Skip to main content
Computational Intelligence and Neuroscience logoLink to Computational Intelligence and Neuroscience
. 2022 Jun 8;2022:5027256. doi: 10.1155/2022/5027256

Privacy Leaks Protection in Music Streaming Services Using an Intelligent Permissions Management System

Qian Wang 1,
PMCID: PMC9200511  PMID: 35720882

Abstract

A security violation is referred to as a personal data breach when it leads to unintentional and unlawful destruction, loss, alteration, unauthorized disclosure, or access to personal data that has been communicated, stored, or otherwise processed in some other manner. Based on the principles of information security, we can define a breach of confidentiality as the unauthorized or accidental disclosure or access to personal data, a breach of integrity as the unauthorized or accidental alteration of personal data, and a breach of availability as the unauthorized or accidental loss of access to or destruction of personal data. This paper suggests designing an intelligent consensus policy management system based on the Markov chain approach. It is a novel system that would analyze the present status of the consensus elements for future development and anticipates the possibility of possible breaches of sensitive personal data. The evaluation of the proposed strategy is based on a policy scenario that involves a hypothetical consensus and a data breach of sensitive information to music streaming services.

1. Introduction

Online streaming replaces the purchase of Compact Disc-CDs, and podcasts come and take the place of radio. In recent years, more and more people are changing their habits in the music industry because we are in the middle of rapid development [1]. The ability to listen to music directly on the mobile via the Internet, wherever we are, surpasses in ease any other method. However, the sound and listening quality are not the same as traditional. For this very reason, streaming services were created from which we can legally listen to music [2]. Most of them are designed to help the user discover new music, with the software itself suggesting what new we will listen to based on our musical preferences. Of course, a prerequisite for these services is payment. After a short trial period that requires a credit card, a small monthly fee gives access to many songs.

However, the streaming era brings new issues, the most basic of which is the acquisition of sensitive personal data and its “processing” via automated means. Personal data are information about a living person who can be identified (e.g., name, home address, e-mail address, location data, and usage data) [3]. If put together, different information can identify a particular person as personal data. The term “processing,” by automated means as well as nonautomated processing includes the following activities: data collection and registration; organization and structure; storage; adaptation and modification; retrieval; retrieval of information; use; disclosure by transmission, dissemination, or any other form of disposal; correlation or combination; and restriction; deletion or destruction of personal data [4].

To be valid, personal data processing consent must be provided clearly and concisely, in language that is easy to understand and different from other information, such as terms and conditions. In addition, consent must be freely given, specific, aware, and unequivocal to be valid [5]. The request must state the purpose for which personal data will be used [6]. In certain circumstances, data subjects have the right to refuse to be subjected to a decision exclusively based on automated processing. Although this norm is generally followed, there are a few exceptions, such as when the data subject has explicitly consented to an automated decision-making mechanism. A data breach occurs when personal data are disclosed, accidently or illegally, to unauthorized recipients, made temporarily unavailable, or altered [7, 8].

So, it is essential to have an intelligent mechanism that can manage the consent granted to have a case for creating a profile, which can regulate the use, and therefore, there is a case of data leakage. Based on the adoption of the Markov chain methodology [9], it is proposed to implement an intelligent consent management system in Music Streaming Services, which considers the current state of consent for the future development and forecast possible leaks of sensitive personal data [3, 10].

2. Related Literature

This section explores relevant work on Markov chains implementation, privacy concerns, risk perception, and user behavior in response to security recommendations [11, 12]. Wiering et al. [13] investigated multiobjective Markov decision systems in 2007 by substituting a cross benefit vector for the conventional linear reward signal. This multiobjective Markov procedure may be transferred when the weighting factor for the various reward elements is known in advance. They anticipated that the weighting function might be arbitrarily chosen and given by the actor or user after the algorithm addressed the issue. They maintained track of Pareto's optimum stationary policies to cope with it.

Feinberg and Rothblum [14] investigated a Markov selection procedure with a different reward system and a specified beginning state dispersion. Suppose the habitation measure of a stationary policy can be described as a convex sum of the habitation evaluations of other stationary policies. In that case, the policy may be divided into states. There are requisite circumstances for dividing a stationary policy in a single state and adequate criteria for splitting it throughout the entire state area. The findings were used to limited issues to compute an optimum policy by calculating and dividing an ideal stationary policy.

O'Connor et al. [15] investigated the optimum transport issue for couples of stationary constraint Markov chains, focusing on calculating ideal transitional connections, a limited family of transfer plans that encapsulate the characteristics of Markov chains. The optimum changeover connectivity issue is solved by aligning the two chains to minimize the overall long-term price. They produced a stable conclusion for both normalized and nonregularized methods and, consequently, a probabilistic coherence result. They tested their theoretical predictions through a mock trial, indicating that the approximation technique has a shorter total runtime and a low error rate. Finally, they expanded their approaches to hidden Markov structures and demonstrated the suggested algorithms' practical use via the implementation of computer-generated music.

Concerning privacy leaks, Yixin et al. [7] conducted semistructured surveys with customers to ascertain their perceptions of the dangers associated with data breaches, their willingness to take preventive actions, and their motivations for inactivity. They discovered that users' mind maps of credit agencies were inadequate and erroneous to a certain extent. They discovered that this conduct is motivated by the expenditures of preventive methods, a positivity bias in evaluating one's chance of persecution, sources of guidance, and a general inclination to wait for response until damage occurs. They reviewed the legal, technological, and pedagogical ramifications and possible approaches for improving consumer protection in the credit reporting system. Finally, they suggest future research options.

Gwebu et al. [8] investigated the relative usefulness of corporate credibility and post-breach reaction techniques in light of the considerable monetary losses related to data intrusions. The findings suggested that a firm's brand is a critical asset for preserving the firm's worth. Nevertheless, only particular reaction tactics are shown to lessen the fiscal effect on low-reputation organizations. At the same time, reply techniques are less critical for high firms. These results provide operators with proof counsel for preserving business assets after privacy violations and emphasize the demand for establishing more sophisticated breach management techniques. The generated theoretical justifications provided a cognitive foundation for evaluating the effectiveness of different data breach response tactics.

3. Methodology

The proposed methodology concerns implementing a policy consensus rights management system executed for each policy with a stationary Markov policy [9]. The Markov policy is considered to be a Markov chain {Xn(R)}n0 which is nondegradable or, more generally, has a unique closed communication class (meaning that transient states outside it are allowed), which is (genuinely) finite repetitive [16]. The idea of modeling is that Markov processes are appropriate stochastic models for describing and studying stochastic systems; the future evolution of which depends solely on their present state each time and not on their specific history. An example of a Markov chain and its mathematical modeling in predicting future situations is shown in Figure 1 [1719].

Figure 1.

Figure 1

Markov chain.

Based on the adoption of the methodology of the Markov chains, it is proposed to implement an intelligent consensus policy management system, which considers the current state of the consensus data for the future development and forecasting of possible leaks of sensitive personal data [10]. A stochastic or Markov process [2022] (or evolution) from T to S is a collection of random variables {X(t, ω)}tT,ω∈Ω defined in a probability space (Ω, F, P), where T=0={0,1,2,…} the time horizon (usually T is the set of times). S is the state space of the process, i.e., the value field of (t, ω) for each tT and ω ∈ Ω. Because S is countable or finite, we are talking about a stochastic chain [23]. Ω is the sample space, i.e., the set of all possible results of the luck experiment under study. F: σ-algebra of contingencies is the field of definition of the contingencies of Ω (there are cases of sample space of Ω where we cannot consider each of its subsets as a possibility) and P is the probability measure, i.e., a function P: F such that [21, 22]

  1. P(Ω)=1

  2. P(A) ≥ 0, ∀A ∈ ℱ

  3. P(UV=1Av)=∑v=1P(Av), ∀{Av}v which (AiAj=∅∀ij)

The proposed process focuses on a system of Markov chains, i.e., processes from Τ =  0 in a countable (or simply finite) space S, which have the Markov property [2426]

PXn+1=j|X0,X1,,Xn=PXn+1=j|Xn,n0,jS. (1)

The above relation states that given the value of the random variable Xn (present), the random variable Xn + 1 (future) is stochastically independent of the variables X0, X1,…, Xn − 1 (past state of the process) [27]. The explanation of the Markov property of the proposed system is that the future of the Markov chain depends on the past only through the present [28]. So, the probability [22, 24]

pijn,n+1:=PXn+1=j|Xn=i, (2)

is the probability of passing 1st order from state i to state j by the (n + 1)-th step. These probabilities do not depend on the time step n (stationary), i.e., [29, 30]

pij=PXn+1=j|Xn=i=PX1=j|X0=i, (3)

so we have homogeneous chains {Xn}.

Respectively, considering the 1st order transition probability table of the chain [3133],

=piji,jS, (4)

we have a stochastic table, so it is easy to find the chain in the states i0, i1,…, in−1, inS in succession; the probability is as follows:

PX0=i0,X1=i1,,Xn1=in1,Xn=in=π0j·pi0i1pin1in. (5)

Thus, for the distribution πn of the state of the chain, it is valid that [28, 32]

πnj=PXn=jjS. (6)

So,

πn+1j=iSPXn=iPXn+1=j|Xn=i=iSπni·pij, (7)

or equivalents

πn+1=πn,n0, (8)

and so

πn=π0n, (9)

where

n=pijni,jS, (10)

the n-th order transition table (or n steps), i.e.,

pijn=PXn=j|X0=i. (11)

If we choose π0 = π such that π = πℙ, we obtain πn = πn, i.e., the state distribution of the chain is stationary (independent of n). Then, the chain has an unchanged or stationary distribution, and it is in statistical equilibrium. In queuing theory, systems are said to be in “statistical equilibrium” when the number of customers or objects waiting in the line oscillates so that the mean and distribution remain the same over a prolonged period.

Therefore, to find the stationary distribution π, it is enough to solve the system [21, 28, 34, 35]:

iSπ=π·Pπi=1,πi0,iS. (12)

A chain will be nondegradable if the state space S is an entire closed class, i.e.,

CXn=i,iC. (13)

The basic premise of the methodology is that the Markov chain

Xnn0, (14)

is nondegradable, genuinely repetitive, and aperiodic. Then, regardless of its initial distribution is valid,

limnπn=π, (15)

and

limnpijn=πj,iS, (16)

the percentage of time spent by the chain in each iS situation is π(i), so according to the employer theorem, we have

PVninπi,iS=1. (17)

So, the transition from one state to another implies a fee or some cost (negative fee) of the form as follows:

Rn=RnXn1,Xn,n, (18)

for the n-th step, so the total reward in the first n steps is

Cn=s=1nRsXs1,Xs,n. (19)

The average fee for going i ⟶ j is

rij=ERni,j<,i,jS. (20)

Ultimately, it applies to the pay rate (average pay per step) as follows:

limnCnn=jrj·πj. (21)

A fascinating question in the modeling of the proposed methodology concerns how we will choose the stationary policy or equivalent by what criteria this choice will be made. Since C(i, α) expresses sensitive data, we will deal with the standard of minimizing their propagation rate, which proves to be the most suitable in many applications.

Of course, if C(i, α) represents nonconsent of rights, the criterion will be maximizing the consent rate, which is equivalent to the previous one [36]. A stationary policy is X0 = i, i∈ S . Also pij(k)(R) are the probabilities of passing k-th class [37]. Then, the average (or expected) total amount of consonants in the first n time points (or steps) when X0 = i and R is applied [18, 32, 38]:

Vni,R=ERk=0n1CXk,ak|X0=i, (22)

or by the definition and linearity of the (bound) average value:

Vni,R=k=0n1jSpijkR·Cj,Rj, (23)

or else

Vni,R=ERk=0n1λkCXk,ak|X0=i. (24)

Our objective is to study the behavior of the rate of the average rate of consensus in the long run, i.e., the limit as follows:

limnVni,Rn, (25)

for each i∈ S.

However, because the Markov chain has a unique closed communication class (positively repetitive), the limit is unique and independent of the initial state i [39]:

gR=limnvni,Rn=jSπjR·Cj,Rj, (26)

with πj(R), jS is the stationary distribution of the chain below the policy R and thus the rate of change of average rate of consent or, in the long run, average rate per unit time. Therefore, a stationary policy R∗ will be optimal for the average consent rate if each stationary policy R applies [40]

gRgR. (27)

So, since the time horizon is unlimited and the space of situations is finite, it turns out that there will always be a stationary policy that will be optimal in terms of the above criterion. Considering this and using the proposed methodology for each possible stationary policy, we can calculate the stationary distribution and the corresponding rate in each case. The above result is significant because it secures the right to seek an optimal approach for the stationary.

4. Privacy Leaks Protection Scenario

To protect individuals' privacy and help restore trust and transparency in the activities between people and entities that process their data, streaming services provide consent. The data subject's permission is any freely given, precise, informed, and unequivocal expression of the data subject's desires by which he, by a statement or by an obvious action, accepts the processing of personal data about them. Consents are divided into “Free,” “Specific,” “Informed,” and “Indisputably indicated.” In the scenario tested by the proposed system, consents are implemented to process users' data. The policy concerns consent if at least all four of the following conditions apply [6, 41, 42]:

  1. Free means that the data subjects are selected and controlled. It is invalid consent if the data subject does not have a natural option, is obliged to consent, or will suffer an undesirable consequence if they do not consent. Unless the consent is accompanied by a nonnegotiable provision of the terms and conditions, it has been begrudged.

  2. Specifically, it aims to ensure user control and transparency for the data subject.

  3. Informed aims to provide information to the persons to whom the data refer before their consent and is necessary to be able to make informed decisions, to understand what they agree on, and for example, to exercise their right to withdraw their consent.

  4. Indisputably indicates that there should be no doubt that the data subject has agreed to the data processing [29, 43].

With the policy improvement method starting from any R policy, we check if it is optimal or not. If not, we find a policy R′ with g(R′) ≤ g(R) and check if it is optimal. Keeping in mind that the number of stationary policies is limited (on account of the fact that both the situation space and the decision space are limited), we can proceed with the procedure described above until we find the most effective policy.

The benefit of using this method is that rather than controlling all of the available stable policies, we only have to maintain a typically small fraction of them and progress from one strategy to another policy improvement.

The equation makes the beginning [4446]:

gR=limnVni,Rn,iS, (28)

which implies that asymptotically (i.e., for n ⟶ ∞: large n) holds

Vni,RngR+uiR,iS. (29)

The quantities ui(R) are relative values of the states i when a stationary policy R is applied, and their difference is equal to

uiRujRVni,RVnj,R,i,jS. (30)

The relative values express the transient effect of the initial states on the expected total rate under the application of policy R.

Then, the quantity hui(R) − uj(R) expresses the difference in the average total rate, if the process starts from the state i compared with whether it began to from state j, when the policy R.

Equivalently applied, this difference is essentially the maximum rate of consensus so that the system (the chain) starts from state j rather than i below state policy R.

If we assume an aperiodic chain Xn(R), then the limit exists [9, 14, 21]:

limnpijkR=πj. (31)

So, there is also

limnVni,R=limnk=0n1jSpijkR·Cj,Rj. (32)

So,

uiRujR=limnVni,RVnj,R, (33)

which expresses the long-term difference in the mean total rate if the process starts from state i rather than state j, under policy R.

Therefore [29],

Vni,R=Ci,Ri+jSpijRi·Vn1j,R, (34)

and so

uiR+gRCi,Ri+jSpijRi·ujR, (35)

or, respectively,

uiRCi,RigR+jSpijRi·ujR. (36)

So, for finding a rhythm and relative values based on the genuine iterative state rS, it holds [47]:

TiR=1+jrpijRi·TjR, (37)

where Ti(R) is the expected time of the first visit to r since the chain started from state i under policy R.

For the average rate Ki(R), the following applies:

KiR=Ci,Ri+jrpijRi·KjR. (38)

Combining the above two equations, we take

KiRgR·TiR=Ci,RigR+jrpijRiKjRgR·TjR,uiR=Ci,RigR+jrpijRiKjRgR·TjR+pirRi·ur,uiR=Ci,RigR+jrpijRi·KjRgR·TjR++pirRi·KrRgR·TrR,ur=0. (39)

So, it finally applies that

uiR=Ci,RigR+jSpijRi·KjRgR·TjR, (40)

or else

uiR=Ci,RigR+jSpijRi·uj,iS, (41)

namely,

g,ui¯=gR,uiR¯, (42)

are a solution of the original system, and therefore the request was proved.

5. Conclusions

Inside the scope of this study, we suggested a novel policy-based consensus management system intending to prevent data breaches within music streaming services. The methodology that has been proposed is solely founded on an advanced Markov chain system. This creates an intelligent consensus policy management framework that considers the current state of the consensus data to predict potential leaks of sensitive personal data and prepare for their development in the future. To be more specific, we employ Markov processes with a discrete (limited or countable) state space and a distinct parametric space. We examine this way of improvement to see whether or not a policy is optimum. It is a forward-thinking and clever system that can model challenging scenarios, making it virtually more straightforward to discover answers to questions regarding dynamic circumstances of ambiguity.

The provision of consent by streaming services helps to reestablish confidence and transparency in the interactions between individuals and the organizations responsible for processing their data. This safeguards the privacy of individuals. The data subject's permission is any freely given, precise, informed, and unambiguous expression of the data subject's desires by which he, by a statement or by an obvious action, accepts the processing of personal data about them. This expression of the data subject's desires can take the form of a statement or an apparent effort. The terms “Free,” “Specific,” “Informed,” and “Indisputably indicated” are used to classify different types of consent. In the hypothetical situation examined by the suggested system, permissions are successfully applied to handle users' data successfully.

The proposed tactic, in addition to the apparent advantages, lags because of the increased complexity even for a small space of solutions S. For example, for a set of N with two possible decisions (the same for each situation), from the simple multiplication principle, we have 2N different stationary policies. For N = 10, we have a total of 1024 stationary policies. We can overcome this obstacle with optimization methods and selecting a predefined solution space. Therefore, significant future development of the proposed system is the investigation of optimization methods using biologically inspired methods to find the optimal solution spaces that could significantly simplify the proposed methodology.

Data Availability

The data used in this study are available from the author upon request.

Conflicts of Interest

The author declares that there are no conflicts of interest.

References

  • 1.Egbert C., Alhenaki F., Johnson D. Leveraging a music streaming platform in establishing a novel storage covert channel. Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN); November 2020; Sydney, Australia. IEEE; pp. 437–440. [DOI] [Google Scholar]
  • 2.Zhao Z.-Y., Wang C.-D., Zheng P.-J., Gong Q., Huang K.-W., Lai J.-H. Music sharing platform based on sina app engine. Proceedings of the 2015 9th International Conference on Frontier of Computer Science and Technology; December 2015; Dalian, China. IEEE; pp. 298–303. [DOI] [Google Scholar]
  • 3.Liu M., Liu X., Yan A., Li X., Xie G., Tang X. An explanatory strategy for reducing the risk of privacy leaks. Journal of Information Hiding and Privacy Protection . 2021;3(4):181–192. doi: 10.32604/jihpp.2021.027385. [DOI] [Google Scholar]
  • 4.D’Acquisto G., Domingo-Ferrer J., Kikiras P., Torra V., de Montjoye Y.-A., Bourka A. Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics. 2015. Avaliable at: https://arxiv.org/abs/1512.06000. [DOI]
  • 5.Sanjay S. Data Privacy and GDPR Handbook . Hoboken, NJ, USA: Wiley; 2022. https://www.wiley.com/en-us/Data+Privacy+and+GDPR+Handbook-p-9781119594192 . [Google Scholar]
  • 6.Mehta B., Rao U. P., Gupta R., Conti M. Towards privacy preserving unstructured big data publishing. Journal of Intelligent and Fuzzy Systems . 2019;36(4):3471–3482. doi: 10.3233/JIFS-181231. [DOI] [Google Scholar]
  • 7.Zou Y., Mhaidli A. H., McCall A., Schaub F. I’ve got nothing to lose’: consumers’ risk perceptions and protective actions after the equifax data breach. 2018. pp. 197–216. Accessed: Apr. 21, 2022. [Online]. Available: https://www.usenix.org/conference/soups2018/presentation/zou.
  • 8.Gwebu K. L., Wang J., Wang L. The role of corporate reputation and crisis response strategies in data breach management. Journal of Management Information Systems . 2018;35(2):683–714. doi: 10.1080/07421222.2018.1451962. [DOI] [Google Scholar]
  • 9.Beutler F. J., Ross K. W. Optimal policies for controlled Markov chains with a constraint. Journal of Mathematical Analysis and Applications . 1985;112(1):236–252. doi: 10.1016/0022-247X(85)90288-4. [DOI] [Google Scholar]
  • 10.Shu X., Zhang J., Daphne Yao D., Feng W.-C. Fast detection of transformed data leaks. IEEE Transactions on Information Forensics and Security . 2016;11(3):528–542. doi: 10.1109/TIFS.2015.2503271. [DOI] [Google Scholar]
  • 11.Aggarwal C. C. Neighborhood-based collaborative filtering. In: Aggarwal C. C., editor. Recommender Systems: The Textbook . Berlin, Germany: Springer International Publishing; 2016. pp. 29–70. [DOI] [Google Scholar]
  • 12.Schafer J. B., Frankowski D., Herlocker J., Sen S. Collaborative filtering recommender systems. In: Brusilovsky P., Kobsa A., Nejdl W., editors. The Adaptive Web: Methods and Strategies of Web Personalization . Berlin, Germany: Springer; 2007. pp. 291–324. [DOI] [Google Scholar]
  • 13.Wiering M. A., de Jong E. D. Computing optimal stationary policies for multi-objective Markov decision processes. Proceedings of the 2007 IEEE International Symposium on Approximate Dynamic Programming and Reinforcement Learning; April 2007; Honolulu, HI, USA. pp. 158–165. [DOI] [Google Scholar]
  • 14.Feinberg E. A., Rothblum U. G. Splitting randomized stationary policies in total-reward Markov decision processes. Mathematics of Operations Research . 2012;37(1):129–153. doi: 10.1287/moor.1110.0525. Feb. 2012. [DOI] [Google Scholar]
  • 15.O’Connor K., McGoff K., Nobel A. B. Optimal transport for stationary Markov chains via policy iteration. Journal of Machine Learning Research . 2022;23(45):1–52. [Google Scholar]
  • 16.Lee O. Probabilistic properties of a nonlinear ARMA process with Markov switching. Communications in Statistics - Theory and Methods . 2005;34(1):193–204. doi: 10.1081/STA-200045822. Feb. 2005. [DOI] [Google Scholar]
  • 17.Igarashi H., Watanabe K. Complex adjoint variable method for finite-element analysis of eddy current problems. IEEE Transactions on Magnetics . 2010;46(8):2739–2742. doi: 10.1109/TMAG.2010.2043936. [DOI] [Google Scholar]
  • 18.Garrett A. J. M. Jaynes E. T., Law, editors. Review: probability theory: the logic of science. Probab. Risk . 2004;3(3–4):243–246. doi: 10.1093/lawprj/3.3-4.243. [DOI] [Google Scholar]
  • 19.Salamat S., Khaleghi B., Imani M., Rosing T. Workload-aware opportunistic energy efficiency in multi-FPGA platforms. 2019. https://arxiv.org/abs/1908.06519 . [DOI]
  • 20.Hong X. Study of intergenerational mobility and urbanization based on OLS method and ordered probit mode. Proceedings of the 2020 Management Science Informatization and Economic Innovation Development Conference (MSIEID); September 2020; Guangzhou, China. IEEE; pp. 435–447. [DOI] [Google Scholar]
  • 21.Pollock J. L. Reasoning and probability. Law Probab. Risk . 2007;6(1–4):43–58. doi: 10.1093/lpr/mgm014. [DOI] [Google Scholar]
  • 22.Taroni F., Biedermann A. Inadequacies of posterior probabilities for the assessment of scientific evidence. Law, Probability and Risk . 2005;4(1–2):89–114. doi: 10.1093/lpr/mgi008. Mar. 2005. [DOI] [Google Scholar]
  • 23.Lyuboshenko I. V., Maître H., Maruani A. Least-mean-squares phase unwrapping by use of an incomplete set of residue branch cuts. Applied Optics . 2002;41(11):2129–2148. doi: 10.1364/ao.41.002129. Apr. 2002. [DOI] [PubMed] [Google Scholar]
  • 24.Cha H. J., Ahn M. L. Development of design guidelines for tools to promote differentiated instruction in classroom teaching. Asia Pacific Education Review . 2014;15(4):511–523. doi: 10.1007/s12564-014-9337-6. [DOI] [Google Scholar]
  • 25.Redmayne M. Objective probability and the assessment of evidence. Law, Probability and Risk . 2003;2(4):275–294. doi: 10.1093/lpr/2.4.275. [DOI] [Google Scholar]
  • 26.Hamer D. Probability, anti-resilience, and the weight of expectation. Law, Probability and Risk . 2012;11(2–3):135–158. doi: 10.1093/lpr/mgs004. [DOI] [Google Scholar]
  • 27.Khodas M., Finkel’stein A. M. Hall coefficient in an interacting electron gas. Physical Review B: Condensed Matter . 2003;68(15) doi: 10.1103/PhysRevB.68.155114.155114 [DOI] [Google Scholar]
  • 28.Gade B. H. H., Vooren C. N., Kloster M. Probability distribution for association of maneuvering vehicles. Proceedings of the 2019 22th International Conference on Information Fusion (FUSION); July 2019; Ottawa, Canada. pp. 1–7. [Google Scholar]
  • 29.Mathai A. M., Haubold H. J. Special Functions for Applied Scientists . Berlin, Germany: Springer; 2008. Applications to stochastic process and time series; pp. 247–295. [DOI] [Google Scholar]
  • 30.Li G., Ma X., Yang H. A hybrid model for forecasting sunspots time series based on variational mode decomposition and backpropagation neural network improved by firefly algorithm. Computational Intelligence and Neuroscience . 2018;2018:9. doi: 10.1155/2018/3713410.3713410 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 31.Yenal U., Jimenez D. Life data analysis with a joint probability density function. Proceedings of the 2020 Annual Reliability and Maintainability Symposium (RAMS); January 2020; Ottawa, Canada. IEEE; pp. 1–6. [DOI] [Google Scholar]
  • 32.Alves T. M. F., Soeiro R. O. J., Cartaxo A. V. T. Probability distribution of intercore crosstalk in weakly coupled MCFs with multiple interferers. Proceedings of the 2019 IEEE Photonics Conference (IPC); September 2019; San Antonio, TX, USA. IEEE; pp. 1–4. [DOI] [Google Scholar]
  • 33.Guopan S. The effect of probability on risk perception and risk preference in decision making. Proceedings of the 2010 International Conference on Education and Management Technology; November 2010; Cairo, Egypt. pp. 690–693. [DOI] [Google Scholar]
  • 34.Deschênes M. Recommender systems to support learners’ agency in a learning context: a systematic review. Int. J. Educ. Technol. High. Educ. . 2020;17(1):p. 50. doi: 10.1186/s41239-020-00219-w. [DOI] [Google Scholar]
  • 35.Seyednezhad S. M. M., Cozart K. N., Bowllan J. A., Smith A. O. A review on recommendation systems: context-aware to social-based. 2018. [Online]. Available: http://arxiv.org/abs/1811.11866.
  • 36.Coelho C. A. The generalized integer gamma distribution A basis for distributions in multivariate statistics. Journal of Multivariate Analysis . 1998;64(1):86–102. doi: 10.1006/jmva.1997.1710. [DOI] [Google Scholar]
  • 37.G P. Prediction of airline delays using k-nearest neighbor algorithm. 2022. SSRN Scholarly Paper ID 3340771, Aug. 2018. Accessed: Jan. 29, [Online]. Available: https://papers.ssrn.com/abstract=3340771.
  • 38.Srifi M., Oussous A., Ait Lahcen A., Mouline S. Recommender systems based on collaborative filtering using review texts—a survey. Information . 2020;11:6. doi: 10.3390/info11060317. [DOI] [Google Scholar]
  • 39.Platis A., Limnios N., Le Du M. Dependability analysis of systems modeled by non-homogeneous Markov chains. Reliability Engineering & System Safety . 1998;61(3):235–249. doi: 10.1016/S0951-8320(97)00073-2. [DOI] [Google Scholar]
  • 40.Siu K. Operational Modal Analysis . Berlin, Germany: Springer; Accessed: Apr. 27, 2022. [Online]. Available: https://link.springer.com/book/10.1007/978-981-10-4118-1. [Google Scholar]
  • 41.Bates A., Hassan W. U. Can data provenance put an end to the data breach? IEEE Security & Privacy . 2019;17(4):88–93. doi: 10.1109/MSEC.2019.2913693. [DOI] [Google Scholar]
  • 42.Hassanzadeh Z., Biddle R., Marsen S. User perception of data breaches. IEEE Transactions on Professional Communications . 2021;64(4):374–389. doi: 10.1109/TPC.2021.3110545. Sep. 2021. [DOI] [Google Scholar]
  • 43.He B., Cui Y., Chen J., Xie P. A spatial data mining method for mineral resources potential assessment. Proceedings of the 2011 IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services; June 2011; Fuzhou, China. IEEE; pp. 96–99. [DOI] [Google Scholar]
  • 44.Fang Z., Xu M., Xu S., Hu T. A framework for predicting data breach risk: leveraging dependence to cope with sparsity. IEEE Transactions on Information Forensics and Security . 2021;16:2186–2201. doi: 10.1109/TIFS.2021.3051804. [DOI] [Google Scholar]
  • 45.Subramanian R. R., Avula R., Surya P. S., Pranay B. Modeling and predicting cyber hacking breaches. Proceedings of the 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS); February 2021; Madurai, India. IEEE; pp. 288–293. [DOI] [Google Scholar]
  • 46.Yan N. W. J., Chua H. N. A path analysis model to identify the effects of social media, news media and data breach on data protection regulation awareness. Proceedings of the 2020 IEEE 2nd International Conference on Artificial Intelligence in Engineering and Technology (IICAIET); September 2020; Kota Kinabalu, Malaysia. IEEE; pp. 1–6. [DOI] [Google Scholar]
  • 47.Achim K. Probability Theory . Berlin, Germany: Springer; Accessed: Apr. 27, 2022. [Online]. Available: https://link.springer.com/book/10.1007/978-1-4471-5361-0. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data used in this study are available from the author upon request.


Articles from Computational Intelligence and Neuroscience are provided here courtesy of Wiley

RESOURCES