Search
Now showing items 61-70 of 85
Empowering Responsible Online Gambling by Real-time Persuasive Information Systems
(IEEE, 2018-05)
Online gambling, unlike other mediums of problem-atic and addictive behaviours, such as tobacco and alcohol, offers unprecedented opportunities for building information systems that are able to monitor and understand a ...
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem
(2018)
In the Internet of Things (IoT) ecosystem the volume of data generated by devices in the user’s environment is constantly increasing and becoming of particular value. In such an environment the average user is bound to ...
An Online Service for Topics and Trends Analysis in Medical Literature
(IFMBE Proceedings, 2018-05)
Topic modeling refers to a suite of probabilistic algorithms for extracting word patterns from a collection of documents aiming for data clustering and detection of research trends. We developed an online service that ...
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology
(International Conference on Security for Information Technology and Communications, 2018)
The value of personal data generated and managed by smartdevices which comprise the Internet of Things (IoT) is unquestionable.The EU General Data Protection Regulation (GDPR) that has beenrecentlyput in force, sets the ...
Deriving the Political Affinity of Twitter Users from Their Followers
(IEEE, 2018)
In this work, we show that Twitter users can reveal valuable political information about particular Nodes of Interest (NOIs) they opt to follow. More precisely, we utilize an interesting graph projection method and a series ...
How much does a zero-permission Android app know about us?
(2019-11)
Android devices contain a vast amount of personal data of their owners. These data are stored on the device and are protected by the Android permission scheme. Android apps can obtain access to specific data items by ...
Privacy Leakages about Political Beliefs through Analysis of Twitter Followers
(Pan-Hellenic Conference on Informatics, 2018-11)
In this paper, we focus on privacy leakages about Twitter usersand show that simply establishing follower and friend connectionsin the Twitter network might be enough to reveal sensitive in-formation about the political ...
Enhancing Deniability against Query-Logs
(Springer, 2011)
We propose a method for search privacy on the Internet, focusing onenhancing plausible deniability against search engine query-logs. The method ap-proximates the target search results, without submitting the intended query ...
Η προθυμία πληρωμής για την προστασία του περιβάλλοντος ως συνάρτηση των ιδεών για την περιβαλλοντική υποβάθμιση
(2012-09)
Η παρούσα μελέτη παρουσιάζει τη διερεύνηση της προθυμίας του καταναλωτή για την οικονομική ενίσχυση της περιβαλλοντικής προστασίας με κάποιας μορφής εισφοράς.
Η ιδιαιτερότητα της μελέτης εστιάζεται στο γεγονός ότι ...
A privacy-preserving cloud computing system for creating participatory noise maps
(IEEE, 2012)
Participatory sensing is a crowd-sourcing technique which relies both on active contribution of citizens and on their location and mobility patterns. As such, it is particularly vulnerable to privacy concerns, which may ...