Results 1 to 10 of about 1,090,732 (330)
Privacy by design in systems for assisted living, personalised care, and wellbeing: A stakeholder analysis [PDF]
Privacy by design within a system for assisted living, personalised care, and wellbeing is crucial to protect users from misuse of the data collected about their health. Especially if the information is collected through audio–video devices, the question
Andrea Carboni +3 more
doaj +3 more sources
Background The Internet and social media offer promising ways to improve the reach, efficiency, and effectiveness of recruitment efforts at a reasonable cost, but raise unique ethical dilemmas.
Bender JL +3 more
europepmc +2 more sources
The challenges of privacy by design [PDF]
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management commitment and step-by-step methods to integrate privacy into ...
S. Spiekermann
semanticscholar +2 more sources
Natural differential privacy—a perspective on protection guarantees [PDF]
We introduce “Natural” differential privacy (NDP)—which utilizes features of existing hardware architecture to implement differentially private computations.
Micah Altman, Aloni Cohen
doaj +2 more sources
Blockchain in Healthcare: 2023 Predictions from Around the Globe
While the past 50 years have been categorized as the Information or Digital Age, the mass amounts of digitized data has been sorely underutilized. It was only recently through the COVID-19 pandemic that accelerated efforts were sought to harness this ...
Talisha Shine, MBA, CBE +4 more
doaj +1 more source
Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online services.
Susanne Barth, D. Ionita, P. Hartel
semanticscholar +1 more source
Privacy Laws and Privacy by Design Schemes for the Internet of Things
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws ...
Atheer Aljeraisy +3 more
semanticscholar +1 more source
Not Hardcoding but Softcoding Data Protection
The delegation of decisions to machines has revived the debate on whether and how technology should and can embed fundamental legal values within its design.
Aurelia Tamò-Larrieux +2 more
doaj +1 more source
Privacy Intrusiveness in Financial-Banking Fraud Detection
Specialty literature and solutions in the market have been focusing in the last decade on collecting and aggregating significant amounts of data about transactions (and user behavior) and on refining the algorithms used to identify fraud.
Larisa Găbudeanu +4 more
doaj +1 more source
A Conceptual Consent Request Framework for Mobile Devices
The General Data Protection Regulation (GDPR) identifies consent as one of the legal bases for personal data processing and requires that it should be freely given, specific, informed, unambiguous, understandable, and easily revocable.
Olha Drozd, Sabrina Kirrane
doaj +1 more source

