How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
7 Research Items
News about personal data breaches or data abusive practices, such as Cambridge Analytica, has questioned the trustworthiness of certain actors in the control of personal data. Innovations in the field of personal information management systems to address this issue have regained traction in recent years, also coinciding with the emergence of new de...
In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphori...
The widespread use of apps in response to COVID-19 raises concerns about privacy. Understanding the extent to which technology affects privacy and data protection is a core aspect of the Privacy Impact Assessment (PIA). PIA is a methodology for assessing the impacts on privacy of a technology that involves the processing of personal information, an...
Bitcoin is a cryptocurrency project that refers to its currency as "bitcoin" (capitalized!). This new payment system is peer-to-peer and operates without centralized authority (like a central bank). A "Distributed Multi-Agent System" (DMAS) is a Cryptocurrency Payment System (CPS). DMAS is made up of several interacting agents that are dispersed al...
Software piracy causes huge financial damages to software Industry. In this research, I am proposing an efficient method for neutralizing published patcher/patched files developed by crackers for software. The proposed method can be used as a powerful protective mechanism for codes which have already been generated. The idea behind this method is g...