Explore chapters and articles related to this topic
Machine Learning-Based Internet-of-Things Security Schemes
Published in Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, IoT Security Paradigms and Applications, 2020
Deepak Kumar Sharma, Shrid Pant, Mehul Sharma
IoT devices, including RFIDs and wireless sensor networks (WSNs), require user information to provide certain services and applications. The user information must be protected from attacks such as denial of service, eavesdropping, jamming, and spoofing to ensure data privacy. Although IoT devices with limited resources are restricted to perform intensive security tasks under large input data, most of the currently available solutions generate computational-intensive load for the IoT devices. This makes the devices vulnerable to attacks. Further, an IoT device might even generate false alarms due to the lack of information, and might not be able to detect an attack in time or accurately estimate the current state of the network due to restrained means.
Portal Collaboration, Knowledge Management, and Personalization
Published in Shailesh Kumar Shivakumar, and User Experience Platforms, 2015
The basis for personalization is collecting and maintaining information regarding users. The collection of all the pieces of information relating to one user is referred to as a user profile. User information can be collected either directly from the user (via a user profile attribute) or from other sources such as tracking the user’s online activities. Users can be grouped into categories to facilitate personalization (which is sometimes referred to as “user segmentation”).
Integrating fuzzy theory and visualization for QoS-aware selection of SaaS in cloud e-Marketplaces
Published in Cogent Engineering, 2021
Azubuike Ezenwoke, Matthew Adigun
Customer Relationship Management (CRM) refers to how companies coordinate and analyse user interactions and data through a customer’s lifecycle. These ways may include technology, people and organisational strategies deployed to collect user information about personal data, purchase history, preferences, and concerns across different channels through which the organisation engages with the user. These channels may include phone conversations, emails, social media etc. Customer information is consolidated into the CRM database, and the organisation utilises this data to improve business relationships to achieve user retention and increased sales. Traditional on-premises CRM software puts the burden of administration and maintenance on the organisation, however employing cloud-based solutions outsources these services to a third party, leaving the organisation to focus on its core business, mainly when technical expertise and budget is limited.