{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:55:53Z","timestamp":1760144153141,"version":"build-2065373602"},"reference-count":18,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T00:00:00Z","timestamp":1711497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"MUR PRIN PNRR 2022","award":["P20227W8ZC","IV.6"],"award-info":[{"award-number":["P20227W8ZC","IV.6"]}]},{"name":"PON \u201cRicerca e Innovazione\u201d 2014\u20132020","award":["P20227W8ZC","IV.6"],"award-info":[{"award-number":["P20227W8ZC","IV.6"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Problems related to privacy and security preservation are in the scope of the concerns of governments and policymakers because of their impact on fundamental rights. Users are called to act responsibly whenever they are potentially exposed to related risks, but governments and parliaments must be proactive in creating safer conditions and a more appropriate regulation to both guide users towards good practices and create a favoring environment which reduces exposure. In this paper, we propose a modeling framework to define and evaluate policies which identify and use appropriate levers to accomplish these tasks. We present a proof-of-concept which shows the viability of estimating in advance the effects of policies and policymakers\u2019 initiatives by means of Influence Nets.<\/jats:p>","DOI":"10.3390\/computers13040087","type":"journal-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T14:14:09Z","timestamp":1711548849000},"page":"87","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of the Effectiveness of National Promotion Strategies for the Improvement of Privacy and Security"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2089-975X","authenticated-orcid":false,"given":"Mauro","family":"Iacono","sequence":"first","affiliation":[{"name":"Dipartimento di Matematica e Fisica, Universit\u00e0 degli Studi della Campania, \u201cL. Vanvitelli\u201d, Viale Lincoln 5, 81100 Caserta, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6415-1180","authenticated-orcid":false,"given":"Michele","family":"Mastroianni","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universit\u00e0 degli Studi di Salerno, Via Giovanni Paolo II 132, 84084 Fisciano, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2024,3,27]]},"reference":[{"key":"ref_1","unstructured":"Amirante, A., and Rotondo, G. (2022). Strutture Sociali e Governo del Cambiamento nel Contesto Post-Pandemico, Edizioni Scientifiche Italiane."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Campanile, L., Iacono, M., and Mastroianni, M. (2022, January 12\u201315). Towards privacy-aware software design in small and medium enterprises. Proceedings of the 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Falerna, Italy.","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927958"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102511","DOI":"10.1016\/j.ipm.2021.102511","article-title":"Designing a GDPR compliant blockchain-based IoV distributed information tracking system","volume":"58","author":"Campanile","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/s10846-010-9425-8","article-title":"Theory of Influence Networks","volume":"60","author":"Zaidi","year":"2010","journal-title":"J. Intell. Robot. Syst."},{"key":"ref_5","unstructured":"Mansoor, F., Zaidi, A.K., Wagenhals, L., and Levis, A.H. (2009). Social Computing and Behavioral Modeling, Springer."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., and Yung, M. (2019). Encyclopedia of Cryptography, Security and Privacy, Springer.","DOI":"10.1007\/978-3-642-27739-9"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","article-title":"Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior","volume":"77","author":"Gerber","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_8","first-page":"1","article-title":"The myth of the privacy paradox","volume":"89","author":"Solove","year":"2021","journal-title":"Geo. Wash. L. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1002\/jcpy.1191","article-title":"Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age","volume":"30","author":"Acquisti","year":"2020","journal-title":"J. Consum. Psychol."},{"key":"ref_10","unstructured":"Paul, E.F., Miller Jr, F.D., and Paul, J. (2004). Freedom of Speech: Volume 21, Part 2, Cambridge University Press."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1108\/JCM-03-2021-4510","article-title":"Privacy concerns with COVID-19 tracking apps: A privacy calculus approach","volume":"40","author":"Fernandes","year":"2023","journal-title":"J. Consum. Mark."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"103736","DOI":"10.1016\/j.im.2022.103736","article-title":"AIoT-enabled smart surveillance for personal data digitalization: Contextual personalization-privacy paradox in smart home","volume":"60","author":"Zhang","year":"2023","journal-title":"Inf. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Gervasi, O., Murgante, B., Rocha, A.M.A.C., Garau, C., Scorza, F., Karaca, Y., and Torre, C.M. (2023, January 3\u20136). Evaluating the Effectiveness of Privacy and Security Promotion Strategies. Proceedings of the Computational Science and Its Applications\u2014ICCSA 2023 Workshops, Athens, Greece.","DOI":"10.1007\/978-3-031-37129-5"},{"key":"ref_14","unstructured":"Kenett, R.S. (2024, February 21). Applications of Bayesian Networks. Available online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2172713."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"857","DOI":"10.18517\/ijaseit.6.6.1382","article-title":"A review of predictive analytic applications of Bayesian network","volume":"6","author":"Yusof","year":"2016","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"ref_16","unstructured":"Pun, V.K.I., Stolz, V., and Simao, A. (December, January 30). Analysis of Bayesian Networks via Prob-Solvable Loops. Proceedings of the Theoretical Aspects of Computing\u2014ICTAC, Macau, China."},{"key":"ref_17","first-page":"103497","article-title":"Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures","volume":"75","author":"Chockalingam","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yan, Y., Cui, J., Ma, J., and Song, S. (2014, January 20\u201321). Analysis of key events using dynamic-created influence nets. Proceedings of the 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference, Chongqing, China.","DOI":"10.1109\/ITAIC.2014.7065019"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/4\/87\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:19:21Z","timestamp":1760105961000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/4\/87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,27]]},"references-count":18,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["computers13040087"],"URL":"https:\/\/doi.org\/10.3390\/computers13040087","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2024,3,27]]}}}