12 research outputs found

    A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions

    Full text link
    In recent decades, social network anonymization has become a crucial research field due to its pivotal role in preserving users' privacy. However, the high diversity of approaches introduced in relevant studies poses a challenge to gaining a profound understanding of the field. In response to this, the current study presents an exhaustive and well-structured bibliometric analysis of the social network anonymization field. To begin our research, related studies from the period of 2007-2022 were collected from the Scopus Database then pre-processed. Following this, the VOSviewer was used to visualize the network of authors' keywords. Subsequently, extensive statistical and network analyses were performed to identify the most prominent keywords and trending topics. Additionally, the application of co-word analysis through SciMAT and the Alluvial diagram allowed us to explore the themes of social network anonymization and scrutinize their evolution over time. These analyses culminated in an innovative taxonomy of the existing approaches and anticipation of potential trends in this domain. To the best of our knowledge, this is the first bibliometric analysis in the social network anonymization field, which offers a deeper understanding of the current state and an insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure

    Artificial Intelligence and human collaboration in financial planning

    Get PDF
    Artificial intelligence (AI) can assist business leaders in automating time-consuming and labor-intensive operations such as data collection, aggregation, and purification. This enables them to devote more time to high-value tasks and make more informed business decisions. While AI has been shown to offer a number of advantages when it comes to data analysis and delivering insight for investment plan creation, it lacks the emotional intelligence required to meet more complicated investing needs. The privacy and security of clients is another issue that has developed as a result of the usage of artificial intelligence in financial planning.Because AI is still a relatively new breakthrough in an industry with millions of dollars invested, some industry insiders are concerned that cyber-security may not be as advanced as the technology itself, putting the company at risk of hacking. This research outlined several advantages that AI offer during financial planning, followed by limitations and challenges that come in decision making process with AI. Last, this article discusses how humans and AI might cooperate to provide a more strategic and realistic perspective when corporate decision-making processes are complex, unpredictable, and ambiguous

    Case-Based Decision Support for Disaster Management

    Get PDF
    Disasters are characterized by severe disruptions of the society’s functionality and adverse impacts on humans, the environment, and economy that cannot be coped with by society using its own resources. This work presents a decision support method that identifies appropriate measures for protecting the public in the course of a nuclear accident. The method particularly considers the issue of uncertainty in decision-making as well as the structured integration of experience and expert knowledge

    A Novel Graph-modification Technique for User Privacy-preserving on Social Networks, Journal of Telecommunications and Information Technology, 2019, nr 3

    Get PDF
    The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks. This paper describes the (k,l k,l k,l)-anonymity model used for social network graph anonymization. The method is based on edge addition and is utility-aware, i.e. it is designed to generate a graph that is similar to the original one. Different strategies are evaluated to this end and the results are compared based on common utility metrics. The outputs confirm that the na¨ıve idea of adding some random or even minimum number of possible edges does not always produce useful anonymized social network graphs, thus creating some interesting alternatives for graph anonymization techniques

    Geographic information extraction from texts

    Get PDF
    A large volume of unstructured texts, containing valuable geographic information, is available online. This information – provided implicitly or explicitly – is useful not only for scientific studies (e.g., spatial humanities) but also for many practical applications (e.g., geographic information retrieval). Although large progress has been achieved in geographic information extraction from texts, there are still unsolved challenges and issues, ranging from methods, systems, and data, to applications and privacy. Therefore, this workshop will provide a timely opportunity to discuss the recent advances, new ideas, and concepts but also identify research gaps in geographic information extraction

    Principles of Security and Trust

    Get PDF
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems

    Principles of Security and Trust

    Get PDF
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
    corecore