University Data Analytics: Integration And Privacy Assignment Sample

University Data Analytics: Integration And Privacy Assignment by New Assignment Help

  • 54000+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
- +
35% Off
£ 6.69
Estimated Cost
£ 4.35
23 Pages 5776Words

Introduction of University Data Analytics: Integration And Privacy Assignment

Get free written samples from subject experts and Assignment Writing in UK.

Data analytics has emerged as a critical and problematic topic in a variety of industries. It has become one of the most worrisome issues in the computer science, medicinal, and financial fields. Because a large amount of data is present for the inquiry, several strategies for scalable assimilation are required. At the same time, a fresh privacy issue emerges in which one specific data can be simply shares over a massive amount of data. Scientists as well as decision makers have unprecedented access on the way to precise, timely, as well as varied information regarding consumers' actions & attitudes in digitally data-rich contexts. Such large volumes of data, dubbed "big data," are distinguished through their great volume, high speed, as well as high diversity. The huge quantity as well as complexity of these information enable for unparalleled precision in consumer analytics; their velocity gives real-time views; as well as accessibility across diverse, previously inaccessible or undiscovered resources of information expand within new insights into consumer demands as well as desires.


The study’s main aim is to analyze a set of particular data to provide security-based privacy and integration to the system. In this research different data analytics methods are needed to be followed to provide integration and privacy. The purpose is also associated with gathering valuable information, storing those data and analyzing them according to the need of the university.


  • To collect valuable information about the data analytics
  • To store data and analyze data of the university
  • To protect the data of the university

Research question:

Q1. How to collect informative information?

Q2. How to store data?

Q3. How do analyze informative data?

Q4. How to protect data?

Research Rationale:

What is the issue?

In this research project, the main issue is timing; the introduction risk manager is charged with the amount of data. It takes a lot of time to process the data to act as a replacement. The visual representation and poor data quality are there. Inaccurate data is manual errors. Without good input, the output will be unreliable. Significantly, negative consequences are analyzed to influence decisions. There has been found some pressure from higher authority (Davison et al. 2021). They expect high returns. Many pursuits do not support them, i.e. lack of support from other employees. In this process perform the process that is too far consuming and unnecessary. Collecting meaningful real-time data is another problem which is found. It needs to be solved.

Why is the issue?

The problems are short of timing in project build, communication with other employees’ communication problems also most important, lack of support from other employees is most essential, and high expectation of higher authority (Zhang et al. 2019). Confusion is also significant many times in confusing files storing another folder are creating a problem, budget, or shortage of data. These are the main issues which may be observed during the research.

What is the impact of this research?

Data analysis improves decision making, increases accountability, it benefits financial health, and helps employees monitor performance. Important informative university data store, analyze the data and keep store it. Data analysis is the study of analyzing huge amounts of data. It is going to heaps of data, which is getting more researchers to handle every passing time. Keep visualizing your results to interpret them. It makes data a lot simpler and more accurate.

It analyzes all current data, former problems, and studies and finally concludes by providing me with the most effective solution. The final stage of the process is to visualize interpreting. While interpreting to keep staying true (Thuraisinghamet al. 2018). The original purpose of this project, whatever the results, did not match the expectation. The result contradicts what is happening.

Literature review:

According to Qi et al. 2020, cyber-physical social systems are played in daily activities in smart cities producing several industrial data connected with transport, health, social, business, social activity, and so on. Effectively, productivity and efficiently fusing and mining such data from multiple sources contribute to much development and improvements of smart cities. Industrial data was collected from smart cities to analyze prediction performances. It is to protect correct data analysis and forecast the results after data fusion (Quintel and Wilson, 2020). Industrial environments build on the definite locality-sensitive hashing (LSH).

It is a set of experiments. Experiment results show better prediction. Data analyze the behavior of citizens of practical and positive value-added services in smart cities. Different platforms and data function inevitably take the issue, and the feasibility of the proposal is validated by experiment. This paper benefits data analysis and applications in smart cities. There are several factors besides time and location. The compaction strategy of privacy is breached. It will be utilized for better execution of administration-based frameworks. The information is appropriated across various modern platforms used for adaptability approval reasons, solidly, 64 Pisces worldly data is accounted for in the dataset (Vu et al. 2019). There are three strategies which was carried out and tried. The combination and sharing of shrewd urban communities by information are huge. Errands are conveyed in various modern stages. Security protection is a viable and basic issue that should be considered as a brilliant city modern climate. Our proposition depends on a three-layer design. The name is client layer (information age), edge layer (information protection disposal and information sifting), and cloud layer (information combination, investigation, and forecast).

As indicated by Barril et al. 2017, Educational information mining (EDM) is a developing scholarly critical test and a gigantic opportunity. Most of the EDM is based on helping and upgrading understudy learning and execution. It is centered on administration improvement and school preparation. This paper concentrated on sta. Teresa school is situated in the northern area of West Africa. Instructive information is the utilization of cutting-edge information mining procedures to take care of the issues. A northern school STA Teresa desires to further develop administration conveyance utilizing appropriate administration, design, and sending model (Qi et al. 2020). Information mining methods expected to the contentions and information sources length different topographical limits and wards, protection and security and proposed on engineering model, for example, execute a layer in that plan.

The majority of the EDM instruments follow through on that guarantee of protection and security, it neglects to incorporate the plan. The vehicle channel is packed with the smallest misusing of security implementation. We took a gander at three organization choices mixture and completely facilitated the differentiation them. School protection and security concerns take interest in RDBMS arrangements. Prescribing and designing models to address specialized difficulties. Results are given the IT embraced rate in that space where the school is found (Jin et al. 2019). School assists with instructing and impact protection regulations around there. It has been offered the school with a particular activity to help its protection and security.

According to Van Soestet al. 2018, Data mining algorithms are unable to satisfy the new requirement to analyze big data in some fields making judicial and text records. It has been applied different techniques to get information for a diverse dataset. Analyze this data automatically. At work, privacy preservation does not exist to our knowledge. It is proposed the infrastructure and proved the concept for privacy-preserving analysis to vertical split data. Healthcare provides care documents and increases secondary development based on healthcare and healthcare learning systems (Chen et al. 2018). Using syntactical standards mostly targeted the exchange system.

Foundation and evidence of idea is extremely important on the way to reproduce information. Confirmation of idea performed. In just a single model, the fracture is reused in both (even and vertical splits). Current work is worried about factors in POC restricted scope utilization of recreation information. The framework needs greater security. Moral, lawful and cultural issues (ELSI) are significant in the framework and have no degree in the current model. ELSI is a specialized and logical choice that proceeds with banter among various partners and Evolves over time. It has been applied the ELSI fostering within this POC and showing the specialized chance in that field. The various methodologies for corresponding information investigation will be examined in the ELSI structure (Moktadir et al. 2019). Numerous partner perspectives is an illustration of some logical inquiry is responded to with STM technique that is ELSI brings about various specialized open doors in logical bearing. A specialized point of view will exist in fracture improvement and use it.

According to Quintet al. 2020, academic libraries have traditionally turned to gain insights into their web properties. The data analysis continues to grow about usual privacy except for discussion in technology. Serial librarians, adam chandler, and melissa describe learner privacy rules including in google analytics (GA) how reader privacy is one of the core tenets of librarianship. The author explores the practicable using matomo. Matomo is free open software. It is used for web analysis in their libraries. Matomo is a web analytics platform designed around user privacy. This process makes comparisons between motomo & google analytics. EBSCO discovered it is an open-source analytic platform to work on library applications (Li et al. 2020). It is informed that in 2005, GA set the benchmark to get success, take their GA completely, change new ideas and keep their position in the library. In 2007, motamo came without a leader. Motamo is a copyleft GPL free open source software. It is designed with user privacy.

FOSS is used in libraries, it is unpaid software. FOSS is used in free coding, downloading, changing, and replacing without any cost. Budgeting hosted subscription, supporting or cost of any library and maintaining that application like amazon service or Microsoft is necessary. Motomo ensures that the library patron data control and protected.

An open access movement is a third-party data collection with privacy. To protect privacy Matomo allows library leaders. It has been focused the pilots on EDS (Prasseret al. 2018). The author indicates and verifies that matomo is not challenging with traditional web properties analysis. Library application discovers layer service.

According to Zhang et al, 2019 federated learning is important as the solution to promising the analytics of big data. It trains the global model jointly through multiple devices. Although the participants are very sensitive about the fear of data information leakage to any untreatable server by the process of uploading the gradient vectors. To solve this issue there is a feature called privacy-enhanced federated learning (PEEL). This feature is basically to give the protection of the elements over the untreatable server. Mainly this is enabled through the local gradients of the encrypting participant including the Parlier homomorphic cryptosystem. To decrease the total costs of the cryptosystem there is a process that is DSSGD (distributes the selective stochastic gradient descent). This happens in the local phase of that training to get distributed encryption. All over we can say the gradients that are encrypted can be used in the future to secure sum aggregation at the side of the server (Tawalbehet al. 2020). Using this process the untrustable server can determine the aggregated statistics for the updates of all participants. At the same time, the individual data will be safe, private, and protected. For the analysis of the security, there are a few cryptographic problems that are hard to solve with the above-mentioned skills. This paper generally presents the Privacy-Enhanced Federated Learning Protocol (PEEL). This paper is generally related to the cryptosystem that is known as the additive homomorphic cryptosystem. It can help to prevent the leakage method of the user from the untrustable server (Stergiouet al. 2018). Generally, security analysis helps to prove the authentication, privacy process, and confidentiality that can be achieved by the scheme.

According to Prasseret al, 2019 in medical research the latest data-driven needs a high patient level in data at the comprehensive depth as well as the breadth. The reason behind this is to make the big dataset that is needed, data from the sources can be integrated into the warehouse that is clinical and translational. Normally this is developed with the extract, loading process, and the transform that can be accessed into the analytic platforms. The protection of privacy requires consideration carefully while the data will be reused not for the primary purpose. Information anonymization is a very urgent protection method. Although the common ETL does not allow anonymization and the common anonymization tools can't be easily integrated into the workflows of the ETL (Esposito et al. 2018). The main goals of this work are discussed here. All the goals are such as the anonymization process that is based on the risk assessments method at the expert level. Another goal is to use the transformation process that saves both the schematic properties of the data and the truthfulness of the data. The third goal is to develop a path that is easy to determine as well as configure. Last but not least go0al is to give very high scalability. Here the design of a novel and the effective anonymization and the development of plugging for the PDI helps to enable the data that is integrated. Using combining various intenses into one single ETL path, the information can be safe from multiple threats. The support for plug-ins is very large. This work generally shows the anonymization methodologies that are at the expert level. And it can depart into the ETL workflows (Gebremichaelet al. 2020). This development is available under the non-restrictive source license that is open and it can overcome various limitations of the other tools of data anonymization. 

According to Davison et al. 2021, The world is creating exabytes of data a day today. This huge blast in the development of information makes a need for information examination advances as well as compelling stockpiling and recovery frameworks. Relatedly, this tremendous measure of information presents protection challenges going from legitimate limitations to moral data use. The creators of this paper talk about a system that empowers security mixtures in all parts of huge information examinations (Viratet al. 2018). Moreover, the creators present TIPPERS: a testbed for security improving innovations.

In this paper, security issues connected with huge information examinations were talked about. Most researchers gauge that the world produces exabytes of data consistently. Connected with that tremendous measure of data are protection concerns.

The creators started the paper with a writing survey giving a logical conversation that covered the early ideas of huge information and enormous information investigation. Starting there, the possibility of protection from lawful definition to current issues was introduced. The writing survey closed with a conversation on protection and security concerning huge information examinations.

To address protection thought in the space of huge information investigation, the creators propose Cavoukian's (2011) PbD approach. This approach is to such an extent that protection is a necessary part of framework designing and is pervasive in all plan stages (Hassan et al. 2020). This puts security as a planning guideline and not as an after-suspect.

The researchers completed this paper with a conversation of TIPPERS in both a tactical climate as well as an apparatus for Coronavirus alleviation. In the two cases, the protection was talked about to save the usefulness of the framework. Large information investigation presents various protection concerns. Data fraud to genuine actual mischief can result from information security breaks. These major issues make security research a significant theme for researchers to seek after.


Data analytics has turned out to be an essential as well as challenging issue within the various sectors. It has become one of the concerning things inside the computer science background, medical along with finance sector. Since a lot of quantity of information is present for the investigation, some methods for scalable assimilation become essential. At the very similar moment of time, novel privacy problem appear wherein one’s precise data could be easily transferred through the huge quantity of data. In this methodology section, first of all it is covered all of the important methods which are needed to identify the actual problem then overcoming those situations. It has been recognized the information records which is related to the real-world entity. The current breakdown of the information has now created a confronting issue within a broad range of appliances (Aggarwal and Goswami, 2022). It has been suggested a scalable entity resolution methods along with some novel features which is not examined in the past. Next, it is introduced the issue of regulating, where people should try on the way to prevent essential bits of data through being solved via ER to defend across loss of data privacy. Since huge amount of sensitive information become revealed towards a range of users such as medical specialist, company workers & so forth, there has been greater possibility that an antagonist could attach the dots as well as the gather all the valuable information, pushing towards greater loss of security. It has been proposed an assessment for analyzing the data dripping as well as utilizes the disinformation as equipment in the direction of comprising the data leakage.

Research Philosophy


For conducting every research the first thing which arrives in the mind is its research philosophy. It is one of the valuable parts of the research methodology. By this section of the methodology the main principle of the research can be easily understood (Gupta, 2020). As this is a secondary research here the idea of various experts has been gathers for fulfilling all of the requirements of the context. Looking at the perspective of the research it has been selected the Positivism research philosophy. This is most dependable philosophy which is very popular among the experts. Such kind research philosophy provides a special value towards the research. New illustrations along with innovative ideas can be easily represented via this method. The reliability of this philosophy is also very high.

Research Approach


In the direction of completing the research it is used the Inductive research approach. This type of research approach helps to complete any research in a plan basis (Hassan et al. 2020). Inside every research there are a lot of steps. The implementations of those steps within a single research sometime may hard. In that case, the inductive research approach is very effective to make it simple. This approach is applied via certain investigation process. On the way to get perfect outcome, the research approach helps to forecast the accurate value.

Research Design


The research design has a special significance towards the methodology. As per the selected topic the explorative research design is best suitable for this research. To conduct any research there need to create some plans and according to the plans it requires to create a best design based on these. In this study it has been investigated several procedures (Li et al. 2020). It is explored several journals for getting numerous information. Such exploration has been performed on the way to provide the research huge sustainability. As this is secondary kind of research, the exploration of different studies is must. This can help to fulfill the knowledge about the topic.

Research Method


There are two main types of research method. One is the Qualitative method as well as another one is the Quantitative method. In the research the qualitative method has been chosen. Data is one of the valuable things of the economy but certain privacy concerns are also there. All the data around the world is not safe. For this purpose the research has been conducted on the way to provide a novel method in the direction of increasing the data privacy among various sectors. After all it is extremely important to keep all of the data in a safe hand. Only then people may feel reliable. In this research a broad variety of methods have been used which satisfy various measurements of privacy (Lin et al. 2020). Moreover, the present context indicates various features about to the data analytics as well as the privacy. This includes the data gathering through different sources, storage all of the valuable information, verification of the information as well as rectify those data. After that it has been compared all of the data. Then it is given a perfect solution at various levels. At last it has been outlined numerous analytic methods which can be used towards the consumer privacy. All of these have been regulated by following the quality insights.

Research Strategy


For the data exploration it is needed to take a lot of actions. There have been numerous methods in the direction of selecting different techniques according to the study requirements. In the similar way, within the research it has been also utilized several techniques (Papst et al. 2019). For this reason it is an Action-Oriented research. The secondary research technique has been used to meet the project criteria. The research is concentrated by the side of the several facts. This type research strategy is very effective technique on the way to conduct any study with the experts along with populace of society.

Data collection


The research is based on the secondary approach. For this reason the data collection method is also secondary in nature. There are a lot of reasons behind selecting the secondary data collection method. The secondary data collection method is extremely simple to use. The secondary data source is easily available by the side of the online platform (Qi et al. 2020). On the way to gather secondary data it is not needed to invest a lot of money. Very minimum cost is needed to conduct such type of research. Sometime for the data collection it is not needed any amount. This data collection method is time saving. It does not need a lot of time to gather the data as well as analyze those collected data. The whole concept is already there in the previous research works. All it needs to do is to collect the most appropriate data related to the project topic and then it is needed to put innovative ideas inside those projects. By this method one can easily generate innovative insights through the prior research. One of the major benefits of this type of data collection is that anyone could gather any kind of information about this. The amount of the secondary resources is not limited.

Data analysis Procedure

Secondary Data analysis

Based on the data collection method the data analysis is also secondary. This data analysis method generally takes minimum time as well as minimum sources on the way to perform any research. This is just because the dataset is easily available and accessible. It requires the minimal cost for collecting such datasets. In this type of research study there is no require on the way to give the incentives in the direction of the study participants. This research procedure has been very economical (Salim et al. 2022). This data analysis technique saves energy as well as expenses. The secondary data analysis technique is very helpful towards the primary research. In future if anyone will conduct the primary research then they can take the help of this research data collection, data analysis as well as other important parts. By the secondary data analysis technique it can be easily compared all of the previous researches. After comparing it can tell which is best and which worst. Then based on the good article it will conduct the current research. In this way, it can be possible to make perfect researches which have a higher reliability as well as huge validity. In secondary research the possibility of error is always less. One disadvantage can also be found during conducting the research. The researcher might face with a lot of difficulties if they do not have specific knowledge about the particular topic (Tao et al. 2019). In case of obtaining the exact information as per the needs of the research is going to be difficult. But after all this methods could be conducted very quickly as well as at a minimal cost.

Throughout the research methodology section it has been found that the whole part consist a lot of methods in it. The positivism research philosophy, inductive research approach, action oriented research strategy, explorative design as well as the most important secondary data collection along with analysis have been the parts of the methodology section. These phases help people to recognize the project methods. In regards, throughout the research it has been determined the best data analytics methods inside the privacy-concerned world.

Ethical Consideration

Secondary research or desk research is a method of research that includes some information taking the help of the data that already exists. All the existing information is summarized and collated to increment the whole effectiveness of that research. Secondary research comes with the research material which is a published report of that research as well as similar documents. Some very common research methods come with the collection of data across the internet, archives, schools, organizational reports, and libraries. Using the secondary data must meet some key points that are the data or the information must be identified at the time of the release to the researcher (Sookhaket al. 2018). The outcomes of the analysis are not allowable to re-identify the participants. The use of the information must not be the result of any kind of damage. There are various types of research methods. Some of the research methods are discussed here such as existing reports, studies by the government, and the trade association. A huge number of secondary research methods are available on the web (Dai et al. 2020). The most excellent resource for secondary research is the government agencies, which are completely free of any kind of charge.



Aggarwal, L. and Goswami, P., 2022. Predictive Big Data Analytics and Privacy based Decision Support System. In Trust, Security and Privacy for Big Data (pp. 89-111). CRC Press.

Ahmad, K., JianMing, Z. and Rafi, M., 2020. Librarian's perspective for the implementation of big data analytics in libraries on the bases of the lean-startup model. Digital library perspectives.

Chen, K., He, Z., Wang, S.X., Hu, J., Li, L. and He, J., 2018. Learning-based data analytics: Moving towards transparent power grids. CSEE Journal of Power and Energy Systems4(1), pp.67-82.

Dai, H.N., Imran, M. and Haider, N., 2020. Blockchain-enabled internet of medical things to combat COVID-19. IEEE Internet of Things Magazine3(3), pp.52-57.

Davison, C.B., Lazaros, E.J., Zhao, J.J., Truell, A.D. and Bowles, B., 2021. Data privacy in the age of big data analytics. Issues in Information Systems22(2), pp.177-186.

DeYoung, M.E., Kobezak, P., Raymond, D.R., Marchany, R.C. and Tront, J.G., 2018, January. Privacy-preserving network security data analytics: Architectures and system design. In 51st Hawaii International Conference on System Sciences, 2018. The University of Hawaii at Manoa. Stergiou, C., Psannis, K.E., Xifilidis, T., Plageras, A.P. and Gupta, B.B., 2018, April. Security and privacy of big data for social networking services in the cloud. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 438-443). IEEE.

Esposito, C., De Santis, A., Tortora, G., Chang, H. and Choo, K.K.R., 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing5(1), pp.31-37.

Gebremichael, T., Ledwaba, L.P., Eldefrawy, M.H., Hancke, G.P., Pereira, N., Gidlund, M. and Akerberg, J., 2020. Security and privacy in the industrial internet of things: Current standards and future challenges. IEEE Access8, pp.152351-152366.

Gupta, I., Big data analytics vs Data Mining analytics Vinti Parmar, Department of Computer Science, Indira Gandhi University, Meerpur, Rewari Haryana, INDIA.

Hassan, M.U., Rehmani, M.H. and Chen, J., 2020. Differential privacy in blockchain technology: A futuristic approach. Journal of Parallel and Distributed Computing145, pp.50-74. Isaak, J. and Hanna, M.J., 2018. User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer51(8), pp.56-59.

Hassan, M.U., Rehmani, M.H. and Chen, J., 2020. Differential privacy in blockchain technology: A futuristic approach. Journal of Parallel and Distributed Computing145, pp.50-74.

Jin, H., Luo, Y., Li, P. and Mathew, J., 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access7, pp.61656-61669.

Lenert, L. and McSwain, B.Y., 2020. Balancing health privacy, health information exchange, and research in the context of the COVID-19 pandemic. Journal of the American Medical Informatics Association27(6), pp.963-966.

Li, Z., Sharma, V. and Mohanty, S.P., 2020. Preserving data privacy via federated learning: Challenges and solutions. IEEE Consumer Electronics Magazine9(3), pp.8-16.

Li, Z., Sharma, V. and Mohanty, S.P., 2020. Preserving data privacy via federated learning: Challenges and solutions. IEEE Consumer Electronics Magazine9(3), pp.8-16.

Lin, H., Garg, S., Hu, J., Wang, X., Piran, M.J. and Hossain, M.S., 2020. Privacy-enhanced data fusion for COVID-19 applications in intelligent Internet of medical Things. IEEE Internet of Things Journal8(21), pp.15683-15693.

Moktadir, M.A., Ali, S.M., Paul, S.K. and Shukla, N., 2019. Barriers to big data analytics in manufacturing supply chains: A case study from Bangladesh. Computers & Industrial Engineering128, pp.1063-1075.

Papst, F., Saukh, O., Römer, K., Grandl, F., Jakovljevic, I., Steininger, F., Mayerhofer, M., Duda, J. and Egger-Danner, C., 2019, October. Embracing opportunities of livestock big data integration with privacy constraints. In Proceedings of the 9th International Conference on the Internet of Things (pp. 1-4).

Prasser, F., Kohlbacher, O., Mansmann, U., Bauer, B. and Kuhn, K.A., 2018. Data integration for future medicine (FUTURE). Methods of information in medicine57(S 01), pp.e57-e65.

Qi, L., Hu, C., Zhang, X., Khosravi, M.R., Sharma, S., Pang, S. and Wang, T., 2020. Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment. IEEE Transactions on Industrial Informatics17(6), pp.4159-4167.

Qi, L., Hu, C., Zhang, X., Khosravi, M.R., Sharma, S., Pang, S. and Wang, T., 2020. Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment. IEEE Transactions on Industrial Informatics17(6), pp.4159-4167.

Quintel, D. and Wilson, R., 2020. Analytics and privacy. Information Technology and Libraries39(3).

Salim, S., Turnbull, B. and Moustafa, N., 2022. Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems. Ad Hoc Networks128, p.102786.

Sokak, M., Tang, H., He, Y., and Yu, F.R., 2018. Security and privacy of smart cities: a survey, research issues, and challenges. IEEE Communications Surveys & Tutorials21(2), pp.1718-1743.

Stergiou, C., Psannis, K.E., Gupta, B.B. and Ishibashi, Y., 2018. Security, privacy & efficiency of sustainable cloud computing for big data &IoT. Sustainable Computing: Informatics and Systems19, pp.174-184.

Tao, H., Bhuiyan, M.Z.A., Rahman, M.A., Wang, G., Wang, T., Ahmed, M.M. and Li, J., 2019. Economic perspective analysis of protecting big data security and privacy. Future Generation Computer Systems98, pp.660-671.

Tawalbeh, L.A., Muheidat, F., Tawalbeh, M. and Quwaider, M., 2020. IoT Privacy and security: Challenges and solutions. Applied Sciences10(12), p.4102.

Thuraisingham, B., Kantarcioglu, M., Bertino, E., Bakdash, J.Z. and Fernandez, M., 2018, June. Towards a privacy-aware quantified self data management framework. In Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies (pp. 173-184).

Virat, M.S., Bindu, S.M., Aishwarya, B., Dhanush, B.N. and Kounte, M.R., 2018, May. Security and privacy challenges in the internet of things. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 454-460). IEEE.

Vu, P., Adkins, M. and Henderson, S., 2019. Aware, but don't care: Student perspectives on privacy and data collection in online courses. Journal of Open, Flexible and Distance Learning23(2), pp.42-51.

Zhang, J., Chen, B., Yu, S. and Deng, H., 2019, December. PEFL: A privacy-enhanced federated learning scheme for big data analytics. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.

35% OFF
Get best price for your work
  • 54000+ Project Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*