Menu Search Nederlands

Mortaza Shoae Bargh

Lector Privacy & Cybersecurity


By Mortaza Shoae Bargh

On statistical disclosure control technologies

for enabling personal data protection in open data settings

Influence of mental models on the design of cyber security dashboards

Privacy and security in smart data collections by citizens

On using obligations for usage control in joining of datasets

A framework for dynamic data quality management

Privacy and information sharing in judicial setting: a wicked problem

Dynamic data quality management framework using issue tracking systems

Fraud indicators applied to legal entities: an empirical ranking-approach

Compressing large amounts of netflow data using a pattern classification scheme

Meeting open data halfway: on semi-open data paradigm

A study of preventing email (spear) phishing by enabling human intelligence

Privacy protection in data sharing: towards feedback solutions

Integrating Semi-Open Data in a criminal judicial setting

Management of data quality related problems: exploiting operational knowledge

On addressing privacy in disseminating judicial data: towards a methodology

On design and deployment of two privacy-preserving procedures for judicial-data dissemination

On usage control in relational database management systems: obligations and their enforcement in joining datasets

Maturing pay-as-you-go data quality management: towards decision support for paying the larger bills

Exploring a warrior paradigm to design out cybercrime

Research skills for computer engineering undergraduates in Dutch Universities of Applied Sciences

On enabling Smart Government: a legal logistics framework for future criminal justice systems

Legal logistics: a framework to unify data centric services for a smart and open justice

Exploiting big data for evaluation studies

Exploiting data analytics for social services: on searching for profiles of unlawful use of social benefits

Challenges of Big Data from a philosophical perspective

A conceptual framework for addressing IoT threats: challenges in meeting challenges

We use cookies to improve the website.