Author:
Kareem Yunus,Jahankhani Hamid
Publisher
Springer Nature Switzerland
Reference33 articles.
1. Jennings M 2022 Top data breaches and cyber attacks of 2022. In: TechRadar. Retrieved from https://www.techradar.com/features/top-data-breaches-and-cyber-attacks-of-2022
2. Information Commissioner’s Office (2012) Determining what is personal data. In: Information commissioner’s office (ico.). Retrieved from https://ico.org.uk/media/for-organisations/documents/1554/determining-what-is-personal-data.pdf
3. Onik MMH et al (2019) Privacy-aware blockchain for personal data sharing and tracking. Open Comput Sci 9(1):80–91. https://doi.org/10.1515/comp-2019-0005
4. Al-Fedaghi S, Al-Azmi AAR (2012) Experimentation with personal identifiable information. Intell Inf Manag 4:123–133. https://doi.org/10.4236/iim.2012.44019
5. Yakowtiz J (2011) Tragedy of the data commons. Harvard J Law Technol 25(1):1–67