Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis
Abstract
1. Introduction
1.1. Problem Statement
1.2. Contributions
- We propose a novel taxonomy to identify and classify existing heuristic techniques used for assessing Internet privacy.
- We suggest a comprehensive classification scheme that takes into consideration the categories of heuristic techniques, levels of assessment, levels of automation, types of protection mechanisms, and broad domains. This framework aims to systematize and organize existing knowledge about the assessment of Internet privacy and proposed protection mechanisms.
- We offer a comprehensive technical background that summarizes and explains the key metrics employed by existing heuristic techniques to assess Internet privacy.
- We identify gaps and challenges that require attention.
- We present potential future research directions for assessing Internet privacy and developing effective protection mechanisms.
1.3. Paper Organization
2. Related Work
Bias | Explanation |
---|---|
Social desirability | This occurs when participants respond in a way they believe will be viewed favorably by others, rather than providing honest answers [26]. |
Sample representativeness | Refers to how well the participants in a study reflect the characteristics of the broader population being studied. If the sample is not representative (e.g., skewed by age, gender, or tech use), the findings about Internet privacy perceptions or behaviors may not generalize to the full population [25]. |
Questions’ order | This bias occurs when the sequence of questions influences how participants respond. Earlier questions can frame or prime thoughts that affect answers to later ones, potentially distorting the true opinions or behaviors related to Internet privacy [31]. |
Questions’ formulation | Happens when the wording or phrasing of a question influences how participants interpret and answer it. Leading, vague, or emotionally charged language can skew responses, affecting the reliability of Internet privacy findings [31]. |
Context | Arises when the surrounding environment, situation, or framing of the study influences participants’ responses. Participants’ mood is also within this category [32]. |
Memory | Occurs when participants inaccurately recall past events or behaviors. In privacy studies, this can lead to unreliable data if people forget, distort, or misremember their actions related to data sharing or Internet privacy settings [26]. |
Central tendency | This bias occurs when participants tend to avoid extreme responses and instead choose middle or neutral options [32]. |
Nonresponse | Occurs when people skip some questions or completely refuse to participate in the study, and their absence causes the results to not fully represent the entire population, especially if those who do not respond have different Internet privacy attitudes [26]. |
3. Technical Background
3.1. Heuristic Techniques
3.1.1. Perception Estimation
3.1.2. Privacy Policies Analysis
3.1.3. Information Measurement
3.1.4. Machine Learning Testing
3.1.5. Counting
3.1.6. Similarity Measurement
3.2. Levels of Assessment
3.3. Levels of Automation
3.4. Types of Protection Mechanisms
3.5. Broad Domains
4. Methodology
4.1. Scope of the Study
4.2. Paper Selection Strategy
4.3. Inclusion and Exclusion Criteria
4.4. Screening Phase
4.5. Classification Scheme
4.6. Coding Procedure
4.7. Paper Selection and Screening Results
4.8. Pilot Coding Phase
5. Results and Analysis
5.1. Heuristic Techniques
5.2. Levels of Assessment
5.3. Levels of Automation
5.4. Types of Protection Mechanisms
5.5. Broad Domains
6. Discussion
6.1. Main Findings
6.2. Gaps and Challenges
6.3. Future Research Directions
7. Threats to Validity
7.1. Threats to Internal Validity
7.2. Threats to External Validity
7.3. Threats to Conclusion
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
AMI | Advanced Metering Infrastructure |
APIs | Application Programming Interfaces |
CC | Cloud Computing |
CPS | Cyber-Physical Systems |
CPPA | Consumer Privacy Protection Act |
CPRA | California Privacy Rights Act |
DiD | Defense-in-Depth |
DLP | Data Loss Prevention |
FC | Fog Computing |
GDPR | General Data Protection Regulation |
HIPAA | Health Insurance Portability and Accountability Act |
HISAA | Health Infrastructure Security and Accountability Act |
HTTP | Hypertext Transfer Protocol |
IACS | Industrial Automation and Control Systems |
IDS | Intrusion Detection Systems |
IoBNT | Internet of Bio-NanoThings |
IIoT | Industrial Internet of Things |
IoC | Indicators of Compromise |
IoT | Internet of Things |
IoUT | Internet of Underwater Things |
IoV | Internet of Vehicles |
IPCs | Internet Privacy Concerns |
IPS | Intrusion Prevention Systems |
KPI | Key Performance Indicators |
LLMs | Large Language Models |
MAE | Mean Absolute Error |
MC | Mobile Computing |
MCC | Mobile Cloud Computing |
MEC | Mobile Edge Computing |
mAPPs | Mobile Applications |
mGovernment | Mobile Government |
mHealth | Mobile Health |
MPS | Mobile Payment Systems |
MSN | Mobile Social Networks |
MSE | Mean Squared Error |
OSN | Online Social Networks |
OT | Optimal Transport |
PDA | Personal Digital Assistants |
PETs | Privacy-enhancing technologies |
PHI | Protected Health Information |
PMA | Protection Mechanism Approach |
RMSE | Root Mean Squared Error |
RQs | Research Questions |
SCADA | Supervisory Control and Data Acquisition |
SIEM | Security Information and Event Management |
VANETs | Vehicle Ad hoc Networks |
References
- Jemili, F.; Jouini, K.; Korbaa, O. Intrusion Detection based on Concept Drift Detection & Online Incremental Learning. Int. J. Pervasive Comput. Commun. 2025, 21, 81–115. [Google Scholar] [CrossRef]
- Cevallos-Salas, D.; Estrada-Jiménez, J.; Guamán, D.S. Application layer security for Internet communications: A comprehensive review, challenges, and future trends. Comput. Electr. Eng. 2024, 119, 109498. [Google Scholar] [CrossRef]
- Pansy, D.; Mahalakshmi, S.; Vidya, B. End-To-End Encryption Solution for Social Media Networks. In Proceedings of the International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI 2025), Chennai, India, 28–29 March 2025; pp. 1–6. [Google Scholar] [CrossRef]
- Zafar, A.; Das, A. Comparative Privacy Analysis of Mobile Browsers. In Proceedings of the 13th ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, NC, USA, 24–26 April 2023; pp. 3–14. [Google Scholar] [CrossRef]
- Ormeno, M.; Dao, H.; Herskovic, V.; Fukuda, K. Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising. IEEE Access 2024, 12, 174539–174550. [Google Scholar] [CrossRef]
- Lung, L.W.; Wang, Y.R.; Chen, Y.S. Leveraging Deep Learning and Internet of Things for Dynamic Construction Site Risk Management. Buildings 2025, 15, 1325. [Google Scholar] [CrossRef]
- Abdullah Punjabi, T.; Alban, A.Q.; Barhamgi, M. Effective Transparent Monitoring of Personal Data. In Proceedings of the Cyberspace Simulation and Evaluation (CSE 2024), Doha, Qatar, 2–5 December 2024; Springer: Singapore, 2025; pp. 29–45. [Google Scholar] [CrossRef]
- Bemmann, F.; Stoll, H.; Mayer, S. Privacy Slider: Fine-Grain Privacy Control for Smartphones. Proc. ACM Hum.-Comput. Interact. 2024, 8, 1–31. [Google Scholar] [CrossRef]
- Rodriguez, D.; Del Alamo, J.M.; Fernández-Aller, C.; Sadeh, N. Sharing is Not Always Caring: Delving Into Personal Data Transfer Compliance in Android Apps. IEEE Access 2024, 12, 5256–5269. [Google Scholar] [CrossRef]
- Singla, P.; Garg, H.; Gagandeep; Pathak, A.; Singh, S.P. Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage. Comput. Electr. Eng. 2024, 116, 109151. [Google Scholar] [CrossRef]
- Ceci, J.; Stegman, J.; Khan, H. No Privacy in the Electronics Repair Industry. In Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2023), San Francisco, CA, USA, 21–25 May 2023; Volume 2023, pp. 3347–3364. [Google Scholar] [CrossRef]
- Paguay-Chimarro, C.; Cevallos-Salas, D.; Rodríguez-Hoyos, A.; Estrada-Jiménez, J. Transparency Unleashed: Privacy Risks in the Age of E-Government. Informatics 2025, 12, 39. [Google Scholar] [CrossRef]
- Luceri, L.; Andreoletti, D.; Tornatore, M.; Braun, T.; Giordano, S. Measurement and control of geo-location privacy on Twitter. Online Soc. Netw. Media 2020, 17, 100078. [Google Scholar] [CrossRef]
- Kara, B.C.; Eyupoglu, C.; Karakuş, O. (r, k, e)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, k-Anonymity, and e-Differential Privacy. IEEE Access 2025, 13, 70422–70435. [Google Scholar] [CrossRef]
- Xiao, H.; Devadas, S. PAC Privacy: Automatic Privacy Measurement and Control of Data Processing. In Proceedings of the Advances in Cryptology—CRYPTO 2023. CRYPTO 2023; Lecture Notes in Computer Science. Springer: Cham, Switzerland, 2023; Volume 14082, pp. 611–644. [Google Scholar] [CrossRef]
- Alhalabi, W.; Al-Rasheed, A.; Manoharan, H.; Alabdulkareem, E.; Alduailij, M.; Alduailij, M.; Selvarajan, S. Distinctive Measurement Scheme for Security and Privacy in Internet of Things Applications Using Machine Learning Algorithms. Electronics 2023, 12, 747. [Google Scholar] [CrossRef]
- Anderson, E.; Chase, M.; Durak, F.B.; Laine, K.; Weng, C. Precio: Private Aggregate Measurement via Oblivious Shuffling. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), CCS ’24, Salt Lake City, UT, USA, 14–18 October 2024; pp. 1819–1833. [Google Scholar] [CrossRef]
- Aydin, S.; Yıldırım, S. Bayesian Frequency Estimation under Local Differential Privacy with an Adaptive Randomized Response Mechanism. ACM Trans. Knowl. Discov. Data 2025, 19, 1–40. [Google Scholar] [CrossRef]
- Kovacs, B. Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People. Available online: https://www.securityweek.com/data-breach-at-healthcare-services-firm-episource-impacts-5-4-million-people (accessed on 22 July 2025).
- Hurley, J. Over 5.4 Million US Patient Records Compromised in Episource Data Breach. Available online: https://www.grip.globalrelay.com/over-5-4-million-us-patient-records-compromised-in-episource-data-breach (accessed on 22 July 2025).
- McAfee. RockYou2024: Unpacking the Largest Password Leak in History. Available online: https://www.mcafee.com/blogs/internet-security/rockyou2024-unpacking-the-largest-password-leak-in-history (accessed on 22 July 2025).
- America’s Cyber Defense Agency. #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability. Available online: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a (accessed on 22 July 2025).
- Datta, P.M.; Acton, T. Ransomware and Costa Rica’s national emergency: A defense framework and teaching case. J. Inf. Technol. Teach. Cases 2024, 14, 56–67. [Google Scholar] [CrossRef]
- Yun, H.; Lee, G.; Kim, D.J. A meta-analytic review of empirical research on online information privacy concerns: Antecedents, outcomes, and moderators. In Proceedings of the 35th International Conference on Information Systems “Building a Better World Through Information Systems (ICIS 2014)”, Auckland, New Zealand, 14–17 December 2014; Volume 2014. [Google Scholar]
- Bartol, J.; Vehovar, V.; Petrovčič, A. Should we be concerned about how information privacy concerns are measured in online contexts? A systematic review of survey scale development studies. Informatics 2021, 8, 31. [Google Scholar] [CrossRef]
- Bartol, J.; Vehovar, V.; Petrovčič, A. Systematic review of survey scales measuring information privacy concerns on social network sites. Telemat. Inform. 2023, 85, 102063. [Google Scholar] [CrossRef]
- van der Schyff, K.; Prior, S.; Renaud, K. Privacy policy analysis: A scoping review and research agenda. Comput. Secur. 2024, 146, 104065. [Google Scholar] [CrossRef]
- Del Alamo, J.; Guaman, D.; García, B.; Díez Medialdea, A. A systematic mapping study on automated analysis of privacy policies. Computing 2022, 104, 2053–2076. [Google Scholar] [CrossRef]
- Majeed, A.; Khan, S.; Hwang, S.O. Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook. IEEE Access 2022, 10, 53066–53097. [Google Scholar] [CrossRef]
- Barajas, J.; Bhamidipati, N.; Shanahan, J.G. Online Advertising Incrementality Testing: Practical Lessons, Paid Search and Emerging Challenges. In Advances in Information Retrieval. ECIR 2022; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2022; Volume 13186, pp. 575–581. [Google Scholar] [CrossRef]
- Alghareeb, M.; Albesher, A.S.; Asif, A. Studying Users’ Perceptions of COVID-19 Mobile Applications in Saudi Arabia. Sustainability 2023, 15, 956. [Google Scholar] [CrossRef]
- Swartz, P.; Da Veiga, A.; Martins, N. Validating an information privacy governance questionnaire to measure the perception of employees. Inf. Comput. Secur. 2021, 29, 761–786. [Google Scholar] [CrossRef]
- Esposito, C.; Moscato, V.; Sperlì, G. Detecting malicious reviews and users affecting social reviewing systems: A survey. Comput. Secur. 2023, 133, 103407. [Google Scholar] [CrossRef]
- Eke, C.I.; Norman, A.A.; Shuib, L.; Nweke, H.F. A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 2019, 7, 144907–144924. [Google Scholar] [CrossRef]
- Senette, C.; Siino, M.; Tesconi, M. User Identity Linkage on Social Networks: A Review of Modern Techniques and Applications. IEEE Access 2024, 12, 171241–171268. [Google Scholar] [CrossRef]
- Desmal, A.J.; Hamid, S.; Othman, M.K.; Zolait, A. A user satisfaction model for mobile government services: A literature review. PeerJ Comput. Sci. 2022, 8, e1074. [Google Scholar] [CrossRef]
- Youm, H.Y. An overview of security and privacy issues for internet of thing. IEICE Trans. Inf. Syst. 2017, E100D, 1649–1662. [Google Scholar] [CrossRef]
- Haque, M.A.; Haque, S.; Kumar, K.; Rahman, M.; Sonal, D.; Almrezeq, N. Security and Privacy in Internet of Things. Commun. Comput. Inf. Sci. 2022, 1591 CCIS, 182–196. [Google Scholar] [CrossRef]
- Dong, R.; Ratliff, L.J.; Cárdenas, A.A.; Ohlsson, H.; Sastry, S.S. Quantifying the utility–privacy tradeoff in the internet of things. ACM Trans. Cyber-Phys. Syst. 2018, 2, 1–28. [Google Scholar] [CrossRef]
- Bhattacharjya, K.; De, D. Federated learning-based privacy-preserving Internet of Underwater Things: A vision, architecture, computing, taxonomy, and future directions. J. Supercomput. 2025, 81, 870. [Google Scholar] [CrossRef]
- Benamor, Z.; Seghir, Z.A.; Djezzar, M.; Hemam, M. A comparative study of machine learning algorithms for intrusion detection in IoT networks. Rev. D’Intell. Artif. 2023, 37, 567–576. [Google Scholar] [CrossRef]
- Al-Qarni, E.A. Cybersecurity in Healthcare: A Review of Recent Attacks and Mitigation Strategies. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 135–140. [Google Scholar] [CrossRef]
- Hameed, S.S.; Hassan, W.H.; Latiff, L.A.; Ghabban, F. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput. Sci. 2021, 7, e414. [Google Scholar] [CrossRef]
- Paul, S.K.; Knox, D. A Taxonomy and Gap-Analysis in Digital Privacy Education. In Foundations and Practice of Security. FPS 2022; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2023; Volume 13877, pp. 221–235. [Google Scholar] [CrossRef]
- Rajkumar, K.; Dhanakoti, V. Methodological Survey to Improve the Secure Data Storage in Cloud Computing. In Proceedings of the International Conference on Emerging Smart Computing and Informatics (ESCI 2020), Pune, India, 12–14 March 2020; Volume 2020, pp. 313–317. [Google Scholar] [CrossRef]
- Chhetri, C.; Motti, V.G. Enhancing the design of data-related privacy controls for smart home devices. Inf. Comput. Secur. 2023, 31, 368–384. [Google Scholar] [CrossRef]
- Ghaith, M.M.; Alzuod, M.A.; Al-Okaily, M. The Effect of Information Sensitivity and Usage on Consumer Privacy: The Case of Electronic Payment Systems. In From the Internet of Things to the Internet of Ideas: The Role of Artificial Intelligence. EAMMIS 2022; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2023; Volume 557, pp. 391–401. [Google Scholar] [CrossRef]
- Gadiyar, H.M.T.; Thyagaraju, G.; Goudar, R. An Adaptive Approach for Preserving Privacy in Context Aware Applications for Smartphones in Cloud Computing Platform. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 519–529. [Google Scholar] [CrossRef]
- Ding, H.; Zhang, S.; Zhou, L.; Yang, P. Readability Analysis of Privacy Policies for Large-Scale Websites: A Perspective from Deep Learning and Linguistics. In Proceedings of the IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022), Haikou, China, 15–18 December 2022; pp. 1748–1753. [Google Scholar] [CrossRef]
- Esmaeilzadeh, P. The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention. Comput. Secur. 2020, 95, 101819. [Google Scholar] [CrossRef]
- Guamán, D.S.; Rodriguez, D.; del Alamo, J.M.; Such, J. Automated GDPR compliance assessment for cross-border personal data transfers in android applications. Comput. Secur. 2023, 130, 103262. [Google Scholar] [CrossRef]
- Avorgbedor, F.; Liu, J. Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook. In Proceedings of the IEEE International Conference on Electro Information Technology (EIT 2020), Chicago, IL, USA, 31 July–1 August 2020; Volume 2020, pp. 155–161. [Google Scholar] [CrossRef]
- Li, Z.; Oechtering, T.J.; Gunduz, D. Privacy against a hypothesis testing adversary. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1567–1581. [Google Scholar] [CrossRef]
- Bi, R.; Chen, Q.; Chen, L.; Xiong, J.; Wu, D. A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT. Wirel. Commun. Mob. Comput. 2020, 2020, 8891889. [Google Scholar] [CrossRef]
- Wu, Y.; Peng, H.; Zhang, X.; Chen, H.; Li, C. Publish me and protect me: Personalized and flexible location privacy protection in mobile social networks. In Proceedings of the IEEE 23rd International Symposium on Quality of Service (IWQoS 2016), Beijing, China, 20–21 June 2016; Volume 1, pp. 147–152. [Google Scholar] [CrossRef]
- Motahari, S.; Ziavras, S.G.; Jones, Q. Online anonymity protection in computer-mediated communication. IEEE Trans. Inf. Forensics Secur. 2010, 5, 570–580. [Google Scholar] [CrossRef]
- Martínez Rodríguez, D.; Nin, J.; Nuñez-del Prado, M. Towards the adaptation of SDC methods to stream mining. Comput. Secur. 2017, 70, 702–722. [Google Scholar] [CrossRef]
- Zhang, W.; Li, M.; Tandon, R.; Li, H. Online location trace privacy: An information theoretic approach. IEEE Trans. Inf. Forensics Secur. 2019, 14, 235–250. [Google Scholar] [CrossRef]
- Li, W.; Li, H. LRDM: Local record-driving mechanism for big data privacy preservation in social networks. In Proceedings of the IEEE 1st International Conference on Data Science in Cyberspace (DSC 2017), Shenzhen, China, 26–29 June 2017; Volume 1, pp. 556–560. [Google Scholar] [CrossRef]
- Jain, P.; Kothari, P.; Thakurta, A. Differentially private online learning. J. Mach. Learn. Res. 2012, 23, 24.1–24.34. [Google Scholar]
- Yang, L.; Chen, X.; Zhang, J.; Poor, H.V. Optimal privacy-preserving energy management for smart meters. In Proceedings of the IEEE INFOCOM (2014), Toronto, ON, Canada, 27 April–2 May 2014; Volume 1, pp. 513–521. [Google Scholar] [CrossRef]
- Boursier, E.; Perchet, V. Utility/Privacy Trade-off through the lens of Optimal Transport. In Proceedings of the Machine Learning Research (PMLR 2020), Virtual, 13–18 July 2020; Volume 108, pp. 591–601. [Google Scholar]
- Cortese, A.; Masoumzadeh, A. Modeling exposure in online social networks. In Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST 2018), Belfast, UK, 28–30 August 2018; Volume 2018, pp. 327–336. [Google Scholar] [CrossRef]
- Zhang, H.; Xu, Z.; Zhou, Z.; Shi, J.; Du, X. CLPP: Context-aware location privacy protection for location-based social network. In Proceedings of the IEEE International Conference on Communications (ICC 2015), London, UK, 8–12 June 2015; Volume 2015, pp. 1164–1169. [Google Scholar] [CrossRef]
- Sirigiri, M.; Sirigiri, D.; Aishwarya, R.; Yogitha, R. Malware Detection and Analysis using Machine Learning. In Proceedings of the 7th International Conference on Computing Methodologies and Communication (ICCMC 2023), Erode, India, 23–25 February 2023; Volume 1, pp. 1074–1081. [Google Scholar] [CrossRef]
- Chandrasekhar, T.; Kumar, S. A Noval Method for Cloud Security and Privacy Using Homomorphic Encryption Based on Facial Key Templates. J. Adv. Inf. Technol. 2022, 13, 638–644. [Google Scholar] [CrossRef]
- Al-Ghuwairi, A.R.; Sharrab, Y.; Al-Fraihat, D.; AlElaimat, M.; Alsarhan, A.; Algarni, A. Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. J. Cloud Comput. 2023, 12, 127. [Google Scholar] [CrossRef]
- Ajjaj, S.; El Houssaini, S.; Hain, M.; El Houssaini, M.A. Incremental Online Machine Learning for Detecting Malicious Nodes in Vehicular Communications Using Real-Time Monitoring. Telecom 2023, 4, 629–648. [Google Scholar] [CrossRef]
- Sanchez-Rola, I.; Balzarotti, D.; Santos, I. Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing. Digit. Threat. Res. Pract. 2020, 1, 1–24. [Google Scholar] [CrossRef]
- Sanchez-Rola, I.; Balzarotti, D.; Santos, I. BakingTimer: Privacy analysis of server-side request processing time. In Proceedings of the ACM International Conference Proceeding Series (ICPS 2019), San Juan, PR, USA, 9–13 December 2019; Volume 1, pp. 478–488. [Google Scholar] [CrossRef]
- Solomos, K.; Ilia, P.; Ioannidis, S.; Kourtellis, N. Talon: An automated framework for cross-device tracking detection. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, 23–25 September 2019; pp. 227–241. [Google Scholar]
- Zhong, K.; Ma, Y.; Angel, S. Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. In Proceedings of the ACM Conference on Computer and Communications Security (ACM CCS 2022), Los Angeles, CA, USA, 7–11 November 2022; Volume 1, pp. 3223–3237. [Google Scholar] [CrossRef]
- Machiko Mada, M.; Razak Saputri, N.; Ayu Br Keliat, S.; Nugroho Perwiro Atmojo, R. The Analysis of Advertising Identification Through Measurement of User Activity on Smartphone Devices. In Proceedings of the 6th International Conference on Information Technology, Information Systems and Electrical Engineering: Applying Data Sciences and Artificial Intelligence Technologies for Environmental Sustainability (ICITISEE 2022), Yogyakarta, Indonesia, 13–14 December 2022; Volume 1, pp. 437–442. [Google Scholar] [CrossRef]
- Yokoyama, S.; Uda, R. A proposal of preventive measure of pursuit using a browser fingerprint. In Proceedings of the ACM Ubiquitous Information Management and Communication (IMCOM 2015), Bali, Indonesia, 8–10 January 2015; Volume 1, pp. 1–7. [Google Scholar] [CrossRef]
- Shariatnasab, M.; Shirani, F.; Erkip, E. Fundamental Privacy Limits in Bipartite Networks Under Active Attacks. IEEE J. Sel. Areas Commun. 2022, 40, 940–954. [Google Scholar] [CrossRef]
- for Standardization, I.O. Information Security, Cybersecurity and Privacy Protection—Privacy Information Management Systems—Requirements and Guidance. Available online: https://www.iso.org/standard/85819.html (accessed on 1 July 2025).
- National Institute of Standards and Technology. NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.01162020.pdf (accessed on 29 May 2025).
- Shaik, A.; Masilamani, V. Zero watermarking scheme for privacy protection in e-Health care. Automatika 2023, 64, 453–466. [Google Scholar] [CrossRef]
- Kilany, R.; Sokhn, M.; Hellani, H.; Shabani, S. Towards flexible K-anonymity. Commun. Comput. Inf. Sci. 2016, 649, 288–297. [Google Scholar] [CrossRef]
- Arampatzis, A.; Drosatos, G.; Efraimidis, P.S. Versatile Query Scrambling for Private Web Search. Inf. Retr. 2015, 18, 331–358. [Google Scholar] [CrossRef]
- Kaur, H.; Hooda, N.; Singh, H. k-anonymization of social network data using Neural Network and SVM: K-NeuroSVM. J. Inf. Secur. Appl. 2023, 72, 103382. [Google Scholar] [CrossRef]
- Shin, M.; Cornelius, C.; Kapadia, A.; Triandopoulos, N.; Kotz, D. Location privacy for mobile crowd sensing through population mapping. Sensors 2015, 15, 15285–15310. [Google Scholar] [CrossRef]
- Lavesson, N.; Johnson, H. Measuring profile distance in online social networks. In Proceedings of the ACM International Conference Proceeding Series (ICPS 2011), Sogndal, Norway, 25–27 May 2011; Volume 1, pp. 1–12. [Google Scholar] [CrossRef]
- Kou, H.; Wang, F.; Lv, C.; Dong, Z.; Huang, W.; Wang, H.; Liu, Y. Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation. Wirel. Commun. Mob. Comput. 2020, 2020, 1–10. [Google Scholar] [CrossRef]
- Kabwe, F.; Phiri, J. Identity attributes metric modelling based on mathematical distance metrics models. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 450–464. [Google Scholar] [CrossRef]
- Coscia, M.; Mendez-Bermudez, A. Pearson correlations on complex networks. J. Complex Netw. 2021, 9, 1–14. [Google Scholar] [CrossRef]
- Silva, P.; Kencl, L.; Monteiro, E. Data Privacy Protection—Concealing Text and Audio with a DNA-inspired Algorithm. In Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018), Munich, Germany, 4–5 June 2018; Volume 1, pp. 46–59. [Google Scholar]
- Kamal, I.R.; Abd El-atty, S.; El-Zoghdy, S.; Soliman, R. Internet of Bio-NanoThings privacy: Securing a multi compartmental targeted cancer drug delivery scheme. Multimed. Tools Appl. 2024, 83, 79235–79258. [Google Scholar] [CrossRef]
- Stevens, S.S. On the Theory of Scales of Measurement. Science 1946, 103, 677–680. [Google Scholar] [CrossRef] [PubMed]
- National Institute of Standards and Technology. Measurement Guide for Information Security: Volume 1—Identifying and Selecting Measures. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-55v1.pdf (accessed on 25 June 2025).
- Romano, R.; Han, J. Consumer Perceptions towards Unsolicited Advertisements on Social Media. Data 2022, 7, 138. [Google Scholar] [CrossRef]
- Thota, C.; Mavromoustakis, C.; Mastorakis, G. CAP2M.÷Contingent Anonymity Preserving Privacy Method for the Internet of Things Services. Comput. Electr. Eng. 2023, 107, 108640. [Google Scholar] [CrossRef]
- National Institute of Standards and Technology. The NIST Cybersecurity Framework (CSF) 2.0. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf (accessed on 26 June 2025).
- Mai, W.; Xiao, Y. A novel GPU based Geo-Location Inference Attack on WebGL framework. High-Confid. Comput. 2023, 3, 100135. [Google Scholar] [CrossRef]
- Satish Kumar, A.; Revathy, S. A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks. Theor. Comput. Sci. 2022, 927, 15–30. [Google Scholar] [CrossRef]
- MITRE Corporation. MITRE ATT&CK®. Available online: https://attack.mitre.org/ (accessed on 29 May 2025).
- IEEE. Access the IEEE thesaurus. Available online: https://www.ieee.org/publications/services/thesaurus-access-page.html (accessed on 25 June 2025).
- The California Privacy Rights Act of 2020. The CPRA Organization. Available online: https://thecpra.org/ (accessed on 5 July 2025).
- Government of Canada. Consumer Privacy Protection Act. Available online: https://ised-isde.canada.ca/site/innovation-better-canada/en/consumer-privacy-protection-act (accessed on 5 July 2025).
- Yang, D.; Qu, B.; Cudré-Mauroux, P. Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation. IEEE Trans. Knowl. Data Eng. 2019, 31, 507–520. [Google Scholar] [CrossRef]
- Zhang, J.; Shi, S.T.; Weng, C.J.; Xu, L. Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks. Secur. Commun. Netw. 2022, 2022, 6338123. [Google Scholar] [CrossRef]
- Cevallos-Salas, D.; Grijalva, F.; Estrada-Jiménez, J.; Benítez, D.; Andrade, R. Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis. IEEE Access 2024, 12, 17481–17498. [Google Scholar] [CrossRef]
- Al-Sarayrah, T.A.; Li, Z.; Yin, L.; Mostafa, A.M. Online Verification and Enforcement of Sequential K-Opacity in Extended Probabilistic Automata. IEEE Access 2024, 12, 84189–84203. [Google Scholar] [CrossRef]
- Hamzehzadeh, S.; Mazinani, S.M. ANNM: A New Method for Adding Noise Nodes Which are Used Recently in Anonymization Methods in Social Networks. Wirel. Pers. Commun. 2019, 107, 1995–2017. [Google Scholar] [CrossRef]
- Gao, W.; Liang, W.; Hao, R.; Yu, J. Enabling privacy-preserving non-interactive computation for Hamming distance. Inf. Sci. 2024, 670, 120592. [Google Scholar] [CrossRef]
- Muhammad, M.Z.; Muhamad, F.H.; Doktoralina, C.M.; Mukhtar, D.; Ghazali, M.F.; Rahman, M.K.; Din, N.M. Online Banking of Islamic Banks: The Customer’s Perceptions in Kelantan. In Sustainable Finance, Digitalization and the Role of Technology. ICBT 2021; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2023; Volume 487, pp. 859–873. [Google Scholar] [CrossRef]
- Chakraborty, R.; Prakasha, G.; Sripavithra, C. Factors Affecting Data-Privacy Protection and Promotion of Safe Digital Usage. In Proceedings of the CEUR Workshop Proceedings (CEUR-WS.org 2022), Ternopil, Ukraine, 22–24 November 2022; Volume 3094, pp. 49–58. [Google Scholar]
- Gabrielli, S.; Rizzi, S.; Mayora, O.; More, S.; Baun, J.C.P.; Vandevelde, W. Multidimensional Study on Users’ Evaluation of the KRAKEN Personal Data Sharing Platform. Appl. Sci. 2022, 12, 3270. [Google Scholar] [CrossRef]
- Joy, D.; Kotevska, O.; Al-Masri, E. Investigating Users’ Privacy Concerns of Internet of Things (IoT) Smart Devices. In Proceedings of the IEEE Eurasia Conference on IoT, Communication and Engineering (ECICE 2022), Yunlin, Taiwan, 28–30 October 2022; Volume 1, pp. 70–76. [Google Scholar] [CrossRef]
- Liu, Y.; Tse, W.K.; Kwok, P.Y.; Chiu, Y.H. Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process. Information 2022, 13, 280. [Google Scholar] [CrossRef]
- Aji, Z.M.; Mohd Salleh, N.S.; Zakaria, N.H.; Mohd Khalid, A.H. Are You Aware of Your Data Privacy? The Case of Digital Contact Tracing Applications (MySejahtera). In Proceedings of the 2021 7th International Conference on Research and Innovation in Information Systems (ICRIIS 2021), Johor Bahru, Malaysia, 25–26 October 2021; Volume 1, pp. 1–6. [Google Scholar] [CrossRef]
- McGill, T.; Thompson, N. Exploring potential gender differences in information security and privacy. Inf. Comput. Secur. 2021, 29, 850–865. [Google Scholar] [CrossRef]
- Sharma, T.; Dyer, H.A.; Bashir, M. Enabling User-centered Privacy Controls for Mobile Applications: COVID-19 Perspective. ACM Trans. Internet Technol. 2021, 21, 1–24. [Google Scholar] [CrossRef]
- AlMarzooqi, F.M.; Moonesar, I.A.; AlQutob, R. Healthcare professional and user perceptions of eHealth data and record privacy in Dubai. Information 2020, 11, 415. [Google Scholar] [CrossRef]
- Son, Y.; Cho, G.; Kim, H.; Woo, S. Understanding users’ risk perceptions about personal health records shared on social networking services. In Proceedings of the ACM Asia Conference on Computer and Communications Security (AsiaCCS 2019), Auckland, New Zealand, 9–12 July 2019; Volume 1, pp. 352–365. [Google Scholar] [CrossRef]
- Suen, H.Y. The effects of employer SNS motioning on employee perceived privacy violation, procedural justice, and leave intention. Ind. Manag. Data Syst. 2018, 118, 1153–1169. [Google Scholar] [CrossRef]
- Bauer, L.; Bravo-Lillo, C.; Fragkaki, E.; Melicher, W. A comparison of users’ perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality. In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, 8 November 2013; Volume 1, pp. 25–36. [Google Scholar] [CrossRef]
- Carrascal, J.P.; Riederer, C.; Erramilli, V.; Cherubini, M.; De Oliveira, R. Your browsing behavior for a big mac: Economics of personal information online. In Proceedings of the 22nd International Conference on World Wide Web (WWW 2013), Rio de Janeiro, Brazil, 13–17 May 2013; Volume 1, pp. 189–199. [Google Scholar]
- Bergmann, M. Testing privacy awareness. IFIP Adv. Inf. Commun. Technol. 2009, 298, 237–253. [Google Scholar] [CrossRef]
- Joinson, A.N.; Paine, C.; Buchanan, T.; Reips, U.D. Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys. Comput. Hum. Behav. 2008, 24, 2158–2171. [Google Scholar] [CrossRef]
- Ragab, A.; Mannan, M.; Youssef, A. “Trust Me Over My Privacy Policy”: Privacy Discrepancies in Romantic AI Chatbot Apps. In Proceedings of the 2024 IEEE European Symposium on Security and Privacy Workshops (EuroSPW 2024), Vienna, Austria, 8–12 July 2024; pp. 484–495. [Google Scholar] [CrossRef]
- Zac, A.; Wey, P.; Bechtold, S.; Rodriguez, D.; Del Alamo, J. The Court Speaks, But Who Listens? Automated Compliance Review of the GDPR. SSRN Electron. J. 2024. [Google Scholar] [CrossRef]
- Alghoul, M.; Moutan, M.; Kastro, N.; Karakra, A.; Barghouthi, H.; Njoum, M.; Awadallah, R. Policy Peek: Privacy Policy Automatic Analysis Tool. In Proceedings of the International Conference on Electrical, Computer and Energy Technologies (ICECET 2024), Sydney, Australia, 25–27 July 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Maraba, J.; Veiga, A. A Study of Online Privacy Policies of South African Retail Websites. In Proceedings of the International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability (ARTIIS 2024), Santiago de Chile, Chile, 21–23 October 2024; pp. 426–440. [Google Scholar] [CrossRef]
- Rodriguez, D.; Yang, I.; Del Alamo, J.; Sadeh, N. Large language models: A new approach for privacy policy analysis at scale. Computing 2024, 106, 3879–3903. [Google Scholar] [CrossRef]
- Rodríguez, D.; Fernández-Aller, C.; Del Alamo, J.M.; Sadeh, N. Data Retention Disclosures in the Google Play Store: Opacity Remains the Norm. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroSPW 2024), Vienna, Austria, 8–12 July 2024; pp. 19–23. [Google Scholar] [CrossRef]
- Vu, T.H.G.; Hoang, X.B. User Privacy Risk Analysis within Website Privacy Policies. In Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition (MAPR 2024), Da Nang, Vietnam, 15–16 August 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Jain, A.; Rodriguez, D.; del Alamo, J.M.; Sadeh, N. ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroSPW 2023), Delft, The Netherlands, 3–7 July 2023; pp. 94–107. [Google Scholar] [CrossRef]
- Kulkarni, M.; Naik, H.; Bharathi, S.V. Textual Analysis of Privacy Policies to Understand the Effect of GDPR. In Proceedings of the 2nd International Conference on Futuristic Technologies (INCOFT 2023), Belagavi, India, 24–26 November 2023; pp. 1–5. [Google Scholar] [CrossRef]
- Luo, H.; Sun, Z.; Sun, Y.; Li, A.; Wang, B.; Cao, J.; Niu, B. SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing. In Proceedings of the IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022), Haikou, China, 15–18 December 2022; pp. 2340–2347. [Google Scholar] [CrossRef]
- Wang, T.; Hayes, C.; Chen, C.; Bashir, M. An Analysis of Mobile Gaming Apps’ Privacy Policies. In Proceedings of the IEEE Games, Entertainment, Media Conference (GEM 2022), St. Michael, Barbados, 27–30 November 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Ibdah, D.; Lachtar, N.; Raparthi, S.M.; Bacha, A. “Why Should I Read the Privacy Policy, I Just Need the Service”: A Study on Attitudes and Perceptions Toward Privacy Policies. IEEE Access 2021, 9, 166465–166487. [Google Scholar] [CrossRef]
- Anikeev, M.; Shulman, H.; Simo, H. Privacy Policies of Mobile Apps—A Usability Study. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications Workshops, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–2. [Google Scholar] [CrossRef]
- Kuznetzov, M.; Novikova, E. Towards application of text mining techniques to the analysis of the privacy policies. In Proceedings of the 10th Mediterranean Conference on Embedded Computing (MECO 2021), Budva, Montenegro, 7–10 June 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Javed, Y.; Salehin, K.M.; Shehab, M. A Study of South Asian Websites on Privacy Compliance. IEEE Access 2020, 8, 156067–156083. [Google Scholar] [CrossRef]
- Harkous, H.; Fawaz, K.; Lebret, R.; Schaub, F.; Shin, K.G.; Aberer, K. Polisis: Automated analysis and presentation of privacy policies using deep learning. In Proceedings of the 27th Conference on Security Symposium (USENIX 2018), SEC’18, Baltimore, MD, USA, 15–17 August 2018; pp. 531–548. [Google Scholar]
- Kaur, J.; Dara, R.A.; Obimbo, C.; Song, F.; Menard, K. A comprehensive keyword analysis of online privacy policies. Inf. Secur. J. 2018, 27, 260–275. [Google Scholar] [CrossRef]
- Wilson, S.; Schaub, F.; Liu, F.; Sathyendra, K.M.; Smullen, D.; Zimmeck, S.; Ramanath, R.; Story, P.; Liu, F.; Sadeh, N.; et al. Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. ACM Trans. Web 2018, 13, 1–29. [Google Scholar] [CrossRef]
- Gonçalves de Pontes, D.R.; Zorzo, S.D. PPMark: An architecture to generate privacy labels using TF-IDF techniques and the rabin karp algorithm. Adv. Intell. Syst. Comput. 2016, 448, 1029–1040. [Google Scholar] [CrossRef]
- Alohaly, M.; Takabi, H. If You Can’t Measure It, You Can’t Manage It: Towards Quantification of Privacy Policies. In Proceedings of the IEEE 2nd International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, 1–3 November 2016; pp. 539–545. [Google Scholar] [CrossRef]
- Breaux, T.D.; Schaub, F. Scaling requirements extraction to the crowd: Experiments with privacy policies. In Proceedings of the IEEE 22nd International Requirements Engineering Conference (RE 2014), Karlskrona, Sweden, 25–29 August 2014; pp. 163–172. [Google Scholar] [CrossRef]
- Savla, P.; Martino, L.D. Content Analysis of Privacy Policies for Health Social Networks. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2012), Chapel Hill, NC, USA, 16–18 July 2012; pp. 94–101. [Google Scholar] [CrossRef]
- Benats, G.; Bandara, A.; Yu, Y.; Colin, J.N.; Nuseibeh, B. PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Pisa, Italy, 6–8 June 2011; pp. 129–132. [Google Scholar] [CrossRef]
- Earp, J.; Anton, A.; Aiman-Smith, L.; Stufflebeam, W. Examining Internet privacy policies within the context of user privacy values. IEEE Trans. Eng. Manag. 2005, 52, 227–237. [Google Scholar] [CrossRef]
- Ding, J.; Li, X.; Guo, Y.; Yin, L.; Zhang, H. Process Calculus for Modeling and Quantifying Location Privacy. Procedia Comput. Sci. 2019, 147, 407–415. [Google Scholar] [CrossRef]
- Viejo, A.; Sánchez, D. Enforcing transparent access to private content in social networks by means of automatic sanitization. Expert Syst. Appl. 2016, 62, 148–160. [Google Scholar] [CrossRef]
- Cheng, H.-J.; Kumar, A. Process mining on noisy logs-Can log sanitization help to improve performance? Decis. Support Syst. 2015, 79, 138–149. [Google Scholar] [CrossRef]
- Chen, X.; Pang, J. Protecting query privacy in location-based services. GeoInformatica 2014, 18, 95–133. [Google Scholar] [CrossRef]
- Agarwal, N.; Kale, S.; Singh, K.; Thakurta, A. Improved differentially private and lazy online convex optimization: Lower regret without smoothness requirements. In Proceedings of the 41st International Conference on Machine Learning (ICML 2024), JMLR.org, 2024, ICML’24, Vienna, Austria, 21–27 July 2024; 2024. [Google Scholar]
- Li, J.; Lu, L. A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data. IET Inf. Secur. 2024, 5553292. [Google Scholar] [CrossRef]
- Chen, L.; Ding, X.; Zhou, P.; Jin, H. Distributed dynamic online learning with differential privacy via path-length measurement. Inf. Sci. 2023, 630, 135–157. [Google Scholar] [CrossRef]
- Zhang, M.; Sun, Z.; Li, H.; Niu, B.; Li, F.; Zhang, Z.; Xie, Y.; Zheng, C. Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. IEEE Trans. Dependable Secur. Comput. 2023, 20, 3572–3587. [Google Scholar] [CrossRef]
- Song, Y.; Ding, L.; Liu, X.; Du, M. Differential Privacy Protection Algorithm Based on Zero Trust Architecture for Industrial Internet. In Proceedings of the IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS 2022), Shenyang, China, 29–31 July 2022; pp. 917–920. [Google Scholar] [CrossRef]
- Li, D.; Yang, Q.; Yu, W.; An, D.; Zhang, Y.; Zhao, W. Towards Differential Privacy-Based Online Double Auction for Smart Grid. IEEE Trans. Inf. Forensics Secur. 2020, 15, 971–986. [Google Scholar] [CrossRef]
- Han, M.; Li, L.; Xie, Y.; Wang, J.; Duan, Z.; Li, J.; Yan, M. Cognitive Approach for Location Privacy Protection. IEEE Access 2018, 6, 13466–13477. [Google Scholar] [CrossRef]
- Chen, L.; Zhu, P. Preserving the privacy of social recommendation with a differentially private approach. In Proceedings of the IEEE International Conference on Smart City (SmartCity 2015), Chengdu, China, 19–21 December 2015; Volume 2015, pp. 780–785. [Google Scholar] [CrossRef]
- Balsa, E.; Troncoso, C.; Diaz, C. A metric to evaluate interaction obfuscation in online social networks. Int. J. Uncertain. Fuzziness Knowldege-Based Syst. 2012, 20, 877–892. [Google Scholar] [CrossRef]
- Jia, J. A Consumer Data Privacy Protection Model Based on Non-Parametric Statistics for Dynamic Data Publishing in e-Commerce Platforms. Hightech Innov. J. 2024, 5, 410–419. [Google Scholar] [CrossRef]
- Simo, H.; Kreutzer, M. WAPITI—A Weighted Bayesian Method for Private Information Inference on Social Ego Networks. In Proceedings of the IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024), Sanya, China, 17–21 December 2024; pp. 2269–2280. [Google Scholar] [CrossRef]
- Neumann, G.K.; Grace, pp.; Burns, D.; Surridge, M. Pseudonymization risk analysis in distributed systems. J. Internet Serv. Appl. 2019, 10, 1. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, W.; Yu, N. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. Secur. Commun. Netw. 2017, 2017, 1897438:1–1897438:15. [Google Scholar] [CrossRef]
- Pensa, R.G.; Di Blasi, G. A privacy self-assessment framework for online social networks. Expert Syst. Appl. 2017, 86, 18–31. [Google Scholar] [CrossRef]
- Cevallos-Salas, D.; Estrada-Jiménez, J.; Guamán, D.S.; Urquiza-Aguiar, L. Ransomware dynamics: Mitigating personal data exfiltration through the SCIRAS lens. Comput. Secur. 2025, 157, 104583. [Google Scholar] [CrossRef]
- Peng, J.; Xiang, X.; Qin, J.; Tan, Y. Dual-branch networks for privacy-preserving cross-modal retrieval in cloud computing. J. Supercomput. 2024, 81, 127. [Google Scholar] [CrossRef]
- Arévalo, I.; Salmeron, J.L. A Chaotic Maps-Based Privacy-Preserving Distributed Deep Learning for Incomplete and Non-IID Datasets. IEEE Trans. Emerg. Top. Comput. 2024, 12, 357–367. [Google Scholar] [CrossRef]
- Kumar, S.; Wajeed, M.A.; Kunabeva, R.; Dwivedi, N.; Singhal, P.; Jamal, S.S.; Akwafo, R. Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models. Comput. Intell. Neurosci. 2022, 2022, 3564436. [Google Scholar] [CrossRef]
- Ng, P.C.; Spachos, P.; Gregori, S.; Plataniotis, K.N. Epidemic Exposure Tracking With Wearables: A Machine Learning Approach to Contact Tracing. IEEE Access 2022, 10, 14134–14148. [Google Scholar] [CrossRef]
- Hairab, B.I.; Elsayed, M.S.; Jurcut, A.D.; Azer, M.A. Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks. IEEE Access 2022, 12, 98427–98440. [Google Scholar] [CrossRef]
- Hui, S.; Wang, Z.; Hou, X.; Wang, X.; Wang, H.; Li, Y.; Jin, D. Systematically Quantifying IoT Privacy Leakage in Mobile Networks. IEEE Internet Things J. 2021, 8, 7115–7125. [Google Scholar] [CrossRef]
- Thiruppathy Kesavan, V.; Loheswaran, K. A hybrid combination of ls-svm and kpca with bat algorithm for intrusion detection. Recent Adv. Comput. Sci. Commun. 2021, 14, 512–520. [Google Scholar] [CrossRef]
- Kumar, A.; Braud, T.; Kwon, Y.D.; Hui, P. Aquilis: Using contextual integrity for privacy protection on mobile devices. ACM Interact. Mob. Wearable Ubiquitous Technol. 2020, 4, 1–28. [Google Scholar] [CrossRef]
- Li, T.C.; Hang, H.; Faloutsos, M.; Efstathopoulos, P. Trackadvisor: Taking back browsing privacy from third-party trackers. In Passive and Active Measurement. PAM 2015; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 8995, pp. 277–289. [Google Scholar] [CrossRef]
- Archana, G.; Goyal, R.; Kumar, K. Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment. Int. J. Comput. Intell. Syst. 2025, 18, 11. [Google Scholar] [CrossRef]
- Dogra, A.; Alkhayyat, A.; Saxena, A.; Dixit, K.; Singh, I.; Singh, S. Enhancing Data Privacy and Security in Healthcare IoT Applications Through Edge Data Filtering and Encryption for Secure and Compliant Cloud Transmission. In Intelligent Systems Design and Applications (ISDA 2024); Springer: Cham, Switzerland, 2024; pp. 362–368. [Google Scholar] [CrossRef]
- Routis, G.; Dagas, P.; Roussaki, I. Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography. Electronics 2024, 13, 730. [Google Scholar] [CrossRef]
- Shetty, N.P.; Muniyal, B.; Priyanshu, A.; Kumar, D.; Melroy Maben, L.; Agrawal, Y.; Natarajan, R.; Gunda, S.; Gupta, N. Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata. IEEE Access 2024, 12, 86403–86424. [Google Scholar] [CrossRef]
- Perazzo, P.; La Manna, M.; Iemma, F. Post-Quantum Attribute-Based Encryption: Performance Evaluation and Improvement for Embedded Systems. In Proceedings of the Post-Quantum Attribute-Based Encryption: Performance Evaluation and Improvement for Embedded Systems (EWSN 2022), Linz, Austria, 3–5 October 2022; Volume 1, pp. 268–273. [Google Scholar]
- Torkamandi, P.; Pajevic Kärkkäinen, L.; Ott, J. Characterizing Wi-Fi Probing Behavior for Privacy-Preserving Crowdsensing. In Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2022), Montreal, QC, Canada, 24–28 October 2022; Volume 1, pp. 203–212. [Google Scholar] [CrossRef]
- Aghasian, E.; Garg, S.; Montgomery, J. An automated model to score the privacy of unstructured information—Social media case. Comput. Secur. 2020, 92, 101778. [Google Scholar] [CrossRef]
- Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Ferrag, M.A.; Maglaras, L. The Impact of the Adversary’s Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles. In Proceedings of the 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2020), Corfu, Greece, 25–27 September 2020; Volume 1, pp. 1–6. [Google Scholar] [CrossRef]
- Papadopoulos, P.; Snyder, P.; Athanasakis, D.; Livshits, B. Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls. In Proceedings of the The World Web Conference (WWW 2020), Taipei, Taiwan, 20–24 April 2020; Volume 1, pp. 1433–1444. [Google Scholar] [CrossRef]
- Hu, D.; Hu, X.; Jiang, W.; Zheng, S.; Zhao, Z.Q. Intelligent digital image firewall system for filtering privacy or sensitive images. Cogn. Syst. Res. 2019, 53, 85–97. [Google Scholar] [CrossRef]
- Sjösten, A.; Van Acker, S.; Sabelfeld, A. Discovering Browser Extensions via Web Accessible Resources. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA, 22–24 March 2017; Volume 1, pp. 329–336. [Google Scholar] [CrossRef]
- Meng, W.; Lee, B.; Xing, X.; Lee, W. Trackmeornot: Enabling flexible control on web tracking. In Proceedings of the 25th International World Wide Web Conference (WWW 2016), Montréal, QC, Canada, 11–15 April 2016; Volume 1, pp. 99–109. [Google Scholar] [CrossRef]
- FaizKhademi, A.; Zulkernine, M.; Weldemariam, K. FPGuard: Detection and prevention of browser fingerprinting. In Data and Applications Security and Privacy XXIX. DBSec 2015; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 9149, pp. 293–308. [Google Scholar] [CrossRef]
- Dong, X.; Tran, M.; Liang, Z.; Jiang, X. AdSentry: Comprehensive and flexible confinement of JavaScript-based advertisements. In Proceedings of the ACM International Conference Proceeding Series (ICPS 2011), Orlando, FL, USA, 5–9 December 2011; Volume 1, pp. 297–306. [Google Scholar] [CrossRef]
- Han, X.; Yang, Y.; Wu, J.; Xiong, H. HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing. IEEE Trans. Knowl. Data Eng. 2024, 36, 3893–3905. [Google Scholar] [CrossRef]
- I, K.K.; S, H.A.A. RE-DACT: Adaptive Redaction and Anonymization Tool Using Machine-Learning. In Proceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS 2024), Gobichettipalayam, India, 12–13 December 2024; pp. 708–713. [Google Scholar] [CrossRef]
- Djomo, R.; Djotio Ndie, T. Towards Preventing Neighborhood Attacks: Proposal of a New Anonymization’s Approach for Social Networks Data. In Big Data Technologies and Applications. BDTA WiCON 2020 2020; Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Springer: Cham, Switzerland, 2021; Volume 371, pp. 195–208. [Google Scholar] [CrossRef]
- Gómez-Boix, A.; Frey, D.; Bromberg, Y.D.; Baudry, B. A collaborative strategy for mitigating tracking through browser fingerprinting. In Proceedings of the ACM Conference on Computer and Communications Security (ACM CCS 2019), London, UK, 11 November 2019; Volume 1, pp. 67–78. [Google Scholar] [CrossRef]
- Mao, J.; Tian, W.; Yang, Y.; Liu, J. An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance. IEEE Access 2019, 7, 153074–153085. [Google Scholar] [CrossRef]
- Xie, Y.; Zheng, M. A differentiated anonymity algorithm for social network privacy preservation. Algorithms 2016, 9, 85. [Google Scholar] [CrossRef]
- Mano, M.; Ishikawa, Y. Anonymizing user location and profile information for privacy-aware mobile services. In Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks (SIGSPATIAL 2010), San Jose, CA, USA, 2 November 2010; Volume 1, pp. 68–75. [Google Scholar] [CrossRef]
- Wang, Y.; Chen, X.; Jin, Q.; Ma, J. LIP3: A lightweighted fine-grained privacy-preserving profile matching mechanism for mobile social networks in proximity. In Algorithms and Architectures for Parallel Processing. ICA3PP 2015; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Cham, Switzerland, 2015; Volume 9532, pp. 166–176. [Google Scholar] [CrossRef]
- Chen, Z.; Wu, L. Residential appliance DR energy management with electric privacy protection by online stochastic optimization. IEEE Trans. Smart Grid 2013, 4, 1861–1869. [Google Scholar] [CrossRef]
- Cevallos, D.; Cevallos, F.; Bernal, I.; Mejía, D. Internet Bot para la Obtención y Análisis de Información Empleando el Motor de Búsqueda de Google. Rev. Politec. 2015, 35, 38–48. [Google Scholar]
- Cevallos, D.; Cevallos, F.; Bernal, I.; Mejía, D. Menu Creator: Plug-in de Generación Automática de Menús para el IDE de Desarrollo de Aplicaciones Interactivas NCL Composer. In Proceedings of the Twelfth LACCEI Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2014) “Excellence in Engineering To Enhance a Country’s Productivity”, Guayaquil, Ecuador, 22–24 July 2014; pp. 1–10. [Google Scholar]
- Cevallos Salas, D.F. Enhanced RC5 Algorithm Using Parallel Computing for Communication Networks. Ing. Y Cienc. 2019, 15, 103–125. [Google Scholar] [CrossRef]
- Congress.gov. S.5218—Health Infrastructure Security and Accountability Act of 2024. Available online: https://www.congress.gov/bill/118th-congress/senate-bill/5218/text (accessed on 22 July 2025).
- Congress.gov. S.1851—Healthcare Cybersecurity Act of 2025. Available online: https://www.congress.gov/bill/119th-congress/senate-bill/1851 (accessed on 22 July 2025).
- U.S. Department of Health and Human Services. The HIPAA Privacy Rule. Available online: https://www.hhs.gov/hipaa/for-professionals/privacy/index.html (accessed on 22 July 2025).
- Cevallos-Salas, D.; Estrada-Jiménez, J.; Guamán, D.S.; Rodríguez, D.; Del Álamo, J.M. GPT vs human legal texts annotations: A comparative study with privacy policies. Research Square. 2024. [CrossRef]
- Cevallos, F. Digital news classification and punctuaction using machine learning and text mining techniques. Appl. Comput. Sci. 2024, 20, 24–42. [Google Scholar] [CrossRef]
- Wu, X.; Zou, B.; Lu, C.; Wang, L.; Zhang, Y.; Wang, H. Dynamic Security Computing Framework With Zero Trust Based on Privacy Domain Prevention and Control Theory. IEEE J. Sel. Areas Commun. 2025, 43, 2266–2278. [Google Scholar] [CrossRef]
- Hussein, D.H.; Ibnkahla, M. Privacy-Preserving Intelligent Intent-Based Network Slicing for IoT Systems. IEEE Internet Things J. 2025, 12, 27783–27807. [Google Scholar] [CrossRef]
- Mussgnug, A.M. Technology as uncharted territory: Contextual integrity and the notion of AI as new ethical ground. arXiv 2025, arXiv:2412.05130. [Google Scholar] [CrossRef]
- Sezgin, A.; Boyacı, A. DecoyPot: A large language model-driven web API honeypot for realistic attacker engagement. Comput. Secur. 2025, 154, 104458. [Google Scholar] [CrossRef]
Reference | Year | Protection Mechanisms | Heuristic Techniques | Domain | |
---|---|---|---|---|---|
PMA | Others | ||||
Bhattacharjya et al. [40] | 2025 | ✓ | ✓ | IoUT | |
Schyff et al. [27] | 2024 | ✓ | Web | ||
Senette et al. [35] | 2024 | ✓ | ✓ | Social networks | |
Al-Qarni [42] | 2023 | ✓ | Healthcare | ||
Bartol et al. [26] | 2023 | ✓ | Social networks | ||
Benamor et al. [41] | 2023 | ✓ | ✓ | Web | |
Esposito et al. [33] | 2023 | ✓ | ✓ | Social networks | |
Kumar and Knox [44] | 2023 | ✓ | Online education | ||
Rajkumar and Dhanakoti. [45] | 2023 | ✓ | Web | ||
Barajas et al. [30] | 2022 | ✓ | ✓ | Web | |
Del Álamo et al. [28] | 2022 | ✓ | Web and Mobile | ||
Desmal et al. [36] | 2022 | ✓ | ✓ | Mobile | |
Haque et al. [38] | 2022 | ✓ | IoT | ||
Majeed et al. [29] | 2022 | ✓ | ✓ | Web | |
Bartol et al. [25] | 2021 | ✓ | Web | ||
Hameed et al. [43] | 2021 | ✓ | ✓ | Healthcare IoT | |
Eke et al. [34] | 2019 | ✓ | ✓ | Social networks | |
Dong et al. [39] | 2018 | ✓ | ✓ | IoT | |
Youm [37] | 2017 | ✓ | IoT | ||
Yun et al. [24] | 2014 | ✓ | Web | ||
This research | 2025 | ✓ | ✓ | ✓ | All |
Keyword | Related Terms |
---|---|
Assessment | Measurement, Metric |
Internet privacy | Online privacy |
Heuristic technique | Method, Methodology, Procedure, Strategy |
Protection mechanism | Control, Countermeasure, Defense mechanism, Privacy-enhancing technologies (PETs) |
Filter | Inclusion Criteria |
---|---|
Language | English |
Document type | Conference Paper or Journal |
Research field | Computer Science |
Publication stage | Final |
Filter | Inclusion Criteria |
---|---|
Type of contribution | Is the paper a primary contribution? |
Internet privacy related | Does the paper present a solution related to Internet privacy or one that could be adapted to Internet privacy? |
Paper contribution | Is the paper contribution related to a technique and/or a protection mechanism able to assess or protect Internet privacy? |
Contribution proof | Does the paper provide a proof that helps corroborate the proposed solution? |
N° | Heuristic Technique Category | Metric | Link to Privacy | Advantages | Disadvantages |
---|---|---|---|---|---|
1 | Perception Estimation | Likert scale [31] | Depends on the context (e.g., a high number of answers choosing option 3 in a question like “How much protected do I feel is my personal data being 1—low, 2—medium, 3—high?” involves a high Internet privacy). | -Easy to interpret. | -Highly subjective and based on opinions. |
2 | Privacy Policies Analysis | Flesch Reading Ease [49] | A high metric involves a high Internet privacy. | -Easy to calculate. -Simple mathematical formulation. | -English Language oriented metric. -Does not determine if statements in the privacy policy are implemented in practice. |
3 | Information Measurement-Entropy | Shannon Entropy [54] | A high metric involves a high Internet privacy. | -Easy to calculate. | -Reaches its maximum value just on equiprobable attributes. |
4 | Information Measurement-Differentiation | Shannon Information Gain [100] | A high metric involves a low Internet privacy. | -Simple to calculate. | -Requires two calculations of entropy. |
5 | Information Measurement-Differentiation | Mean Mutual Information [15] | A high metric involves a low Internet privacy. | -Low processing cost. | -Can consider already analyzed and redundant attributes as part of its calculus. |
6 | Information Measurement-Differentiation | -Differential Privacy [14] | A small value involves a high Internet privacy. | -Widely researched. -Offers strong resistance to re-identification attacks. | -Requires implementing an algorithm in software to be applied. -Resource expensive. |
7 | Information Measurement-Differentiation | Kullback–Leibler divergence [61] | A high metric involves a high Internet privacy. | -Its use demonstrates good results. -Is the base for multiple derived metrics (e.g., Jensen-Shannon Divergence). | -Does not meet the triangular inequality criterion. -Low quality representation in latent distributions. -It is a non-symmetric metric. |
8 | Information Measurement-Differentiation | Sinkhorn divergence [62] | A high metric involves a high Internet privacy. | -Based on optimization methods. -Offers a more realistic metric. | -Complex to calculate. -Usually time-consuming. |
9 | Information Measurement-Bayesian Approach | Posterior probability [101] | A high probability involves a low level of Internet privacy. | -Simple to calculate once conditional probabilities are defined. | -Requires defining statistical models for the information system’s initial and final states. -The principles of independence of events required for problem simplification are usually difficult to interpret. |
10 | Information Measurement-Bayesian Approach | Overall Bayes factor [18] | A high metric involves a high Internet privacy. | -Offers a more realistic approach than binary hypothesis tests. | -Requires defining statistical models for the information system’s initial and final states. |
11 | Machine Learning Testing-Regression | MSE [67] | Usually, a high metric involves a low Internet privacy. | -Easy to calculate. -Not computationally demanding. | -Difficult to interpret. -Sensible to central tendency bias. |
12 | Machine Learning Testing-Classification | Accuracy [102] | Usually, a high metric involves a high Internet privacy. | -Good for binary classification problems. | -Susceptible to unbalanced data. |
13 | Machine Learning Testing-Classification | F1-score [102] | Usually, a high metric involves a high Internet privacy. | -Good for multiclass classification problems. -Good for unbalanced data. | -Sensible to variations in Precision and Recall. |
14 | Counting | Various (e.g., Number of third-party cookies blocked [5]) | Depends on the context, e.g., a high number of third-party cookies blocked involves a high Internet privacy. | -Easy to interpret. | -Susceptible to contexts of analysis. -Depending on the context, it can make it difficult to take a representative sample in real-world conditions. |
15 | Similarity Measurement-Aggregation | k-anonymity [103] | A high k value involves a high Internet privacy. | -Easy to calculate and interpret. | -If broken, all the k sets of original attributes are in potential danger. -Not suitable for multidimensional problems. |
16 | Similarity Measurement-Distance | Euclidean distance [104] | A high metric involves a high Internet privacy. | -Easy to calculate. | -Defining the weights of attributes requires additional analysis and interpretation. -Does not capture semantic differences. |
17 | Similarity Measurement-Distance | Hamming distance [105] | A high metric involves a high Internet privacy. | -Fast in software due to binary operations. | -Requires that both sets of attributes have the same length in bytes. |
18 | Similarity Measurement-Correlation | Pearson correlation coefficient [86] | A high metric involves a low Internet privacy. | -It does not depend on the units of measurement. | -Only detects linear correlation. -Sensitive to outliers. |
19 | Similarity Measurement-Correlation | Cosine similarity [87] | A high metric involves a low Internet privacy. | -Works well with sparse and high-dimensional data. -Computationally efficient. | -It primarily considers the orientation rather than the magnitude of the attribute representations. |
Heuristic Technique Category | Count | Papers | |
---|---|---|---|
Perception Estimation | 20 | [31,32,46,47,91,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120] | |
Privacy Policies Analysis | 31 | [9,11,48,49,50,51,52,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144] | |
Information Measurement | Entropy | 7 | [54,55,56,145,146,147,148] |
Differentiation | 22 | [10,14,15,57,58,59,60,61,62,81,88,94,100,149,150,151,152,153,154,155,156,157] | |
Bayesian Approach | 10 | [18,53,63,64,101,158,159,160,161,162] | |
Machine Learning Testing | Regression | 1 | [67] |
Classification | 17 | [6,65,66,68,95,163,164,165,166,167,168,169,170,171,172] | |
Counting | 29 | [1,3,4,5,7,8,12,69,70,71,72,73,74,75,92,173,174,175,176,177,178,179,180,181,182,183,184,185,186] | |
Similarity Measurement | Aggregation | 7 | [17,79,80,82,103,187,188] |
Distance | 11 | [13,83,84,85,104,105,189,190,191,192,193] | |
Correlation | 5 | [78,86,87,194,195] |
Level of Assessment | Main Metrics | Advantages | Disadvantages |
---|---|---|---|
Nominal | -Yes/no questions [31]. | -Easy to estimate. | -Analysis limited due to the absence of an order criterion. |
Ordinal | -Likert scale [124]. -Flesch Reading Ease [49]. | -Allows to determine if a solution is better than others. | -Does not allow for making comparisons in the sense of magnitude, that is, to define how much better a solution is than order. |
Interval | -k metric [80]. -Number of required queries [75]. -Accuracy of classifiers with no regularization methods [102]. | -Allows for making comparisons between solutions in the sense of magnitude. | -Lack of interpretation for the zero value. |
Ratio | -Number of disclosed personal data [176]. -Number of blocked third-party cookies [5]. -Bayes factor [18]. --Differential Privacy [14]. | -Allows more precision when making comparisons. -Defines a criterion for the zero value of its scale. | -Usually mathematically more complex. -Usually requires the definition of statistical models. |
Level of Assessment | Count | Papers |
---|---|---|
Nominal | 27 | [11,12,17,31,50,52,78,86,103,106,107,108,109,111,112,113,114,119,120,125,127,132,137,141,179,187,188] |
Ordinal | 42 | [9,32,46,47,49,51,66,71,72,82,87,91,110,115,116,117,118,121,122,123,124,126,128,129,130,131,133,134,135,136,138,139,140,142,143,144,168,170,178,181,182,183] |
Interval | 37 | [4,7,10,13,16,48,67,68,69,70,73,74,75,80,81,83,84,85,92,95,102,163,164,165,166,167,169,177,180,184,185,186,189,190,193,194,195] |
Ratio | 54 | [1,3,5,6,8,14,15,18,53,54,55,56,57,58,59,60,61,62,63,64,65,79,88,94,100,101,104,105,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,171,172,173,174,175,176,191,192] |
Level of Automation | Main Tools | Advantages | Disadvantages |
---|---|---|---|
Automatic | -Algorithms [14]. -Web crawlers with reports functionality [135]. -Platforms for compliance analysis [51]. | -Provides results in less time. -Offers a more granular interpretation of results [196,197]. | -Implementation of platforms could be expensive and/or time-consuming. -Automatic tools may be restricted in certain environments, limiting their ability to gather sensitive information that a human could obtain. |
Semi-automatic | -Manual analysis of websites’ information retrieved from web crawlers [60]. -Manual definition of frequencies and probabilities of attributes’ appearance for automatic entropy calculation [151]. | -Combines automated efficiency with human judgment. | -Offers less scalability than automatic tools. -The process can become slow when dealing with large volumes of data. |
Manual | -Surveys [31]. -Questionnaires [106]. -Telephone calls [91]. -Manual analysis of information disclosed in websites and portals [12]. | -Easy to perform. -Access to information in environments with protection against automatic tools. | -Prone to errors. -Time-consuming. |
Level of Automation | Count | Papers |
---|---|---|
Automatic | 86 | [3,4,5,8,9,10,14,15,16,18,48,51,53,56,57,58,61,65,66,67,68,69,70,71,72,74,79,80,83,84,85,87,94,101,102,103,104,121,122,125,126,128,129,130,132,133,134,135,138,139,140,141,142,143,146,147,150,152,153,154,155,156,157,159,161,163,167,168,170,171,173,174,175,176,177,178,182,183,186,187,189,190,191,192,193,194] |
Semi-automatic | 43 | [1,6,7,13,17,49,54,55,59,60,62,63,64,73,75,78,81,82,86,88,92,95,105,117,124,127,131,136,144,145,148,149,151,158,162,164,165,166,169,172,180,185,188] |
Manual | 31 | [11,12,31,32,46,47,50,52,91,100,106,107,108,109,110,111,112,113,114,115,116,118,119,120,123,137,160,179,181,184,195] |
N° | Type of Protection Mechanism | Protection Mechanism | Advantages | Disadvantages |
---|---|---|---|---|
1 | Detection | Alert IDS [1] | -Usually comprises standalone solutions. -Easy to deploy. | -Limits its actions to just generating logs or alerts with no actions. -Allows the threats to cause an initial impact. -Fine-tuning of signatures required. |
2 | Prevention | Encryption [3] | -Significantly mitigates risks of unauthorized access to personal data. | -Key management is complex and critical. -Performance overhead for strong encryption algorithms [198]. -Encrypted data is usually unusable (an exception is Homomorphic encryption that allows computations to be performed without needing to decrypt data first [66]). |
3 | Prevention | Pseudonymization [160] | -Enables data utility for analytics while protecting identity. | -Allows re-identification through auxiliary data. -Requires secure management of mapping keys. -Not suitable for high-sensitivity datasets without additional countermeasures. |
4 | Prevention | Anonymization [14] | -Supports compliance with strict privacy regulations. -Enables data sharing without violating privacy regulations. | -No standardized anonymization method for all scenarios. |
5 | Prevention | Randomization [17] | -Simple to implement in many statistical contexts. -Scales well for large datasets. | -Susceptible to brute force attacks. |
6 | Prevention | Noise addition [104] | -Simple and mathematically sound for privacy guarantees. | -Requires careful noise calibration to avoid excessive distortion. |
7 | Prevention | Obfuscation [157] | -Low implementation complexity for many cases. -Low computational cost. | -Can be bypassed through advanced analysis or reverse engineering. |
8 | Prevention | Masking [87] | -Easy to implement by systems allowing privacy-by-default. | -Extremely susceptible to brute force attacks. |
9 | Prevention | Contextual integrity [171] | -Defines authorized privacy flows for protection. -Supports adaptive and flexible implementation of privacy policies. | -Requires deep understanding of varied contexts. -Limited support for automation and tools. |
10 | Prevention | DLP [158] | -Enforces data handling policies. -Monitors data across endpoints, network, and cloud. | -High false positive rate can disrupt workflows. -Complex to configure and maintain effectively. |
11 | Prevention | Static analysis of privacy malware [46] | -Faster and less resource-intensive than dynamic analysis. -Useful for automated scanning on endpoints and peripheral devices. | -If effective, it does not allow privacy malware to cause an initial impact. -Signature-based system. -Inefficient against zero-day attacks. |
12 | Prevention | IPS [103] | -If effective, it does not involve an impact. | -Fine-tuning of signatures required. |
13 | Response | IDS with response capabilities [67] | -Highly susceptible to false-positive cases. | -Allows threats to cause an initial impact. -Fine-tuning of signatures still required. |
14 | Response | Dynamic analysis of privacy malware [102] | -Allows more accurate detection and threat containment. -Offers a level of protection against zero-day attacks. | -Allows threats to cause an initial impact. |
15 | Recovery | Advanced Privacy Protection Systems [95] | -Able to provide details of personal data exfiltration attack trajectories and vulnerabilities exploited. | -Usually involves several subsystems or nodes. -Complex to deploy. -Usually expensive. |
Type of Protection Mechanism | Count | Papers |
---|---|---|
Detection | 16 | [1,6,7,8,71,84,123,137,162,168,170,172,179,181,182,183] |
Prevention | 48 | [3,5,14,17,46,48,55,56,57,58,66,69,72,73,78,80,82,83,87,88,92,100,103,104,145,154,156,157,158,159,160,161,166,167,171,173,174,175,177,178,184,187,188,189,192,193,194,195] |
Response | 24 | [16,59,63,65,67,68,70,74,79,102,146,147,148,151,152,155,163,164,165,176,185,186,190,191] |
Recovery | 13 | [10,13,15,18,61,64,81,94,95,105,149,150,153] |
Broad Domain | Main Domains |
---|---|
Enterprise | Web, Cloud Computing (CC), Fog Computing (FC), Online Social Networks (OSN). |
Mobile | Mobile Computing (MC), Mobile Applications (mAPPs), Internet of Things (IoT), Vehicle Ad hoc Networks (VANETs), Internet of Vehicles (IoV), Mobile Cloud Computing (MCC), Mobile Edge Computing (MEC), Mobile Health (mHealth), Mobile Payment Systems (MPS), Mobile Social Networks (MSN). |
Industrial Control Systems | Industrial Internet of Things (IIoT), Industrial Automation and Control Systems (IACS), Supervisory Control and Data Acquisition (SCADA), Cyber-Physical Systems (CPS), Advanced Metering Infrastructure (AMI). |
Broad Domain | Count | Papers |
---|---|---|
Enterprise | 116 | [1,3,5,7,12,13,14,15,17,18,32,47,49,50,52,56,57,58,59,60,62,63,65,66,67,69,70,71,72,74,75,78,80,81,83,84,85,86,87,91,94,95,100,101,102,103,104,105,106,107,108,110,111,112,114,115,116,117,118,119,120,121,122,123,124,125,127,129,132,134,135,136,137,138,139,140,141,142,144,146,147,148,149,150,151,152,153,155,156,157,158,159,160,161,162,163,164,165,166,170,172,173,176,179,181,182,183,184,185,186,187,188,189,190,191,192] |
Mobile | 38 | [4,6,8,9,10,16,31,46,48,51,54,55,64,68,73,79,82,88,92,109,113,126,128,131,133,143,145,167,168,169,171,174,175,177,178,180,193,194] |
Industrial Control Systems | 6 | [11,53,61,130,154,195] |
Technology/Approach | Explanation |
---|---|
Zero-trust networking | A security approach that assumes no user, device, or system (inside or outside the network) should be trusted by default. Access is granted based on strict identity verification, continuous monitoring, and least-privilege principles, allowing a high level of Internet privacy [204]. |
Intent-based privacy networking | An approach based on user-defined privacy intents (e.g., anonymity, minimal data sharing) to dynamically configure network behavior and data flows to meet those privacy goals, often powered by AI and automation [205]. |
AI-powered contextual integrity | A privacy framework enhanced by AI that ensures personal data is shared and used only in ways that align with the social norms, ethics, and expectations of a given context. AI systems analyze context (e.g., roles, purpose, and personal data type) to enforce appropriate personal data flows [206]. |
LLMs-driven privacy | Beyond privacy policies analysis, LLMs can also be used for integration into rule-based privacy systems (e.g., traditional IDS, IPS, DLP) to enhance their ability to detect, interpret, and respond to complex and context-rich threats involving personal data [207]. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cevallos-Salas, D.; Estrada-Jiménez, J.; Guamán, D.S. Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis. Technologies 2025, 13, 377. https://doi.org/10.3390/technologies13090377
Cevallos-Salas D, Estrada-Jiménez J, Guamán DS. Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis. Technologies. 2025; 13(9):377. https://doi.org/10.3390/technologies13090377
Chicago/Turabian StyleCevallos-Salas, David, José Estrada-Jiménez, and Danny S. Guamán. 2025. "Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis" Technologies 13, no. 9: 377. https://doi.org/10.3390/technologies13090377
APA StyleCevallos-Salas, D., Estrada-Jiménez, J., & Guamán, D. S. (2025). Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis. Technologies, 13(9), 377. https://doi.org/10.3390/technologies13090377