{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:55:41Z","timestamp":1776077741924,"version":"3.50.1"},"reference-count":179,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Science Foundation, United States of America","award":["2348147"],"award-info":[{"award-number":["2348147"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"DOI":"10.1007\/s10207-025-01205-x","type":"journal-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T12:28:49Z","timestamp":1771590529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring IoT privacy compliance research: a topic modeling approach"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8881-3369","authenticated-orcid":false,"given":"Lavanya","family":"Elluri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9994-1991","authenticated-orcid":false,"given":"Rahul","family":"Dwivedi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7900-434X","authenticated-orcid":false,"given":"Sunme","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0087-3664","authenticated-orcid":false,"given":"Ran","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"1205_CR1","doi-asserted-by":"crossref","unstructured":"Khan, MA.,Shahid, MHB., Mansoor, H., Shafique, U., Khan, MB., et\u00a0al.: Iot based grocery management system: Smart refrigerator and smart cabinet. In 2019 International Conference on Systems of Collaboration Big Data, Internet of Things & Security (SysCoBIoTS), pages 1\u20135. IEEE, 2019","DOI":"10.1109\/SysCoBIoTS48768.2019.9028031"},{"key":"1205_CR2","doi-asserted-by":"crossref","unstructured":"Dorsemaine, B., Gaulier, JP., Wary, JP., Kheir, N., Urien, P.: Internet of things: a definition & taxonomy. In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pages 72\u201377. IEEE, 2015","DOI":"10.1109\/NGMAST.2015.71"},{"issue":"7","key":"1205_CR3","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K., et al.: That \u2018internet of things\u2019\u2019 thing. RFID journal 22(7), 97\u2013114 (2009)","journal-title":"RFID journal"},{"key":"1205_CR4","unstructured":"Asimily. The top internet of things (iot) cybersecurity breaches in 2025. https:\/\/asimily.com\/blog\/the-top-internet-of-things-iot-cybersecurity-breaches-in-2025\/, 2025"},{"key":"1205_CR5","unstructured":"Khalil, M.: Iot hacking statistics 2025: The definitive report on threats, risks & regulations. https:\/\/deepstrike.io\/blog\/iot-hacking-statistics, 2025"},{"key":"1205_CR6","unstructured":"eInfochips. Impact of iot security on different domains in 2025. https:\/\/www.einfochips.com\/blog\/impact-of-iot-security-on-different-domains-in-2025\/, 2025"},{"key":"1205_CR7","doi-asserted-by":"publisher","first-page":"119697","DOI":"10.1109\/ACCESS.2020.3005509","volume":"8","author":"M Barati","year":"2020","unstructured":"Barati, M., Rana, O., Petri, I., Theodorakopoulos, G.: Gdpr compliance verification in internet of things. IEEE access 8, 119697\u2013119709 (2020)","journal-title":"IEEE access"},{"key":"1205_CR8","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Li, F., Luo, B.: Iotprivcomp: A measurement study of privacy compliance in iot apps. In European Symposium on Research in Computer Security, pages 589\u2013609. Springer, 2022","DOI":"10.1007\/978-3-031-17146-8_29"},{"key":"1205_CR9","doi-asserted-by":"crossref","unstructured":"Said, A., Yahyaoui, A., Abdellatif, T.: Hipaa and gdpr compliance in iot healthcare systems. In International conference on model and data engineering, pages 198\u2013209. Springer, 2023","DOI":"10.1007\/978-3-031-55729-3_16"},{"key":"1205_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100420","volume":"15","author":"A Karale","year":"2021","unstructured":"Karale, A.: The challenges of iot addressing security, ethics, privacy, and laws. Internet of Things 15, 100420 (2021)","journal-title":"Internet of Things"},{"key":"1205_CR11","unstructured":"World Economic Forum. Technology policy: Responsible design for a flourishing world. https:\/\/www.weforum.org\/publications\/technology-policy-responsible-design-for-a-flourishing-world\/, 2024"},{"key":"1205_CR12","unstructured":"Bazelon, DL.: Coping with technology through the legal process. Jurimetrics J., 18:241, 1977"},{"key":"1205_CR13","unstructured":"Moses, LB.: Recurring dilemmas: The law\u2019s race to keep up with technological change. U. Ill. JL Tech. & Pol\u2019y, page 239, 2007"},{"issue":"5","key":"1205_CR14","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Review 4(5), 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"1205_CR15","unstructured":"FTC. Childrens online privacy protection rule, 2013"},{"key":"1205_CR16","unstructured":"HHS. Hipaa privacy rule and public health. guidance from cdc and the us department of health and human services. MMWR: Morbidity and mortality weekly report, 52(Suppl 1):1\u201317, 2003"},{"key":"1205_CR17","volume-title":"California consumer privacy act of 2018","author":"CCP Act","year":"2018","unstructured":"Act, C.C.P.: California consumer privacy act of 2018. Technical report, State of California (2018)"},{"key":"1205_CR18","volume-title":"Katerina N Megas, Karen Scarfone, and Matthew Smith","author":"M Fagan","year":"2020","unstructured":"Fagan, M., Fagan, M.: Katerina N Megas, Karen Scarfone, and Matthew Smith. Foundational cybersecurity activities for IoT device manufacturers. US Department of Commerce, National Institute of Standards and Technology (2020)"},{"key":"1205_CR19","doi-asserted-by":"crossref","unstructured":"Fagan, M., Megas, KN., Scarfone, K., Smith, M.: Iot device cybersecurity capability core baseline.(national institute of standards and technology, gaithersburg, md), nist interagency or internal report (ir) 8259a, 2020","DOI":"10.6028\/NIST.IR.8259a"},{"key":"1205_CR20","doi-asserted-by":"crossref","unstructured":"Boeckl, K., Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, KN., Nadeau, E., O\u2019Rourke, DG., Piccarreta, B., Scarfone, K.: Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. US Department of Commerce, National Institute of Standards and Technology\u00a0..., 2019","DOI":"10.6028\/NIST.IR.8228"},{"issue":"2","key":"1205_CR21","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2010.35","volume":"43","author":"M Siponen","year":"2010","unstructured":"Siponen, M., Pahnila, S., Mahmood, M.A.: Compliance with information security policies: An empirical investigation. Computer 43(2), 64\u201371 (2010)","journal-title":"Computer"},{"issue":"1","key":"1205_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/09685220810862715","volume":"16","author":"AC Johnston","year":"2008","unstructured":"Johnston, A.C., Warkentin, M.: Information privacy compliance in the healthcare industry. Information Management & Computer Security 16(1), 5\u201319 (2008)","journal-title":"Information Management & Computer Security"},{"issue":"1","key":"1205_CR23","doi-asserted-by":"publisher","first-page":"285","DOI":"10.25300\/MISQ\/2018\/13853","volume":"42","author":"GD Moody","year":"2018","unstructured":"Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance. MIS quarterly 42(1), 285-A22 (2018)","journal-title":"MIS quarterly"},{"issue":"2","key":"1205_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.20","volume":"1","author":"MG Samaila","year":"2018","unstructured":"Samaila, M.G., Neto, M., Fernandes, D.A.B., Freire, M.M., In\u00e1cio, P.R.M.: Challenges of securing internet of things devices: A survey. Security and Privacy 1(2), e20 (2018)","journal-title":"Security and Privacy"},{"key":"1205_CR25","doi-asserted-by":"crossref","unstructured":"Xu, T., Wendt, JB., Potkonjak, M.: Security of iot systems: Design challenges and opportunities. In 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pages 417\u2013423. IEEE, 2014","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"1205_CR26","first-page":"349","volume":"41","author":"B Mueller","year":"2017","unstructured":"Mueller, B., Urbach, N.: Understanding the why, what, and how of theories in is research. Commun. Assoc. Inf. Syst. 41, 349\u2013388 (2017)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"1205_CR27","doi-asserted-by":"crossref","unstructured":"Gregor, S.: The nature of theory in information systems. MIS quarterly, pages 611\u2013642, 2006","DOI":"10.2307\/25148742"},{"key":"1205_CR28","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","volume":"133","author":"N Donthu","year":"2021","unstructured":"Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., Lim, W.M.: How to conduct a bibliometric analysis: An overview and guidelines. J. Bus. Res. 133, 285\u2013296 (2021)","journal-title":"J. Bus. Res."},{"issue":"4","key":"1205_CR29","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1080\/10580530.2022.2140368","volume":"40","author":"G Mangalaraj","year":"2023","unstructured":"Mangalaraj, G., Singh, A., Taneja, A.: Probing the past to guide the future it regulation research: Topic modeling and co-word analysis of sox-is research. Inf. Syst. Manag. 40(4), 302\u2013315 (2023)","journal-title":"Inf. Syst. Manag."},{"issue":"1","key":"1205_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/10580530.2020.1746982","volume":"38","author":"R Dantu","year":"2021","unstructured":"Dantu, R., Dissanayake, I., Nerur, S.: Exploratory analysis of internet of things (iot) in healthcare: a topic modelling & co-citation approaches. Inf. Syst. Manag. 38(1), 62\u201378 (2021)","journal-title":"Inf. Syst. Manag."},{"issue":"2","key":"1205_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2023.100185","volume":"3","author":"R Dwivedi","year":"2023","unstructured":"Dwivedi, R., Nerur, S., Balijepally, V.: Exploring artificial intelligence and big data scholarship in information systems: A citation, bibliographic coupling, and co-word analysis. International Journal of Information Management Data Insights 3(2), 100185 (2023)","journal-title":"International Journal of Information Management Data Insights"},{"key":"1205_CR32","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s11192-015-1740-1","volume":"105","author":"B-N Yan","year":"2015","unstructured":"Yan, B.-N., Lee, T.-S., Lee, T.-P.: Mapping the intellectual structure of the internet of things (iot) field (2000\u20132014): A co-word analysis. Scientometrics 105, 1285\u20131300 (2015)","journal-title":"Scientometrics"},{"key":"1205_CR33","unstructured":"Sb-327 information privacy: connected devices. Technical report, State of California, 2018"},{"issue":"5","key":"1205_CR34","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1108\/JEIM-10-2020-0395","volume":"34","author":"YP Tsang","year":"2021","unstructured":"Tsang, Y.P., Wu, C.-H., Ip, W.H., Shiau, W.-L.: Exploring the intellectual cores of the blockchain-internet of things (biot). Journal of Enterprise Information Management 34(5), 1287\u20131317 (2021)","journal-title":"Journal of Enterprise Information Management"},{"issue":"2","key":"1205_CR35","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","volume":"115","author":"PM Chanal","year":"2020","unstructured":"Chanal, P.M., Kakkasageri, M.S.: Security and privacy in iot: a survey. Wireless Personal Communications 115(2), 1667\u20131693 (2020)","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"1205_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450965","volume":"54","author":"A Aljeraisy","year":"2021","unstructured":"Aljeraisy, A., Barati, M., Rana, O., Perera, C.: Privacy laws and privacy by design schemes for the internet of things: A developer\u2019s perspective. ACM Computing Surveys (Csur) 54(5), 1\u201338 (2021)","journal-title":"ACM Computing Surveys (Csur)"},{"issue":"1","key":"1205_CR37","doi-asserted-by":"publisher","first-page":"64","DOI":"10.69554\/TBRU2322","volume":"1","author":"A Chaudhuri","year":"2016","unstructured":"Chaudhuri, A.: Internet of things data protection and privacy in the era of the general data protection regulation. Journal of Data Protection & Privacy 1(1), 64\u201375 (2016)","journal-title":"Journal of Data Protection & Privacy"},{"key":"1205_CR38","doi-asserted-by":"crossref","unstructured":"Aleisa, N., Abuhussein, A., Sheldon, FT., Alenezi, M.: A critical literature review of security and privacy in smart home healthcare schemes adopting iot & blockchain: Problems, challenges and solutions. Blockchain: Research and Applications, 4(3):100178, 2023","DOI":"10.1016\/j.bcra.2023.100178"},{"key":"1205_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103465","volume":"207","author":"G Munilla Garrido","year":"2022","unstructured":"Munilla Garrido, G., Sedlmeir, J., Uluda\u011f, \u00d6., Soto, I., Luckow, A., Matthes, F.: Revealing the landscape of privacy-enhancing technologies in the context of data markets for the iot: A systematic literature review. Journal of Network and Computer Applications 207, 103465 (2022)","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"1205_CR40","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.3390\/s24072197","volume":"24","author":"GP Pinto","year":"2024","unstructured":"Pinto, G.P., Donta, P.K., Dustdar, S., Prazeres, C.: A systematic review on privacy-aware iot personal data stores. Sensors 24(7), 2197 (2024)","journal-title":"Sensors"},{"issue":"2","key":"1205_CR41","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3390\/computers14020061","volume":"14","author":"H Sebestyen","year":"2025","unstructured":"Sebestyen, H., Popescu, D.E., Zmaranda, R.D.: A literature review on security in the internet of things: Identifying and analysing critical categories. Computers 14(2), 61 (2025)","journal-title":"Computers"},{"key":"1205_CR42","unstructured":"Ooi, K-B., Khor, SC., Cham, TH., Hew, TS., Saylani, MH., Shaik, E.: Regulatory data privacy concerns in proliferating iot era of telecommunication data monetisation: a systematic literature review. Computing, 2025"},{"key":"1205_CR43","unstructured":"Relating to security measures required for devices that connect to the internet. Technical report, State of Oregon, 2019"},{"key":"1205_CR44","doi-asserted-by":"crossref","unstructured":"Fagan, M., Megas, KN., Marron, J., Brady, KG., Cuthill, BB., Herold, R.: Iot non-technical supporting capability core baseline. 2021","DOI":"10.6028\/NIST.IR.8259B"},{"key":"1205_CR45","first-page":"213","volume":"800","author":"M Fagan","year":"2021","unstructured":"Fagan, M., Marron, J., Brady, K.G., Jr., Cuthill, B.B., Megas, K.N., Herold, R., Lemire, D., Hoehn, B.: Iot device cybersecurity guidance for the federal government. NIST Special Publication 800, 213 (2021)","journal-title":"NIST Special Publication"},{"key":"1205_CR46","volume-title":"and Rebecca Herold","author":"M Fagan","year":"2020","unstructured":"Fagan, M., Marron, J., Brady, K., Cuthill, B., Megas, K.: and Rebecca Herold. Establishing iot device cybersecurity requirements, Iot device cybersecurity guidance for the federal government (2020)"},{"key":"1205_CR47","unstructured":"The White House: Improving the nation\u2019s cybersecurity. Technical report, Executive Office of the President (2021)"},{"key":"1205_CR48","doi-asserted-by":"crossref","unstructured":"Aleisa, N., Renaud, K.: Privacy of the internet of things: A systematic literature review. In Proceedings of the 50th Hawaii International Conference on System Sciences, pages 5947\u20135956, Honolulu, HI, 2017. University of Hawaii. CC-BY-NC-ND","DOI":"10.24251\/HICSS.2017.717"},{"key":"1205_CR49","doi-asserted-by":"crossref","unstructured":"Parker, C., Nielsen, VL.: Explaining compliance: Business responses to regulation. Edward Elgar Publishing, 2011","DOI":"10.4337\/9780857938732"},{"key":"1205_CR50","doi-asserted-by":"crossref","unstructured":"Von\u00a0Solms, R., Van\u00a0Niekerk, J.: From information security to cyber security. computers & security, 38:97\u2013102, 2013","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"1205_CR51","unstructured":"California consumer privacy act of 2020. Technical report, State of California, 2020"},{"key":"1205_CR52","unstructured":"An act concerning personal data privacy and online monitoring. Technical report, State of Connecticut, 2023"},{"key":"1205_CR53","unstructured":"Consumer data protection act, under 59.1-575 et seq. of chapter 53 of title 59.1 of the code of virginia. Technical report, State of Virginia, 2023"},{"key":"1205_CR54","unstructured":"Senate bill 21-190 for an act concerning additional protection of data relating to personal privacy. Technical report, State of Colorado, 2023"},{"key":"1205_CR55","unstructured":"Internet of things cybersecurity improvement act of: Technical report, p. 2020. Government Publishing Office, Congress U.S (2020)"},{"issue":"2","key":"1205_CR56","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","volume":"32","author":"R Sen","year":"2015","unstructured":"Sen, R., Borle, S.: Estimating the contextual risk of data breach: An empirical approach. J. Manag. Inf. Syst. 32(2), 314\u2013341 (2015)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"1205_CR57","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3233\/JCS-2009-0398","volume":"19","author":"LA Gordon","year":"2011","unstructured":"Gordon, L.A., Loeb, M.P., Zhou, L.: The impact of information security breaches: Has there been a downward shift in costs? Journal of Computer Security 19(1), 33\u201356 (2011)","journal-title":"Journal of Computer Security"},{"issue":"2","key":"1205_CR58","first-page":"13","volume":"17","author":"M Ko","year":"2006","unstructured":"Ko, M., Dorantes, C., et al.: The impact of information security breaches on financial performance of the breached firms: an empirical investigation. Journal of Information Technology Management 17(2), 13\u201322 (2006)","journal-title":"Journal of Information Technology Management"},{"issue":"2","key":"1205_CR59","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1108\/09685220310468646","volume":"11","author":"A Garg","year":"2003","unstructured":"Garg, A., Curtis, J., Halper, H.: Quantifying the financial impact of it security breaches. Information Management & Computer Security 11(2), 74\u201383 (2003)","journal-title":"Information Management & Computer Security"},{"issue":"3","key":"1205_CR60","doi-asserted-by":"publisher","first-page":"431","DOI":"10.3233\/JCS-2003-11308","volume":"11","author":"K Campbell","year":"2003","unstructured":"Campbell, K., Gordon, L.A., Loeb, M.P., Zhou, L.: The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer security 11(3), 431\u2013448 (2003)","journal-title":"Journal of Computer security"},{"issue":"7","key":"1205_CR61","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.im.2009.06.005","volume":"46","author":"S Goel","year":"2009","unstructured":"Goel, S., Shawky, H.A.: Estimating the market impact of security breach announcements on firm values. Information & Management 46(7), 404\u2013410 (2009)","journal-title":"Information & Management"},{"key":"1205_CR62","unstructured":"Cyber incident reporting for critical infrastructure act: Technical report. U.S, Department of Homeland Security (2022)"},{"key":"1205_CR63","unstructured":"European Parliament and Council of the European Union. Regulation (EU) 2016\/679 of the European Parliament and of the Council"},{"key":"1205_CR64","unstructured":"Healthcare Dive. Average cost of healthcare data breach report. https:\/\/www.healthcaredive.com\/news\/healthcare-data-breach-costs-2024-ibm-ponemon-institute\/722958\/, 2024"},{"key":"1205_CR65","doi-asserted-by":"crossref","unstructured":"Farooq, RK., Rehman, SU., Ashiq, M.: NSiddique, and S Ahmad. Bibliometric analysis of coronavirus disease (covid-19) literature published in web of 2019\u20132020.Journal of family and community medicine, 28(1):1\u20137, 2021","DOI":"10.4103\/jfcm.JFCM_332_20"},{"issue":"4","key":"1205_CR66","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.bushor.2019.03.010","volume":"62","author":"C Abraham","year":"2019","unstructured":"Abraham, C., Chatterjee, D., Sims, R.R.: Muddling through cybersecurity: Insights from the us healthcare industry. Business horizons 62(4), 539\u2013548 (2019)","journal-title":"Business horizons"},{"issue":"4","key":"1205_CR67","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2133806.2133826","volume":"55","author":"DM Blei","year":"2012","unstructured":"Blei, D.M.: Probabilistic topic models. Communications of the ACM 55(4), 77\u201384 (2012)","journal-title":"Communications of the ACM"},{"key":"1205_CR68","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1609\/icwsm.v6i1.14321","volume":"6","author":"A Chaney","year":"2012","unstructured":"Chaney, A., Blei, D.: Visualizing topic models. In Proceedings of the International AAAI Conference on Web and Social Media 6, 419\u2013422 (2012)","journal-title":"In Proceedings of the International AAAI Conference on Web and Social Media"},{"key":"1205_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-3252-8","volume":"5","author":"L Liu","year":"2016","unstructured":"Liu, L., Tang, L., Dong, W., Yao, S., Zhou, W.: An overview of topic modeling and its current applications in bioinformatics. Springerplus 5, 1\u201322 (2016)","journal-title":"Springerplus"},{"key":"1205_CR70","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11192-015-1554-1","volume":"103","author":"F De Battisti","year":"2015","unstructured":"De Battisti, F., Ferrara, A., Salini, S.: A decade of research in statistics: A topic model approach. Scientometrics 103, 413\u2013433 (2015)","journal-title":"Scientometrics"},{"key":"1205_CR71","doi-asserted-by":"crossref","unstructured":"Chen, H., Zhao, JL.: Istopic: Understanding information systems research through topic models. Available at SSRN 2601719, 2015","DOI":"10.2139\/ssrn.2601719"},{"issue":"1","key":"1205_CR72","first-page":"7","volume":"39","author":"S Debortoli","year":"2016","unstructured":"Debortoli, S., M\u00fcller, O., Junglas, I., vom Brocke, J.: Text mining for information systems researchers: An annotated topic modeling tutorial. Commun. Assoc. Inf. Syst. 39(1), 7 (2016)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"1205_CR73","unstructured":"Maier, D., Waldherr, A., Miltner, P., Wiedemann, G., Niekler, A., Keinert, A., Pfetsch, B., Heyer, G., Reber, U., H\u00e4ussler, T., et\u00a0al.: Applying lda topic modeling in communication research: Toward a valid and reliable methodology. In Computational methods for communication science, pages 13\u201338. Routledge, 2021"},{"key":"1205_CR74","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.scico.2012.08.003","volume":"80","author":"SW Thomas","year":"2014","unstructured":"Thomas, S.W., Adams, B., Hassan, A.E., Blostein, D.: Studying software evolution using topic models. Science of Computer Programming 80, 457\u2013479 (2014)","journal-title":"Science of Computer Programming"},{"key":"1205_CR75","unstructured":"Devlin, J., Chang, MW., Lee, K., Toutanova, K. :Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018"},{"key":"1205_CR76","unstructured":"Grootendorst, M.: Bertopic: Neural topic modeling with a class-based tf-idf procedure. arXiv preprint arXiv:2203.05794, 2022"},{"key":"1205_CR77","doi-asserted-by":"crossref","unstructured":"Greene, D., O\u2019Callaghan, D., Cunningham, P.: How many topics? stability analysis for topic models. In Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2014, Nancy, France, September 15-19, 2014. Proceedings, Part I 14, pages 498\u2013513. Springer, 2014","DOI":"10.1007\/978-3-662-44848-9_32"},{"key":"1205_CR78","doi-asserted-by":"crossref","unstructured":"Zhao, W., Chen, JJ., Perkins, R., Liu, Z., Ge, W., Ding, Y., Zou, W.: A heuristic approach to determine an appropriate number of topics in topic modeling. In BMC bioinformatics, volume\u00a016, pages 1\u201310. Springer, 2015","DOI":"10.1186\/1471-2105-16-S13-S8"},{"issue":"1","key":"1205_CR79","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/make1010025","volume":"1","author":"F Krasnov","year":"2019","unstructured":"Krasnov, F., Sen, A.: The number of topics optimization: Clustering approach. Machine Learning and Knowledge Extraction 1(1), 25 (2019)","journal-title":"Machine Learning and Knowledge Extraction"},{"key":"1205_CR80","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s11135-020-00976-w","volume":"54","author":"S Sbalchiero","year":"2020","unstructured":"Sbalchiero, S., Eder, M.: Topic modeling, long texts and the best number of topics. some problems and solutions. Quality & Quantity 54, 1095\u20131108 (2020)","journal-title":"Quality & Quantity"},{"key":"1205_CR81","unstructured":"Murzintcev, N., Chaney, N.: ldatuning: Tuning of the latent dirichlet allocation models parameters (version 1.0. 0)[computer software], 2020"},{"issue":"1","key":"1205_CR82","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3166\/dn.17.1.61-84","volume":"17","author":"R Deveaud","year":"2014","unstructured":"Deveaud, R., SanJuan, E., Bellot, P.: Accurate and effective latent concept modeling for ad hoc information retrieval. Document num\u00e9rique 17(1), 61\u201384 (2014)","journal-title":"Document num\u00e9rique"},{"key":"1205_CR83","doi-asserted-by":"crossref","unstructured":"Griffiths, TL.: Finding scientific topics. PNAS, 2004","DOI":"10.1073\/pnas.0307752101"},{"key":"1205_CR84","doi-asserted-by":"crossref","unstructured":"Arun, R., Suresh, V., Veni\u00a0Madhavan, CE., Narasimha\u00a0Murthy, MN.: On finding the natural number of topics with latent dirichlet allocation: Some observations. In Advances in Knowledge Discovery and Data Mining: 14th Pacific-Asia Conference, PAKDD 2010, Hyderabad, India, June 21-24, 2010. Proceedings. Part I 14, pages 391\u2013402. Springer, 2010","DOI":"10.1007\/978-3-642-13657-3_43"},{"issue":"7\u20139","key":"1205_CR85","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1016\/j.neucom.2008.06.011","volume":"72","author":"J Cao","year":"2009","unstructured":"Cao, J., Xia, T., Li, J., Zhang, Y., Tang, S.: A density-based method for adaptive lda model selection. Neurocomputing 72(7\u20139), 1775\u20131781 (2009)","journal-title":"Neurocomputing"},{"key":"1205_CR86","unstructured":"Grootendorst, M.: KeyBERT: Minimal and easy-to-use keyword extraction with bert embeddings. https:\/\/maartengr.github.io\/KeyBERT\/, 2025"},{"issue":"2","key":"1205_CR87","doi-asserted-by":"publisher","first-page":"586","DOI":"10.5465\/annals.2017.0099","volume":"13","author":"TR Hannigan","year":"2019","unstructured":"Hannigan, T.R., Haans, R.F.J., Vakili, K., Tchalian, H., Glaser, V.L., Wang, M.S., Kaplan, S., Jennings, P.D.: Topic modeling in management research: Rendering new theory from textual data. Academy of Management Annals 13(2), 586\u2013632 (2019)","journal-title":"Academy of Management Annals"},{"key":"1205_CR88","unstructured":"He, Q.: Knowledge discovery through co-word analysis. 1999"},{"issue":"2","key":"1205_CR89","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1177\/053901883022002003","volume":"22","author":"M Callon","year":"1983","unstructured":"Callon, M., Courtial, J.-P., Turner, W.A., Bauin, S.: From translations to problematic networks: An introduction to co-word analysis. Social science information 22(2), 191\u2013235 (1983)","journal-title":"Social science information"},{"issue":"8","key":"1205_CR90","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1002\/asi.21075","volume":"60","author":"NJ van Eck","year":"2009","unstructured":"van Eck, N.J., Waltman, L.: How to normalize cooccurrence data? an analysis of some well-known similarity measures. J. Am. Soc. Inform. Sci. Technol. 60(8), 1635\u20131651 (2009)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"1205_CR91","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF02019280","volume":"22","author":"M Callon","year":"1991","unstructured":"Callon, M., Courtial, J.P., Laville, F.: Co-word analysis as a tool for describing the network of interactions between basic and technological research: The case of polymer chemsitry. Scientometrics 22, 155\u2013205 (1991)","journal-title":"Scientometrics"},{"key":"1205_CR92","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ijhm.2017.06.012","volume":"66","author":"XY Leung","year":"2017","unstructured":"Leung, X.Y., Sun, J., Bai, B.: Bibliometrics of social media research: A co-citation and co-word analysis. International Journal of Hospitality Management 66, 35\u201345 (2017)","journal-title":"International Journal of Hospitality Management"},{"issue":"13","key":"1205_CR93","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1002\/(SICI)1097-4571(1998)49:13<1206::AID-ASI7>3.0.CO;2-F","volume":"49","author":"N Coulter","year":"1998","unstructured":"Coulter, N., Monarch, I., Konda, S.: Software engineering as seen through its research literature: A study in co-word analysis. Journal of the American Society for information Science 49(13), 1206\u20131223 (1998)","journal-title":"Journal of the American Society for information Science"},{"issue":"6","key":"1205_CR94","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/S0306-4573(00)00051-0","volume":"37","author":"Y Ding","year":"2001","unstructured":"Ding, Y., Chowdhury, G.G., Foo, S.: Bibliometric cartography of information retrieval research by using co-word analysis. Information processing & management 37(6), 817\u2013842 (2001)","journal-title":"Information processing & management"},{"key":"1205_CR95","doi-asserted-by":"crossref","unstructured":"Eck, NV, Waltman, L.: Software survey: Vosviewer, a computer program for bibliometric mapping. scientometrics, 84(2):523\u2013538, 2010","DOI":"10.1007\/s11192-009-0146-3"},{"issue":"3","key":"1205_CR96","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1002\/asi.20317","volume":"57","author":"C Chen","year":"2006","unstructured":"Chen, C.: Citespace ii: Detecting and visualizing emerging trends and transient patterns in scientific literature. J. Am. Soc. Inform. Sci. Technol. 57(3), 359\u2013377 (2006)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"issue":"4","key":"1205_CR97","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","volume":"11","author":"M Aria","year":"2017","unstructured":"Aria, M., Cuccurullo, C.: bibliometrix: An r-tool for comprehensive science mapping analysis. J. Informet. 11(4), 959\u2013975 (2017)","journal-title":"J. Informet."},{"key":"1205_CR98","doi-asserted-by":"crossref","unstructured":"Yu, Y., Li, Y., Zhang, Z., Gu, Z., Zhong, H., Zha, Q., Yang, L., Zhu, C., Chen, E.: A bibliometric analysis using vosviewer of publications on covid-19. Annals of translational medicine, 8(13), 2020","DOI":"10.21037\/atm-20-4235"},{"key":"1205_CR99","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s11192-017-2300-7","volume":"111","author":"NJV Eck","year":"2017","unstructured":"Eck, N.J.V., Waltman, L.: Citation-based clustering of publications using citnetexplorer and vosviewer. Scientometrics 111, 1053\u20131070 (2017)","journal-title":"Scientometrics"},{"key":"1205_CR100","doi-asserted-by":"crossref","unstructured":"Moral-Mu\u00f1oz, JA., Herrera-Viedma, E., Santisteban-Espejo, A., Cobo, MJ. Software tools for conducting bibliometric analysis in science: An up-to-date review. Profesional de la Informaci\u00f3n, 29(1), 2020","DOI":"10.3145\/epi.2020.ene.03"},{"issue":"4","key":"1205_CR101","first-page":"967","volume":"67","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Qi, Yu., Zheng, F., Long, C., Zuxun, L., Duan, Z.: Comparing keywords plus of wos and author keywords: A case study of patient adherence research. J. Am. Soc. Inf. Sci. 67(4), 967\u2013972 (2016)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"7","key":"1205_CR102","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.3390\/s21072312","volume":"21","author":"T Bolton","year":"2021","unstructured":"Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M.S., Sodhro, A.H.: On the security and privacy challenges of virtual assistants. Sensors 21(7), 2312 (2021)","journal-title":"Sensors"},{"issue":"20","key":"1205_CR103","doi-asserted-by":"publisher","first-page":"4380","DOI":"10.3390\/s19204380","volume":"19","author":"T Lodge","year":"2019","unstructured":"Lodge, T., Crabtree, A.: Privacy engineering for domestic iot: enabling due diligence. Sensors 19(20), 4380 (2019)","journal-title":"Sensors"},{"issue":"2","key":"1205_CR104","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/TBDATA.2022.3227336","volume":"9","author":"N Azam","year":"2022","unstructured":"Azam, N., Michala, L., Ansari, S., Truong, N.B.: Data privacy threat modelling for autonomous systems: A survey from the gdpr\u2019s perspective. IEEE Transactions on Big Data 9(2), 388\u2013414 (2022)","journal-title":"IEEE Transactions on Big Data"},{"key":"1205_CR105","doi-asserted-by":"publisher","first-page":"23601","DOI":"10.1109\/ACCESS.2020.2968741","volume":"8","author":"C Badii","year":"2020","unstructured":"Badii, C., Bellini, P., Difino, A., Nesi, P.: Smart city iot platform respecting gdpr privacy and security aspects. IEEE Access 8, 23601\u201323623 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"1205_CR106","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/laws9020012","volume":"9","author":"G Ziccardi","year":"2020","unstructured":"Ziccardi, G.: Wearable technologies and smart clothes in the fashion business: some issues concerning cybersecurity and data protection. Laws 9(2), 12 (2020)","journal-title":"Laws"},{"issue":"2","key":"1205_CR107","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1093\/idpl\/ipac001","volume":"12","author":"S Piasecki","year":"2022","unstructured":"Piasecki, S., Chen, J.: Complying with the gdpr when vulnerable people use smart devices. International Data Privacy Law 12(2), 113\u2013131 (2022)","journal-title":"International Data Privacy Law"},{"issue":"4","key":"1205_CR108","doi-asserted-by":"publisher","first-page":"831","DOI":"10.3390\/electronics12040831","volume":"12","author":"Y-Y Jhuang","year":"2023","unstructured":"Jhuang, Y.-Y., Yan, Y.-H., Horng, G.-J.: Gdpr personal privacy security mechanism for smart home system. Electronics 12(4), 831 (2023)","journal-title":"Electronics"},{"key":"1205_CR109","doi-asserted-by":"crossref","unstructured":"Merzeh, H., Kara, M., AYDIN, M., BALIK, H.: Gdpr compliance iot authentication model for smart home environment. Intelligent Automation and Soft Computing, 31(3), 2022","DOI":"10.32604\/iasc.2022.021297"},{"key":"1205_CR110","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2024.104859","volume":"148","author":"A Joyce","year":"2024","unstructured":"Joyce, A.: Javidroozi, V: Smart city development: Data sharing vs. data protection legislations. Cities 148, 104859 (2024)","journal-title":"Cities"},{"issue":"1","key":"1205_CR111","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3233\/AIS-180507","volume":"11","author":"N Streitz","year":"2019","unstructured":"Streitz, N., Charitos, D., Kaptein, M., B\u00f6hlen, M.: Grand challenges for ambient intelligence and implications for design contexts and smart societies. Journal of Ambient Intelligence and Smart Environments 11(1), 87\u2013107 (2019)","journal-title":"Journal of Ambient Intelligence and Smart Environments"},{"issue":"21","key":"1205_CR112","doi-asserted-by":"publisher","first-page":"7154","DOI":"10.3390\/s21217154","volume":"21","author":"S Daoudagh","year":"2021","unstructured":"Daoudagh, S., Marchetti, E., Savarino, V., Bernabe, J.B., Garc\u00eda-Rodr\u00edguez, J., Moreno, R.T., Martinez, J.A., Skarmeta, A.F.: Data protection by design in the context of smart cities: A consent and access control proposal. Sensors 21(21), 7154 (2021)","journal-title":"Sensors"},{"issue":"6","key":"1205_CR113","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3390\/electronics11060835","volume":"11","author":"A Berenguer","year":"2022","unstructured":"Berenguer, A., Ros, D.F., G\u00f3mez-Oliva, A., Ivars-Baidal, J.A., Jara, A.J., Laborda, J., Maz\u00f3n, J.-N., Perles, A.: Crowd monitoring in smart destinations based on gdpr-ready opportunistic rf scanning and classification of wifi devices to identify and classify visitors\u2019 origins. Electronics 11(6), 835 (2022)","journal-title":"Electronics"},{"issue":"1","key":"1205_CR114","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1080\/10811680.2023.2180266","volume":"28","author":"K Faisal","year":"2023","unstructured":"Faisal, K.: Applying the purpose limitation principle in smart-city data-processing practices: A european data protection law perspective. Communication Law and Policy 28(1), 67\u201397 (2023)","journal-title":"Communication Law and Policy"},{"key":"1205_CR115","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.comcom.2024.07.010","volume":"225","author":"R Rusca","year":"2024","unstructured":"Rusca, R., Gasco, D., Casetti, C., Giaccone, P.: Privacy-preserving wifi fingerprint-based people counting for crowd management. Comput. Commun. 225, 339\u2013349 (2024)","journal-title":"Comput. Commun."},{"issue":"1","key":"1205_CR116","doi-asserted-by":"publisher","DOI":"10.2196\/47388","volume":"7","author":"KJ Bin","year":"2023","unstructured":"Bin, K.J., De Pretto, L.R., Sanchez, F.B., Ramos, V.D., Battistella, L.R., et al.: Digital platform for continuous monitoring of patients using a smartwatch: Longitudinal prospective cohort study. JMIR Formative Research 7(1), e47388 (2023)","journal-title":"JMIR Formative Research"},{"issue":"23","key":"1205_CR117","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5852","volume":"33","author":"M Barati","year":"2021","unstructured":"Barati, M., Rana, O.: Privacy-aware cloud ecosystems: Architecture and performance. Concurrency and Computation: Practice and Experience 33(23), e5852 (2021)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"9","key":"1205_CR118","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.3390\/electronics11091496","volume":"11","author":"A Grguric","year":"2022","unstructured":"Grguric, A., Mosmondor, M., Huljenic, D.: Integration and deployment of cloud-based assistance system in pharaon large scale pilots-experiences and lessons learned. Electronics 11(9), 1496 (2022)","journal-title":"Electronics"},{"issue":"1","key":"1205_CR119","first-page":"1431578","volume":"2019","author":"K Rantos","year":"2019","unstructured":"Rantos, K., Drosatos, G., Kritsas, A., Ilioudis, C., Papanikolaou, A., Filippidis, A.P.: A blockchain-based platform for consent management of personal data processing in the iot ecosystem. Security and Communication Networks 2019(1), 1431578 (2019)","journal-title":"Security and Communication Networks"},{"key":"1205_CR120","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108747","volume":"109","author":"H Ahmad","year":"2023","unstructured":"Ahmad, H., Singh, G.: Aujla: Gdpr compliance verification through a user-centric blockchain approach in multi-cloud environment. Comput. Electr. Eng. 109, 108747 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"1205_CR121","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.comcom.2023.11.017","volume":"214","author":"C Daud\u00e9n-Esmel","year":"2024","unstructured":"Daud\u00e9n-Esmel, C., Castell\u00e0-Roca, J., Viejo, A.: Blockchain-based access control system for efficient and gdpr-compliant personal data management. Comput. Commun. 214, 67\u201387 (2024)","journal-title":"Comput. Commun."},{"issue":"16","key":"1205_CR122","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.3390\/electronics13163219","volume":"13","author":"G Jin","year":"2024","unstructured":"Jin, G., Linyi, X., Zhou, Z., Shi, Q., Li, Z., Hao, X., Liu, Y.: Beharmony: Blockchain-enabled trustworthy communication and legitimate decision making in multi-party internet of vehicles systems. Electronics 13(16), 3219 (2024)","journal-title":"Electronics"},{"issue":"3","key":"1205_CR123","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s41060-021-00281-1","volume":"16","author":"M Di Angelo","year":"2023","unstructured":"Di Angelo, M., Salzer, G.: Identification of token contracts on ethereum: standard compliance and beyond. International Journal of Data Science and Analytics 16(3), 333\u2013352 (2023)","journal-title":"International Journal of Data Science and Analytics"},{"issue":"4","key":"1205_CR124","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s42524-020-0140-2","volume":"7","author":"Y Tian","year":"2020","unstructured":"Tian, Y., Lu, Z., Adriaens, P., Minchin, R.E., Caithness, A., Woo, J.: Finance infrastructure through blockchain-based tokenization. Frontiers of Engineering Management 7(4), 485\u2013499 (2020)","journal-title":"Frontiers of Engineering Management"},{"key":"1205_CR125","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103020","volume":"63","author":"WY Chiu","year":"2021","unstructured":"Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. Journal of Information Security and Applications 63, 103020 (2021)","journal-title":"Journal of Information Security and Applications"},{"key":"1205_CR126","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2023.100886","volume":"134","author":"N Peyrone","year":"2023","unstructured":"Peyrone, N., Wichadakul, D.: A formal model for blockchain-based consent management in data sharing. Journal of Logical and Algebraic Methods in Programming 134, 100886 (2023)","journal-title":"Journal of Logical and Algebraic Methods in Programming"},{"key":"1205_CR127","doi-asserted-by":"crossref","unstructured":"Jaloliddin, R.: Digitalization in global trade: opportunities and challenges for investment. Global Trade and Customs Journal, 18(10), 2023","DOI":"10.54648\/GTCJ2023043"},{"key":"1205_CR128","doi-asserted-by":"crossref","unstructured":"Oke, AE., Aliu, J., Ehiosun, LU., Kineber, AF., Stephen, SS.: Adoption of distributed ledger technology for construction projects: a study of the challenges in a developing country. Journal of Engineering, Design and Technology, 2024","DOI":"10.1108\/JEDT-11-2023-0474"},{"key":"1205_CR129","unstructured":"Kumar, CV., Selvaprabhu, P., Baskar, N., Menon, UV., Kumaravelu, VB., Chinnadurai, S., Ali, F.: Ethereum blockchain framework enabling banks to know their customers. IEEE Access, 2024"},{"key":"1205_CR130","doi-asserted-by":"crossref","unstructured":"Zorlu, O., Ozsoy, A.: A blockchain-based secure framework for data management. IET Communications, 2024","DOI":"10.1049\/cmu2.12781"},{"key":"1205_CR131","doi-asserted-by":"publisher","first-page":"21758","DOI":"10.1109\/ACCESS.2023.3251651","volume":"11","author":"RA Mishra","year":"2023","unstructured":"Mishra, R.A., Kalla, A., Braeken, A., Liyanage, M.: Blockchain regulated verifiable and automatic key refreshment mechanism for iot. IEEE Access 11, 21758\u201321770 (2023)","journal-title":"IEEE Access"},{"key":"1205_CR132","doi-asserted-by":"publisher","first-page":"26747","DOI":"10.1109\/ACCESS.2024.3366492","volume":"12","author":"F Stodt","year":"2024","unstructured":"Stodt, F., Kamel, M.B.M., Reich, C., Theoleyre, F., Ligeti, P.: Blockchain-based privacy-preserving shop floor auditing architecture. IEEE Access 12, 26747\u201326758 (2024)","journal-title":"IEEE Access"},{"key":"1205_CR133","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653","volume":"88","author":"I Makhdoom","year":"2020","unstructured":"Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: Privysharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security 88, 101653 (2020)","journal-title":"Computers & Security"},{"key":"1205_CR134","doi-asserted-by":"crossref","unstructured":"Eitzen, CD-CD-v., Anido-Rif\u00f3n, L., Fern\u00e1ndez-Iglesias, MJ.: Application of blockchain in education: Gdpr-compliant and scalable certification and verification of academic information. Applied sciences, 11(10):4537, 2021","DOI":"10.3390\/app11104537"},{"key":"1205_CR135","doi-asserted-by":"crossref","unstructured":"Riva, GM: What happens in blockchain stays in blockchain. a legal solution to conflicts between digital ledgers and privacy rights. Frontiers in Blockchain, 3:36, 2020","DOI":"10.3389\/fbloc.2020.00036"},{"issue":"2","key":"1205_CR136","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1108\/JPPEL-12-2019-0061","volume":"12","author":"O Konashevych","year":"2020","unstructured":"Konashevych, O.: Constraints and benefits of the blockchain use for real estate and property rights. Journal of Property, Planning and Environmental Law 12(2), 109\u2013127 (2020)","journal-title":"Journal of Property, Planning and Environmental Law"},{"key":"1205_CR137","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2023.105892","volume":"159","author":"M Luna","year":"2024","unstructured":"Luna, M., Fernandez-Vazquez, S., Castelao, E.T., Fern\u00e1ndez, \u00c1.A.: A blockchain-based approach to the challenges of eu\u2019s environmental policy compliance in aquaculture: From traceability to fraud prevention. Marine Policy 159, 105892 (2024)","journal-title":"Marine Policy"},{"issue":"6","key":"1205_CR138","doi-asserted-by":"publisher","first-page":"3109","DOI":"10.1109\/TCSS.2022.3194872","volume":"10","author":"NK Dewangan","year":"2022","unstructured":"Dewangan, N.K., Chandrakar, P.: Patient-centric token-based healthcare blockchain implementation using secure internet of medical things. IEEE Transactions on Computational Social Systems 10(6), 3109\u20133119 (2022)","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"1205_CR139","doi-asserted-by":"publisher","first-page":"117836","DOI":"10.1109\/ACCESS.2022.3217201","volume":"10","author":"MT De Oliveira","year":"2022","unstructured":"De Oliveira, M.T., Reis, L.H.A., Verginadis, Y., Mattos, D.M.F., Olabarriaga, S.D.: Smartaccess: Attribute-based access control system for medical records based on smart contracts. IEEE Access 10, 117836\u2013117854 (2022)","journal-title":"IEEE Access"},{"issue":"20","key":"1205_CR140","doi-asserted-by":"publisher","first-page":"3311","DOI":"10.3390\/electronics11203311","volume":"11","author":"P Bai","year":"2022","unstructured":"Bai, P., Kumar, S., Kumar, K., Kaiwartya, O., Mahmud, M., Lloret, J.: Gdpr compliant data storage and sharing in smart healthcare system: a blockchain-based solution. Electronics 11(20), 3311 (2022)","journal-title":"Electronics"},{"issue":"3","key":"1205_CR141","first-page":"1","volume":"12","author":"Z Prodanoff","year":"2021","unstructured":"Prodanoff, Z., White-Williams, C., Chi, H.: Regulations and standards aware framework for recording of mhealth app vulnerabilities. International Journal of E-Health and Medical Communications (IJEHMC) 12(3), 1\u201316 (2021)","journal-title":"International Journal of E-Health and Medical Communications (IJEHMC)"},{"key":"1205_CR142","doi-asserted-by":"publisher","first-page":"120227","DOI":"10.1109\/ACCESS.2022.3217230","volume":"10","author":"SS Ahamad","year":"2022","unstructured":"Ahamad, S.S., Al-Shehri, M., Keshta, I.: A secure and resilient scheme for telecare medical information systems with threat modeling and formal verification. IEEE Access 10, 120227\u2013120244 (2022)","journal-title":"IEEE Access"},{"key":"1205_CR143","doi-asserted-by":"crossref","unstructured":"Vall\u00e9e, A.: Green hospitals face to climate change: Between sobriety and resilience. Heliyon, 10(2), 2024","DOI":"10.1016\/j.heliyon.2024.e24769"},{"issue":"1","key":"1205_CR144","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3428152","volume":"21","author":"YS Can","year":"2021","unstructured":"Can, Y.S., Ersoy, C.: Privacy-preserving federated deep learning for wearable iot-based biomedical monitoring. ACM Transactions on Internet Technology (TOIT) 21(1), 1\u201317 (2021)","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"1205_CR145","doi-asserted-by":"crossref","unstructured":"Bhatt, H ., Jadav, NK., Kumari, A., Gupta, R., Tanwar, S., Polkowski, Z., Tolba, A.: AS Hassanein. Artificial neural network-driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5g. Concurrency and Computation: Practice and Experience, 36(3):e7911, 2024","DOI":"10.1002\/cpe.7911"},{"key":"1205_CR146","doi-asserted-by":"crossref","unstructured":"D Saraswat, P Bhattacharya, A Verma, VK Prasad, S Tanwar, G Sharma, PN Bokoro, and R Sharma. Explainable ai for healthcare 5.0:opportunities and challenges. IEEE Access 10, 84486\u201384517 (2022)","DOI":"10.1109\/ACCESS.2022.3197671"},{"issue":"8","key":"1205_CR147","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1089\/fpd.2021.0009","volume":"18","author":"S He","year":"2021","unstructured":"He, S., Shi, X.: Microbial food safety in china: past, present, and future. Foodborne Pathog. Dis. 18(8), 510\u2013518 (2021)","journal-title":"Foodborne Pathog. Dis."},{"issue":"1","key":"1205_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12393-023-09363-1","volume":"16","author":"KB Chhetri","year":"2024","unstructured":"Chhetri, K.B.: Applications of artificial intelligence and machine learning in food quality control and safety assessment. Food Engineering Reviews 16(1), 1\u201321 (2024)","journal-title":"Food Engineering Reviews"},{"issue":"6","key":"1205_CR149","doi-asserted-by":"publisher","first-page":"774","DOI":"10.3390\/sym11060774","volume":"11","author":"HA Abdulghani","year":"2019","unstructured":"Abdulghani, H.A., Nijdam, N.A., Collen, A., Konstantas, D.: A study on security and privacy guidelines, countermeasures, threats: Iot data at rest perspective. Symmetry 11(6), 774 (2019)","journal-title":"Symmetry"},{"key":"1205_CR150","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1165","volume":"8","author":"P Dzurenda","year":"2022","unstructured":"Dzurenda, P., Jacques, F., Knockaert, M., Laurent, M., Malina, L., Matulevicius, R., Tang, Q., Tasidou, A.: Privacy-preserving solution for vehicle parking services complying with eu legislation. PeerJ Computer Science 8, e1165 (2022)","journal-title":"PeerJ Computer Science"},{"key":"1205_CR151","volume":"33","author":"MB Seyyar","year":"2020","unstructured":"Seyyar, M.B., Geradts, Z.J.M.H.: Privacy impact assessment in large-scale digital forensic investigations. Forensic Science International: Digital Investigation 33, 200906 (2020)","journal-title":"Forensic Science International: Digital Investigation"},{"issue":"3","key":"1205_CR152","doi-asserted-by":"publisher","first-page":"664","DOI":"10.3390\/electronics12030664","volume":"12","author":"DL Fekete","year":"2023","unstructured":"Fekete, D.L., Kiss, A.: Toward building smart contract-based higher education systems using zero-knowledge ethereum virtual machine. Electronics 12(3), 664 (2023)","journal-title":"Electronics"},{"key":"1205_CR153","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.03.001","volume":"122","author":"K Awuson-David","year":"2021","unstructured":"Awuson-David, K., Al-Hadhrami, T., Alazab, M., Shah, N., Shalaginov, A.: Bcfl logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem. Futur. Gener. Comput. Syst. 122, 1\u201313 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1205_CR154","doi-asserted-by":"crossref","unstructured":"Can, O., Dag, T., Kantarcioglu, M.: A blockchain based hybrid architecture for auditable consent management. IEEE Access, 2024","DOI":"10.2139\/ssrn.4601868"},{"key":"1205_CR155","doi-asserted-by":"publisher","first-page":"2234","DOI":"10.1109\/TIFS.2023.3266164","volume":"18","author":"Z Song","year":"2023","unstructured":"Song, Z., Ma, H., Zhang, R., Wenhan, X., Li, J.: Everything under control: secure data sharing mechanism for cloud-edge computing. IEEE Trans. Inf. Forensics Secur. 18, 2234\u20132249 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1205_CR156","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2024.101821","volume":"27","author":"TR Chhetri","year":"2024","unstructured":"Chhetri, T.R., Fensel, A., DeLong, R.J.: Gdpr consent management and automated compliance verification tool. SoftwareX 27, 101821 (2024)","journal-title":"SoftwareX"},{"issue":"7","key":"1205_CR157","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.3390\/s22072763","volume":"22","author":"TR Chhetri","year":"2022","unstructured":"Chhetri, T.R., Kurteva, A., DeLong, R.J., Hilscher, R., Korte, K., Fensel, A.: Data protection by design tool for automated gdpr compliance verification based on semantically modeled informed consent. Sensors 22(7), 2763 (2022)","journal-title":"Sensors"},{"issue":"5","key":"1205_CR158","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1080\/08874417.2021.1939197","volume":"62","author":"M Drev","year":"2022","unstructured":"Drev, M., Delak, B.: Conceptual model of privacy by design. Journal of Computer Information Systems 62(5), 888\u2013895 (2022)","journal-title":"Journal of Computer Information Systems"},{"issue":"11","key":"1205_CR159","doi-asserted-by":"publisher","first-page":"315","DOI":"10.3390\/fi14110315","volume":"14","author":"J Henriksen-Bulmer","year":"2022","unstructured":"Henriksen-Bulmer, J., Yucel, C., Faily, S., Chalkias, I.: Privacy goals for the data lifecycle. Future Internet 14(11), 315 (2022)","journal-title":"Future Internet"},{"key":"1205_CR160","volume-title":"IEEE Sensors Journal","author":"O Boiko","year":"2024","unstructured":"Boiko, O., Komin, A., Malekian, R., Davidsson, P.: IEEE Sensors Journal. A comprehensive review., Edge-cloud architectures for hybrid energy management systems (2024)"},{"issue":"1","key":"1205_CR161","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TETC.2020.3014722","volume":"10","author":"Y Saleem","year":"2020","unstructured":"Saleem, Y., Sotres, P., Fricker, S., de La Torre, C.L., Crespi, N., Lee, G.M., Minerva, R., Sanchez, L.: Iotrec: The iot recommender for smart parking system. IEEE Transactions on Emerging Topics in Computing 10(1), 280\u2013296 (2020)","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"1","key":"1205_CR162","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.011.2000666","volume":"35","author":"XS Shen","year":"2021","unstructured":"Shen, X.S., Huang, C., Liu, D., Xue, L., Zhuang, W., Sun, R., Ying, B.: Data management for future wireless networks: Architecture, privacy preservation, and regulation. IEEE Network 35(1), 8\u201315 (2021)","journal-title":"IEEE Network"},{"key":"1205_CR163","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102916","volume":"61","author":"S Fischer-H\u00fcbner","year":"2021","unstructured":"Fischer-H\u00fcbner, S., Alcaraz, C., Ferreira, A., Fernandez-Gago, C., Lopez, J., Markatos, E., Islami, L., Akil, M.: Stakeholder perspectives and requirements on cybersecurity in europe. Journal of information security and applications 61, 102916 (2021)","journal-title":"Journal of information security and applications"},{"issue":"2","key":"1205_CR164","first-page":"482","volume":"16","author":"S Sai","year":"2024","unstructured":"Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., Tan, Z., Hussain, A.: Machine un-learning: an overview of techniques, applications, and future directions. Cogn. Comput. 16(2), 482\u2013506 (2024)","journal-title":"Cogn. Comput."},{"key":"1205_CR165","volume-title":"IEEE Access","author":"I Makhdoom","year":"2024","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Shariati, N., Franklin, D., Piccardi, M.: IEEE Access. A survey of sota techniques, and a way forward., Securing personally identifiable information (2024)"},{"issue":"3","key":"1205_CR166","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2478\/bsrj-2020-0033","volume":"11","author":"G Vojkovi\u0107","year":"2020","unstructured":"Vojkovi\u0107, G., Milenkovi\u0107, M., Katuli\u0107, T.: Iot and smart home data breach risks from the perspective of data protection and information security law. Business Systems Research: International journal of the Society for Advancing Innovation and Research in Economy 11(3), 167\u2013185 (2020)","journal-title":"Business Systems Research: International journal of the Society for Advancing Innovation and Research in Economy"},{"issue":"9","key":"1205_CR167","doi-asserted-by":"publisher","first-page":"3252","DOI":"10.3390\/su10093252","volume":"10","author":"I Calzada","year":"2018","unstructured":"Calzada, I.: (smart) citizens from data providers to decision-makers? the case study of barcelona. Sustainability 10(9), 3252 (2018)","journal-title":"Sustainability"},{"key":"1205_CR168","doi-asserted-by":"crossref","unstructured":"Wachter, S.: Normative challenges of identification in the internet of things: Privacy, profiling, discrimination, and the gdpr. Computer law & security review 34(3), 436\u2013449 (2018)","DOI":"10.1016\/j.clsr.2018.02.002"},{"key":"1205_CR169","doi-asserted-by":"crossref","unstructured":"Vitunskaite, M., He, Y., Brandstetter, T., Janicke, H.: Smart cities and cyber security: Are we there yet? a comparative study on the role of standards, third party risk management and security ownership. Computers & Security 83, 313\u2013331 (2019)","DOI":"10.1016\/j.cose.2019.02.009"},{"key":"1205_CR170","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108527","volume":"172","author":"N Gao","year":"2022","unstructured":"Gao, N., Han, D., Weng, T.-H., Xia, B., Li, D., Castiglione, A., Li, K.-C.: Modeling and analysis of port supply chain system based on fabric blockchain. Computers & Industrial Engineering 172, 108527 (2022)","journal-title":"Computers & Industrial Engineering"},{"key":"1205_CR171","doi-asserted-by":"crossref","unstructured":"Lapwattanaworakul, J., Srisa-An, C., Aribarg, T.: Blockchain-based auxiliary systems for pseudonymization and consent management. TEM Journal, 12(4), 2023","DOI":"10.18421\/TEM124-59"},{"key":"1205_CR172","doi-asserted-by":"crossref","unstructured":"Harper, S., Mehrnezhad, M., Mace, J.: User privacy concerns in commercial smart buildings. J. Comput. Secur. 30(3), 465\u2013497 (2022)","DOI":"10.3233\/JCS-210035"},{"key":"1205_CR173","unstructured":"U.S. Department of Health and Human Services. Hipaa privacy rule to support reproductive health care privacy. https:\/\/www.federalregister.gov\/documents\/2024\/04\/26\/2024-08503\/hipaa-privacy-rule-to-support-reproductive-health-care-privacy, 2024. Final Rule, 45 CFR Parts 160 and 164, Federal Register Vol. 89, No. 80, pp. 24542\u201324579 (April 26, 2024)"},{"key":"1205_CR174","unstructured":"Parliament of Malaysia. Personal data protection act 2010 (act 709). https:\/\/www.pdp.gov.my\/jpdpv2\/legislation\/, 2010. Laws of Malaysia, Act 709"},{"key":"1205_CR175","unstructured":"Virginia General Assembly. Virginia consumer data protection act (vcdpa). https:\/\/law.lis.virginia.gov\/vacode\/title59.1\/chapter53\/, 2021. Chapter 53, Title 59.1, Code of Virginia. Enacted as Senate Bill 1392 and House Bill 2307, effective January 1, 2023"},{"key":"1205_CR176","doi-asserted-by":"crossref","unstructured":"Bostrom, RP., Heinen, JS: Mis problems and failures: A socio-technical perspective. part i: The causes. MIS quarterly, pages 17\u201332, 1977","DOI":"10.2307\/248710"},{"key":"1205_CR177","doi-asserted-by":"crossref","unstructured":"Ghaffari, K., Lagzian, M., Kazemi, M., Malekzadeh, G.: A socio-technical analysis of internet of things development: an interplay of technologies, tasks, structures and actors. foresight, 21(6):640\u2013653, 2019","DOI":"10.1108\/FS-05-2019-0037"},{"issue":"4","key":"1205_CR178","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.tele.2014.02.003","volume":"31","author":"D Shin","year":"2014","unstructured":"Shin, D.: A socio-technical framework for internet-of-things design: a human-centered design for the internet of things. Telematics Inform. 31(4), 519\u2013531 (2014)","journal-title":"Telematics Inform."},{"issue":"4","key":"1205_CR179","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2021.101693","volume":"30","author":"G Dhillon","year":"2021","unstructured":"Dhillon, G., Smith, K., Dissanayaka, I.: Information systems security research agenda: Exploring the gap between research and practice. J. Strateg. Inf. Syst. 30(4), 101693 (2021)","journal-title":"J. Strateg. Inf. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01205-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01205-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01205-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:06:51Z","timestamp":1776074811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01205-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,20]]},"references-count":179,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1205"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01205-x","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,20]]},"assertion":[{"value":"23 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"59"}}