Nadia Metoui

Nadia Metoui
Delft University of Technology | TU

Doctor of Philosophy

About

14
Publications
2,831
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
302
Citations

Publications

Publications (14)
Article
Full-text available
This study examines how mainstream political actors and other organizations use political targeted messages. For this purpose, a data set from ProPublica is used. The study examines 55,918 sponsored Facebook ads that were posted by 236 political actors (i.e., political elites and other organizations) in the United States. (1) Topic classification w...
Article
Full-text available
The rise of news content on social media has been accompanied by a hope that people with lower socioeconomic status and less interest in political affairs would be “accidentally” exposed to news. By combining tracking and survey data from a Dutch online panel (N = 413), we analyze how political interest, income, and education influence social media...
Conference Paper
The cash on delivery (CoD) is currently one of the significant payment mechanism in many developing countries' E-commerce systems. A transaction between a seller and a purchaser is completed when the seller has agreed to exchange packaged goods for a payment from the purchaser. Building highly trustworthy, accountable, credible, and decentralized C...
Preprint
News recommenders help users to find relevant online content and have the potential to fulfill a crucial role in a democratic society, directing the scarce attention of citizens towards the information that is most important to them. Simultaneously, recent concerns about so-called filter bubbles, misinformation and selective exposure are symptomati...
Article
Full-text available
Deepfakes are perceived as a powerful form of disinformation. Although many studies have focused on detecting deepfakes, few have measured their effects on political attitudes, and none have studied microtargeting techniques as an amplifier. We argue that microtargeting techniques can amplify the effects of deepfakes, by enabling malicious politica...
Article
Full-text available
Cybersecurity Systems (CSSs) play a fundamental role in guaranteeing data confidentiality, integrity, and availability. However, while processing data, CSSs can intentionally or unintentionally expose personal information to people that can misuse them. For this reason, privacy implications of a CSS should be carefully evaluated. This is a challeng...
Chapter
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. The authors propose and demonstrate a risk-aware access control framework for information disclosure, wh...
Chapter
Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-proces...
Conference Paper
Intrusion and threat detection systems analyze large amount of security-related data logs for detecting potentially harmful patterns. However, log data often contain sensitive and personal information, and their access and processing should be minimized. Anonymization can provide the technical mean to reduce the privacy risk, but it should carefull...
Conference Paper
The huge availability of data is giving organizations the opportunity to develop and consume new data-intensive applications (e.g., predictive analytics). However, data often contain personal and confidential information, and their usage and sharing come with security and legal risks; so there is the need of devising appropriate, task specific, dat...
Conference Paper
The increasing availability of large and diverse datasets (big data) calls for increased flexibility in access control so to improve the exploitation of the data. Risk-aware access control systems offer a natural approach to the problem. We propose a novel access control framework that combines trust with risk and supports access control in dynamic...
Article
Full-text available
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility, and ultimately supporting for a better exploitation of data. The authors propose and demonstrate a risk-aware access control framework for information disclosure, wh...
Chapter
Full-text available
Risk-aware access control systems grant or deny access to resources based on some notion of risk. In this paper we propose a model that considers the risk of leaking privacy-critical information when querying, e.g., datasets containing personal information. While querying databases containing personal information it is current practice to assign al...

Network

Cited By