Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Big Data (1)
- Big data (1)
- Big data research (1)
- Cloud computing (1)
- Collaborative filtering (1)
-
- Computational Biology (1)
- Cybersecurity (1)
- Data Mining (1)
- Data acquisition (1)
- Data aggregation (1)
- Data update (1)
- Elliptic curve cryptography (1)
- Ethics (1)
- Financial Management (1)
- Guidelines as Topic (1)
- Internal attack (1)
- Internet (1)
- Matrix factorization (1)
- P2P (1)
- Privacy (1)
- Privacy Preservation (1)
- Procure-to-pay (1)
- Sampling (1)
- Smart grid (1)
- Social Networks (1)
- Social media (1)
- Societies, Scientific (1)
- Software (1)
- Trustworthiness (1)
- Vendor (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Information Security
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu
Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu
Information Science Faculty Publications
Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Geography Faculty Publications
No abstract provided.
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang
Theses and Dissertations--Computer Science
This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.
The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.
It is apparent that with more customers' preference data, recommender systems …
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu
Theses and Dissertations--Computer Science
Motivated by increasing public awareness of possible abuse of confidential information, which is considered as a significant hindrance to the development of e-society, medical and financial markets, a privacy preserving data mining framework is presented so that data owners can carefully process data in order to preserve confidential information and guarantee information functionality within an acceptable boundary.
First, among many privacy-preserving methodologies, as a group of popular techniques for achieving a balance between data utility and information privacy, a class of data perturbation methods add a noise signal, following a statistical distribution, to an original numerical matrix. With the help …