12 research outputs found
A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions
In recent decades, social network anonymization has become a crucial research
field due to its pivotal role in preserving users' privacy. However, the high
diversity of approaches introduced in relevant studies poses a challenge to
gaining a profound understanding of the field. In response to this, the current
study presents an exhaustive and well-structured bibliometric analysis of the
social network anonymization field. To begin our research, related studies from
the period of 2007-2022 were collected from the Scopus Database then
pre-processed. Following this, the VOSviewer was used to visualize the network
of authors' keywords. Subsequently, extensive statistical and network analyses
were performed to identify the most prominent keywords and trending topics.
Additionally, the application of co-word analysis through SciMAT and the
Alluvial diagram allowed us to explore the themes of social network
anonymization and scrutinize their evolution over time. These analyses
culminated in an innovative taxonomy of the existing approaches and
anticipation of potential trends in this domain. To the best of our knowledge,
this is the first bibliometric analysis in the social network anonymization
field, which offers a deeper understanding of the current state and an
insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure
Artificial Intelligence and human collaboration in financial planning
Artificial intelligence (AI) can assist business leaders in automating time-consuming and
labor-intensive operations such as data collection, aggregation, and purification. This enables
them to devote more time to high-value tasks and make more informed business decisions.
While AI has been shown to offer a number of advantages when it comes to data analysis and
delivering insight for investment plan creation, it lacks the emotional intelligence required to
meet more complicated investing needs. The privacy and security of clients is another issue
that has developed as a result of the usage of artificial intelligence in financial
planning.Because AI is still a relatively new breakthrough in an industry with millions of
dollars invested, some industry insiders are concerned that cyber-security may not be as advanced as the technology itself, putting the company at risk of hacking. This research outlined several advantages that AI offer during financial planning, followed by limitations and challenges that come in decision making process with AI. Last, this article discusses how humans and AI might cooperate to provide a more strategic and realistic perspective when corporate decision-making processes are complex, unpredictable, and ambiguous
Case-Based Decision Support for Disaster Management
Disasters are characterized by severe disruptions of the society’s functionality and adverse impacts on humans, the environment, and economy that cannot be coped with by society using its own resources. This work presents a decision support method that identifies appropriate measures for protecting the public in the course of a nuclear accident. The method particularly considers the issue of uncertainty in decision-making as well as the structured integration of experience and expert knowledge
A Novel Graph-modification Technique for User Privacy-preserving on Social Networks, Journal of Telecommunications and Information Technology, 2019, nr 3
The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks. This paper describes the (k,l k,l k,l)-anonymity model used for social network graph anonymization. The method is based on edge addition and is utility-aware, i.e. it is designed to generate a graph that is similar to the original one. Different strategies are evaluated to this end and the results are compared based on common utility metrics. The outputs confirm that the na¨ıve idea of adding some random or even minimum number of possible edges does not always produce useful anonymized social network graphs, thus creating some interesting alternatives for graph anonymization techniques
Geographic information extraction from texts
A large volume of unstructured texts, containing valuable geographic information, is available online. This information – provided implicitly or explicitly – is useful not only for scientific studies (e.g., spatial humanities) but also for many practical applications (e.g., geographic information retrieval). Although large progress has been achieved in geographic information extraction from texts, there are still unsolved challenges and issues, ranging from methods, systems, and data, to applications and privacy. Therefore, this workshop will provide a timely opportunity to discuss the recent advances, new ideas, and concepts but also identify research gaps in geographic information extraction
Principles of Security and Trust
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
Principles of Security and Trust
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems