2019
DOI: 10.1016/j.procs.2019.04.174
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving, Protection of Personal Data, and Big Data: a Review of the Colombia Case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The MPS was conducted under the Bloomberg Data for Health Initiative,28 which aims to develop and optimise MPS to collect data on NCD risk factors in Colombia and elsewhere. Due to regulations related to access to personal data of individuals in Columbia,29 there is no sampling frame available that lists working (activated) mobile phone numbers. We used the random digit dialling technique to generate potential mobile phone numbers 30.…”
Section: Methodsmentioning
confidence: 99%
“…The MPS was conducted under the Bloomberg Data for Health Initiative,28 which aims to develop and optimise MPS to collect data on NCD risk factors in Colombia and elsewhere. Due to regulations related to access to personal data of individuals in Columbia,29 there is no sampling frame available that lists working (activated) mobile phone numbers. We used the random digit dialling technique to generate potential mobile phone numbers 30.…”
Section: Methodsmentioning
confidence: 99%
“…The digital economy is a data economy. Big data promises big socially acceptable and desirable benefits in state financial activity (Silva, 2019). Digital information has overtaken oil as the most valuable commodity in the world.…”
Section: Resultsmentioning
confidence: 99%
“…The research indicates that in order to handle such a complex network, an artificial intelligence-based security approach ought to ensure the confidentiality, integrity, including legitimacy of the hardware, the software, and the network's governing protocols, irrespective of the system's generation [21]. We've looked closely at the open challenges that mobile networks continue to confront, such as fraud links, unauthorized network scanning, and more [22]. There is a discussion of several cyber security concerns and how to construct a secure environment using ML and DL approaches.…”
Section: Discussionmentioning
confidence: 99%