The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The use of unified communication; video conferencing, audio conferencing, and instant messaging has skyrocketed during the COVID-19 pandemic. However, security and privacy considerations have often been neglected. This paper provides a comprehensive survey of security and privacy in Unified Communication (UC). We systematically analyze security and privacy threats and mitigations in a generic UC scenario. Based on this, we analyze security and privacy features of the major UC market leaders and we draw conclusions on the overall UC landscape. While confidentiality in communication channels is gen...
In this paper we give an introduction to the transition in contemporary surveillance from top down t...
When ubiquitous multimedia technology is introduced in an organization, the privacy implications of ...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...
Digital activists use tools and platforms such as Facebook, WhatsApp, and Twitter to organize networ...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
AbstractSocial networks have become a part of human life. Starting from sharing information like tex...
Computer-mediated environments pose a special challenge to our legal and cultural protections of pri...
This paper raises the privacy issues related to information that is accessible about indi- viduals ...
The vision of ubiquitous commerce (u-commerce) is realized through the convergence of electronic, mo...
With the advancing new era of communication, the so-called era of ‘being always online’ many provide...
In this paper we give an introduction to the transition in contemporary surveillance from top down t...
With increase in usage of the Internet, there has been an exponential increase in the use of online ...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
The lack of trust amongst consumers and concerns about disclosing personal information are commonly ...
In this paper we give an introduction to the transition in contemporary surveillance from top down t...
When ubiquitous multimedia technology is introduced in an organization, the privacy implications of ...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...
Digital activists use tools and platforms such as Facebook, WhatsApp, and Twitter to organize networ...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
AbstractSocial networks have become a part of human life. Starting from sharing information like tex...
Computer-mediated environments pose a special challenge to our legal and cultural protections of pri...
This paper raises the privacy issues related to information that is accessible about indi- viduals ...
The vision of ubiquitous commerce (u-commerce) is realized through the convergence of electronic, mo...
With the advancing new era of communication, the so-called era of ‘being always online’ many provide...
In this paper we give an introduction to the transition in contemporary surveillance from top down t...
With increase in usage of the Internet, there has been an exponential increase in the use of online ...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
The lack of trust amongst consumers and concerns about disclosing personal information are commonly ...
In this paper we give an introduction to the transition in contemporary surveillance from top down t...
When ubiquitous multimedia technology is introduced in an organization, the privacy implications of ...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...