{"id":"https://openalex.org/W4248214289","doi":"https://doi.org/10.7287/peerj.preprints.26473v1","title":"A survey on approaches to the protection of personal data gathered by IoT devices","display_name":"A survey on approaches to the protection of personal data gathered by IoT devices","publication_year":2018,"publication_date":"2018-01-31","ids":{"openalex":"https://openalex.org/W4248214289","doi":"https://doi.org/10.7287/peerj.preprints.26473v1"},"language":"en","primary_location":{"id":"doi:10.7287/peerj.preprints.26473v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26473v1","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7287/peerj.preprints.26473v1","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024466668","display_name":"Henry Tranter","orcid":null},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Henry Tranter","raw_affiliation_strings":["Department of Computing, The Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5024466668"],"corresponding_institution_ids":["https://openalex.org/I11983389"],"apc_list":null,"apc_paid":null,"fwci":0.18060948,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52575406,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7195568084716797},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6882505416870117},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6433940529823303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6322524547576904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5559372305870056},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.4764464497566223},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.45052486658096313},{"id":"https://openalex.org/keywords/emerging-technologies","display_name":"Emerging technologies","score":0.4264785945415497},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3337591290473938},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3312716484069824},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.11048054695129395},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09266653656959534}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7195568084716797},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6882505416870117},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6433940529823303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6322524547576904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5559372305870056},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.4764464497566223},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.45052486658096313},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.4264785945415497},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3337591290473938},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3312716484069824},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.11048054695129395},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09266653656959534},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7287/peerj.preprints.26473v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26473v1","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"}],"best_oa_location":{"id":"doi:10.7287/peerj.preprints.26473v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.26473v1","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4286284259","https://openalex.org/W1507118973","https://openalex.org/W2004781009"],"abstract_inverted_index":{"Security":[0],"is":[1,47,109],"always":[2],"at":[3,56],"the":[4,29,98,114,140,149,158,166],"forefront":[5],"of":[6,17,34,44,49,58,75,101,116,142,160],"developing":[7,51],"technologies.":[8],"One":[9],"can":[10],"seldom":[11],"go":[12],"a":[13,18,35,39,93],"week":[14],"without":[15],"hearing":[16],"new":[19],"data":[20,132],"breach":[21],"or":[22],"hacking":[23],"attempt":[24],"from":[25,82],"various":[26,137],"groups":[27],"around":[28],"world,":[30],"often":[31],"taking":[32,92],"advantage":[33],"simple":[36],"flaw":[37],"in":[38,69,85,97,106,113,148,157],"system\u2019s":[40],"architecture.":[41],"The":[42],"Internet":[43],"Things":[45],"(IoT)":[46],"one":[48],"these":[50,89,117,120],"technologies":[52,90],"which":[53],"may":[54,170],"be":[55,152],"risk":[57],"such":[59],"attacks.":[60],"IoT":[61,146],"devices":[62,121,147],"are":[63,91],"becoming":[64],"more":[65,67],"and":[66,155],"prevalent":[68],"everyday":[70],"life.":[71],"From":[72],"keeping":[73],"track":[74],"an":[76,86,162],"individual\u2019s":[77,87,124],"health,":[78],"to":[79,139,165],"suggesting":[80],"meals":[81],"items":[83],"available":[84],"fridge,":[88],"much":[94],"larger":[95],"role":[96],"personal":[99,125],"lives":[100,126],"their":[102],"users.":[103],"With":[104],"this":[105,135,168],"mind,":[107],"how":[108],"security":[110,143],"being":[111],"considered":[112],"development":[115,141],"technologies?":[118],"Are":[119],"that":[122],"monitor":[123],"just":[127],"additional":[128],"vectors":[129],"for":[130],"potential":[131],"theft?":[133],"Throughout":[134],"survey,":[136],"approaches":[138],"systems":[144],"concerning":[145],"home":[150],"will":[151],"discussed,":[153],"compared,":[154],"contrasted":[156],"hope":[159],"providing":[161],"ideal":[163],"solution":[164],"problems":[167],"technology":[169],"produce.":[171]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
