References
- www.zozothemes.com
- Margherita Pagani and Giovanni Malacarne. Experiential engagement and active vs. passive behavior in mobile location-based social networks: The moderating role of privacy. Journal of Interactive Marketing, 37:133–148, 2017 doi: https://doi.org/10.1016/j.intmar.2016.10.001
- Marko Gaˇsparovíc, Pedro Nicolau, Ana Marques, Catarina Silva, and Luis Marcelino. On privacy in user tracking mobile applications. In Information Systems and Technologies (CISTI), 2016 11th Iberian Conference on, pages 1–6. IEEE, 2016.
- Kuo-Lun Hsiao. What drives continuance intention to share location-based information? International Journal of Mobile Communications, 15(2):210– 233, 2017. doi: https://doi.org/10.1504/IJMC.2017.082540
- Tomasz Bujlow, Valentn Carela-Espaol, Josep Soĺe-Pareta, and Pere Barlet-Ros. A survey on web tracking: Mechanisms, implications, and defenses. Proceedings of the IEEE, 2017.
- Kerstin Denecke and Wolfgang Nejdl. How valuable is medical social media data? content analysis of the medical web. Information Sciences, 179(12):1870–1880, 2009. doi: https://doi.org/10.1016/j.ins.2009.01.025
- Nicholas D Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T Campbell. A survey of mobile phone sensing. IEEE Communications magazine, 48(9), 2010. doi: https://doi.org/10.1109/MCOM.2010.5560598
- Yu, Chuan, Shuhui Chen, and Zhiping Cai. “LTE phone number catcher: A practical attack against mobile privacy.” Security and Communication Networks 2019 (2019).
- Cardis, Elisabeth, et al. “Risk of brain tumours in relation to estimated RF dose from mobile phones: results from five Interphone countries.” Occupational and environmental medicine 68.9 (2011): 631-640. doi: https://doi.org/10.1136/oemed-2011-100155
- LABONG, Ronel C. Identity Theft Protection Strategies: A Literature Review. Journal of Academic Research, 2019, vol. 4, no 2, p. 1-12.
- Kevin D Mitnick and William L Simon. The art of deception: Controlling the human element of security. John Wiley & Sons, 2011.
- J Jeffrey Inman and Hristina Nikolova. Shopper-facing retail technology: A retailer adoption decision framework incorporating shopper attitudes and privacy concerns. Journal of Retailing, 93(1):7– 28, 2017. doi: https://doi.org/10.1016/j.jretai.2016.12.006
- The Information Society, 32(3):192–199, 2016.
- Hosub Lee and Alfred Kobsa. Understanding user privacy in internet of things environments. Internet of Things (WF-IoT), 2016.
- Dakshi Agrawal, Raghu K Ganti, Mudhakar Srivatsa, and Jingjing Wang. Privacy risk metrics in location based services, March 2017. US Patent 20,170,091,643.
- Eszter Hargittai and Alice Marwick. “what can i really do?” explaining the privacy paradox with online apathy. International Journal of Communication, 10:21, 2016.
- Jens-Erik Mai. Big data privacy: The datafication of personal information.
- Pankaj Dadheech, Ankit Kumar, Chothmal Choudhary, Mahender Kumar Beniwal, Sanwta Ram Dogiwal & Basant Agarwal (2019), “An Enhanced 4-Way Technique Using Cookies for Robust Authentication Process in Wireless Network”, Journal of Statistics and Management Systems, 22:4, 773-782, DOI: https://doi.org/10.1080/09720510.2019.1609557.
- Ankit Kumar, Pankaj Dadheech, Vijander Singh, Linesh Raja & Ramesh C. Poonia (2019), “An Enhanced Quantum Key Distribution Protocol for Security Authentication”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 499-507, DOI: https://doi.org/10.1080/09720529.2019.1637154.
- Ankit Kumar, Pankaj Dadheech, Vijander Singh, Ramesh C. Poonia & Linesh Raja (2019), “An Improved Quantum Key Distribution Protocol for Verification”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 491-498, DOI: https://doi.org/10.1080/09720529.2019.1637153.
- Ankit Kumar and Madhavi Sinha (2019), “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: https://doi.org/10.1080/09720529.2019.1637151.
- Ankit Kumar & Madhavi Sinha (2019) Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET, Journal of Statistics and Management Systems, 22:4, 753-761, DOI: https://doi.org/10.1080/09720510.2019.1609555
- Ankit Kumar, Pankaj Dadheech, Rajani Kumari & Vijander Singh (2019) An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm, Journal of Statistics and Management Systems, 22:7, 1349-1364, DOI: https://doi.org/10.1080/09720510.2019.1618519