January 2023
·
62 Reads
·
2 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 2023
·
62 Reads
·
2 Citations
November 2022
·
54 Reads
·
8 Citations
July 2022
·
3 Reads
·
8 Citations
Privacy on the Web is typically managed by giving consent to individual Websites for various aspects of data usage. This paradigm requires too much human effort and thus is impractical for Internet of Things (IoT) applications where humans interact with many new devices on a daily basis. Ideally, software privacy assistants can help by making privacy decisions in different situations on behalf of the users. To realize this, we propose an agent-based model for a privacy assistant. The model identifies the contexts that a situation implies and computes the trustworthiness of these contexts. Contrary to traditional trust models that capture trust in an entity by observing large number of interactions, our proposed model can assess the trustworthiness even if the user has not interacted with the particular device before. Moreover, our model can decide which situations are inherently ambiguous and thus can request the human to make the decision. We evaluate various aspects of the model using a real-life data set and report adjustments that are needed to serve different types of users well.
... Qualitative research is a method of inquiry that involves collecting and analyzing non-numerical data, such as text, audio, or video, to gain insights into concepts, opinions, or experiences [42]. It has been used in various fields, including medicine [43], social sciences [44], and usable security [45], and has led to valuable contributions to our understanding of many real-world problems. In this study, we employ the approach of qualitative coding to minimize the subjectivity in human judgment and create a structured representation of phishing emails that is likely to be reproducible by other researchers. ...
January 2023
... Saka et al. [50] researched phishing email classification by a combination of BERT and three ML classifiers (K-Means, DBSCAN, and Agglomerative). The consolidated Nazario and Enron datasets were used in their experiments. ...
November 2022
... As the application scenario shifts from sharing photos on social networks to the interaction between users and personal assistants, and even as users manage their privacy needs across multiple devices, context has become a focus for researchers [33,19,4]. This notion serves as the impetus for Kokciyan et al. [23] to put forth a situation-based model for privacy protection. The model examines diverse contexts using natural language processing algorithms and SVM classifiers to categorize contexts and scenarios. ...
July 2022