Res..
[62] D. Chang. Applications of the extent analysis method on fuzzy AHP , 1996 .
[63] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[64] Mao-Jiun J. Wang,et al. Ranking fuzzy numbers with integral value , 1992 .
[65] Muhammad Azeem Akbar,et al. Agile trends in Chinese global software development industry: Fuzzy AHP based conceptual mapping , 2021, Appl. Soft Comput..
[66] Peng Jiang,et al. The application of cloud model combined with nonlinear fuzzy analytic hierarchy process for the safety assessment of chemical plant production process , 2021 .
[67] Suryanti Awang,et al. Android mobile malware detection using fuzzy AHP , 2021, J. Inf. Secur. Appl..
[68] Eliciane Maria da Silva,et al. A fuzzy AHP approach to select suppliers in the Brazilian food supply chain , 2020 .
[69] Yang Jie,et al. Application of fuzzy analytic hierarchy process in the risk assessment of dangerous small-sized reservoirs , 2018, Int. J. Mach. Learn. Cybern..
[70] David Sánchez,et al. Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines , 2013, Inf. Sci..
[71] Hock-Hai Teo,et al. Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.
[72] M. Bohanec,et al. The Analytic Hierarchy Process , 2004 .
[73] J. Buckley,et al. Fuzzy hierarchical analysis , 1999, FUZZ-IEEE'99. 1999 IEEE International Fuzzy Systems. Conference Proceedings (Cat. No.99CH36315).