Follow
Heechang Shin
Title
Cited by
Cited by
Year
A profile anonymization model for privacy in a personalized location based service environment
H Shin, V Atluri, J Vaidya
The Ninth International Conference on Mobile Data Management (mdm 2008), 73-80, 2008
592008
Ensuring privacy and security for LBS through trajectory partitioning
H Shin, J Vaidya, V Atluri, S Choi
2010 Eleventh International Conference on Mobile Data Management, 224-226, 2010
332010
Efficient security policy enforcement in a location based service environment
V Atluri, H Shin
IFIP Annual conference on data and applications security and privacy, 61-76, 2007
312007
A profile anonymization model for location-based services
H Shin, J Vaidya, V Atluri
Journal of Computer Security 19 (5), 795-833, 2011
242011
Efficient enforcement of security policies based on tracking of mobile users
V Atluri, H Shin
Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working …, 2006
242006
Weighted rank-one binary matrix factorization
H Lu, J Vaidya, V Atluri, H Shin, L Jiang
Proceedings of the 2011 SIAM International Conference on Data Mining, 283-294, 2011
232011
Efficient security policy enforcement for the mobile environment
V Atluri, H Shin, J Vaidya
Journal of Computer Security 16 (4), 439-475, 2008
232008
Spatiotemporal access control enforcement under uncertain location estimates
H Shin, V Atluri
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009
162009
Anonymization models for directional location based service environments
H Shin, J Vaidya, V Atluri
computers & security 29 (1), 59-73, 2010
152010
An analytic framework for assessing automobile sales loss from recalls: A Toyota case study
H Shin, R Richardson, O Soluade
International Conference on Modeling and Simulation in Engineering …, 2012
82012
Assessing sales loss from automobile recalls: a Toyota case study
H Shin, R Richardson, O Soluade
International Journal of Business Continuity and Risk Management 5 (1), 14-28, 2014
62014
Assessing sales loss from automobile recalls through event study: A Toyota case study
H Shin, R Richardson, O Soluade
Communications of the IIMA 12 (4), 4, 2012
62012
Exploring the behavioral intention to use collaborative commerce: a case of uber
CC Lee, S Ruane, HS Lim, R Zhang, H Shin
Journal of International Technology and Information Management 30 (5), 97-119, 2021
42021
Developing customer churn models for customer relationship management
S Rodriguez, H Shin
International Journal of Business Continuity and Risk Management 4 (4), 302-322, 2013
32013
A unified index structure for efficient enforcement of spatiotemporal authorisations
V Atluri, Q Guo, H Shin, J Vaidya
International journal of information and computer security 4 (2), 118-151, 2010
32010
Using location k-anonymity models for protecting location privacy
E Di Carlo, H Shin, H Lu
The Routledge Companion to Risk, Crisis and Security in Business, 296-306, 2018
22018
Usability test of personality type within a roommate matching website: A case study
M Shekhawat, S Deshmukh, G Monroy, A Tiwari, X He, H Shin, Y Hong, ...
Journal of International Technology and Information Management 25 (1), 5, 2016
22016
Identifying network intrusion with defensive forecasting
H Shin
International Journal of Business Continuity and Risk Management 2 (2), 91-104, 2011
22011
Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment
V Atluri, H Shin
Handbook of Database Security: Applications and Trends, 553-573, 2008
22008
The impact of electronic medical record systems on hospital efficiency
CC Lee, H Shin, C Klimm, C Palmero, S Hughes
International Journal of Technology, Policy and Management 23 (1), 1-19, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20