1. Data governance: A conceptual framework, structured review, and research agenda;Abraham;Int. J. Inf. Manag.,2019
2. Data governance model to enhance data quality in financial institutions;Inf. Syst. Manag.,2023
3. Huang, J., Li, Z., Xiao, X., Wu, Z., Lu, K., Zhang, X., and Jiang, G. (2015, January 12–14). SUPOR: Precise and scalable sensitive user input detection for android apps. Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), Washington, DC, USA.
4. Nan, Y., Yang, M., Yang, Z., Zhou, S., Gu, G., and Wang, X. (2015, January 12–14). Uipicker: User-input privacy identification in mobile applications. Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), Washington, DC, USA.
5. Yang, Z., and Liang, Z. (2018). Security and Privacy in Communication Networks, Proceedings of the 14th International Conference, SecureComm 2018, Singapore, 8–10 August 2018, Springer International Publishing.