Searched for:
(1 - 20 of 43)

Pages

document
van der Poel, Cesar (author)
Information-Centric Networking (ICN) is a networking paradigm proposed to replace the current IP network. It uses in-network caching to enhance availability. However, as a clean slate approach is unlikely to work, an architecture that allows for the two paradigms to coexist needs to me used to facilitate the transition. Several such...
bachelor thesis 2021
document
Arora, Shruti (author)
Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...
bachelor thesis 2021
document
Ştefan, Andrei (author)
Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including...
bachelor thesis 2021
document
Darbari, Shubhankar (author)
The expansion of the Internet and wireless access has led to a widespread increase of Internet of Things applications. These smart devices are becoming a daily aspect of our lives. All the convenient and automated services provided by smart devices come from a centralized service provider. This service provider has access to all the personal...
bachelor thesis 2021
document
van Tetering, Daphne (author)
The convenient service offered by credit cards and the technological advances in e-commerce have caused the number of online payment transactions to increase daily. With this rising number, the opportunity for fraudsters to obtain cardholder details via online credit card fraud has also increased. As a result, according to the European Central...
master thesis 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Dekker, F.W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Han, Rui (author), Li, Dong (author), Ouyang, Junyan (author), Liu, Chi Harold (author), Wang, Guoren (author), Wu, Dapeng Oliver (author), Chen, Y. (author)
To enable insight extractions without the risk of information leakage, deep learning (DL) models are increasingly built on federated edge participants holding local data, in combination with differential privacy (DP). The core theme is to tradeoff learning accuracy by adding statistically calibrated noises, particularly to local gradients of...
journal article 2021
document
Dekker, F.W. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020
document
Bentinck, S.A. (author), van Oel, C.J. (author), van Dorst, M.J. (author)
Informal face-to-face communication and chance encounters encourage knowledge sharing. This Post-Occupancy Evaluation (POE) examines how well a new building of a Dutch University Institute (DI) supported interaction and perceived privacy among faculty members. The study is designed as a qualitative research project with in-depth interviews...
journal article 2020
document
Ishmaev, G. (author)
Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the...
journal article 2020
document
van de Poel, I.R. (author)
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and accountability. Each cluster consists of a range of further values, which can be...
book chapter 2020
document
Rovers, Tim (author)
This master thesis explores to what degree information about a company's commitment to privacy can be extracted from a privacy statement. To do this, firstly a new database of more than 1500 privacy statements is created using Amazon Mechanical Turk. Next, 72 different aspects related to privacy of the statements are enumerated by using natural...
master thesis 2019
document
Prasad, Nivedita (author)
People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...
master thesis 2019
document
Shriram, Sharad (author)
Modern web information systems use machine learning models to provide personalized user services and experiences. However, machine learning models require annotated data for training, and creating annotated data is done through crowdsourcing tasks. The content used in annotation crowdsourcing tasks like medical records and images might contain...
master thesis 2019
document
de Jong, Alex (author)
This study aims to provide insight into how factors relating to privacy and incentives influence people's willingness to participate in sharing their vehicle based sensing data with governmental parties for the purposes of improved dynamic traffic management in the Netherlands. Through the use of a stated preference experiment data is gathered...
master thesis 2019
document
van der Meulen, Sietske (author)
Digitalization and automation brings many amazing things; games, social media, navigation. However, it also makes us more vulnerable. The facelessness of cyber space and the emancipation of place makes it hard to grasp. Additionally, our personal data becomes more valuable and thereby more lucrative to criminalize. The combination of these...
master thesis 2019
document
Kraaij, Wessel (author), Verberne, Suzan (author), Koldijk, Saskia (author), de Korte, E.M. (author), van Dantzig, Saskia (author), Sappelli, Maya (author), Hulsebosch, Bob (author), Wabeke, Thymen (author), Neerincx, M.A. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
journal article 2019
Searched for:
(1 - 20 of 43)

Pages