Menu Search Nederlands

Mortaza Shoae Bargh

Lector Privacy & Cybersecurity


By Mortaza Shoae Bargh

On statistical disclosure control technologies

for enabling personal data protection in open data settings

Privacy and security in smart data collections by citizens

On using obligations for usage control in joining of datasets

A framework for dynamic data quality management

Privacy and information sharing in judicial setting: a wicked problem

Dynamic data quality management framework using issue tracking systems

Fraud indicators applied to legal entities: an empirical ranking-approach

Integrating Semi-Open Data in a criminal judicial setting

Compressing large amounts of netflow data using a pattern classification scheme

Management of data quality related problems: exploiting operational knowledge

On addressing privacy in disseminating judicial data: towards a methodology

Meeting open data halfway: on semi-open data paradigm

On design and deployment of two privacy-preserving procedures for judicial-data dissemination

On usage control in relational database management systems: obligations and their enforcement in joining datasets

Maturing pay-as-you-go data quality management: towards decision support for paying the larger bills

Influence of mental models on the design of cyber security dashboards

Exploring a warrior paradigm to design out cybercrime

On enabling Smart Government: a legal logistics framework for future criminal justice systems

Research skills for computer engineering undergraduates in Dutch Universities of Applied Sciences

Legal logistics: a framework to unify data centric services for a smart and open justice

A study of preventing email (spear) phishing by enabling human intelligence

Challenges of Big Data from a philosophical perspective

Privacy protection in data sharing: towards feedback solutions

Exploiting big data for evaluation studies

Exploiting data analytics for social services: on searching for profiles of unlawful use of social benefits

A conceptual framework for addressing IoT threats: challenges in meeting challenges

We use cookies to improve the website.