Mortaza S. Bargh

Orcid: 0000-0001-5395-456X

According to our database1, Mortaza S. Bargh authored at least 55 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive Feature Selection Using an Autoencoder and Classifier: Applied to a Radiomics Case.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Generating Synthetic Data from Large Language Models.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Stereotypes in ChatGPT: an empirical study.
Proceedings of the 16th International Conference on Theory and Practice of Electronic Governance, 2023

2022
Data governance in smart cities: Challenges and solution directions.
J. Smart Cities Soc., 2022

On Using Privacy Labels for Visualizing the Privacy Practice of SMEs: Challenges and Research Directions.
Proceedings of the dg.o 2022: The 23rd Annual International Conference on Digital Government Research, Virtual Event, Republic of Korea, June 15, 2022

2021
Designing a User Interface for Improving the Usability of a Statistical Disclosure Control Tool.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

WiP: A Distributed Approach for Statistical Disclosure Control Technologies.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Embedding Personal Data Minimization Technologies in Organizations: Needs, Vision and Artifacts.
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021

Operationalization of a Glass Box Through Visualization: Applied to a Data Driven Profiling Approach.
Proceedings of the Responsible AI and Analytics for an Ethical and Inclusive Digitized Society, 2021

2020
Mapping crime descriptions to law articles using deep learning.
Proceedings of the ICEGOV 2020: 13th International Conference on Theory and Practice of Electronic Governance, 2020

2019
Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems.
Proceedings of the First IEEE International Conference on Trust, 2019

On opening sensitive data sets in light of GDPR.
Proceedings of the ICEGOV 2019: 12th International Conference on Theory and Practice of Electronic Governance, 2019

The Praxis of HR Analytics.
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019

Crafting Privacy: Two Case Studies Integrating Cross-Disciplinary Perspectives on Privacy in Design.
Proceedings of the Joint Proceedings HCI Engineering 2019, 2019

A Method for Assessing the Openness of Semi-Open Data Initiatives: Applied to the Justice Domain.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

Opening Privacy Sensitive Microdata Sets in Light of GDPR.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

2018
On the Usability of Big (Social) Data.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Exploiting Data Analytics for Social Services: On Searching for Profiles of Unlawful Use of Social Benefits.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
On Using Obligations for Usage Control in Joining of Datasets.
Proceedings of the Information Systems Security and Privacy, 2017

On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Exploiting Big Data for Evaluation Studies.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

Influence of Mental Models on the Design of Cyber Security Dashboards.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 3: IVAPP, Porto, Portugal, February 27, 2017

2016
On design and deployment of two privacy-preserving procedures for judicial-data dissemination.
Gov. Inf. Q., 2016

Meeting Open Data Halfway: on Semi-Open Data Paradigm.
Proceedings of the 9th International Conference on Theory and Practice of Electronic Governance, 2016

On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Maturing Pay-as-you-go Data Quality Management: Towards Decision Support for Paying the Larger Bills.
Proceedings of the Data Management Technologies and Applications, 2016

Management of Data Quality Related Problems - Exploiting Operational Knowledge.
Proceedings of the DATA 2016, 2016

Compressing Large Amounts of NetFlow Data Using a Pattern Classification Scheme.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Privacy and information sharing in a judicial setting: a wicked problem.
Proceedings of the 16th Annual International Conference on Digital Government Research, 2015

2014
Research skills for software engineering undergraduates in dutch universities of applied sciences.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

Privacy protection in data sharing: towards feedback based solutions.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

Fraud Indicators Applied to Legal Entities: An Empirical Ranking Approach.
Proceedings of the Database and Expert Systems Applications, 2014

2012
Exploring a Warrior Paradigm to Design Out Cybercrime.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Sensing, Actuation Triggering and Decision Making for Service Robots Deployed in Smart Homes.
Proceedings of the Ambient Intelligence, 2011

2009
Power- and delay-awareness of health telemonitoring services: the mobihealth system case study.
IEEE J. Sel. Areas Commun., 2009

2008
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Indoor localization based on response rate of bluetooth inquiries.
Proceedings of the ACM International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments, 2008

2007
Network Resource Awareness and Control in Mobile Applications.
IEEE Internet Comput., 2007

Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Trust-enhanced Security in Location-based Adaptive Authentication.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Context Sensitive Adaptive Authentication.
Proceedings of the Smart Sensing and Context, 2007

2006
A context management framework for supporting context-aware distributed applications.
IEEE Commun. Mag., 2006

Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Towards an Energy-Aware Network Activation Strategy for Multi-Homed Mobile Devices.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

2005
Identity and Trust Management Directions for User Controlled Light-Path Establishment.
Proceedings of the Self-Organization and Autonomic Informatics (I), 2005

Context sensitive access control.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

2004
Fast authentication methods for handovers between IEEE 802.11 wireless LANs.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

Privacy Enforcement Embedded in Mobile Services.
Proceedings of the Wireless Information Systems, 2004

A Mechanism for Host Mobility Management supporting Application Awareness.
Proceedings of the Second International Conference on Mobile Systems, 2004

Managing Mobility in Beyond-3G Environments.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Context-Based Service Access for Train Travelers.
Proceedings of the Ambient Intelligence: Second European Symposium, 2004

The 4GPLUS Project, Overview and Main Results.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

2003
A structured framework for federation between 4G-service platforms.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...