Results 11 to 20 of about 1,097,797 (367)

Bringing Design to the Privacy Table [PDF]

open access: yesProceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the richness of the concept of "privacy." In contrast, "design" in HCI is comprised of rich and complex concepts and practices, but has received much less attention in the PBD context. Conducting a literature review of HCI publications discussing privacy and design,
Wong, Richmond Y, Mulligan, Deirdre K
openaire   +3 more sources

Privacy by design [PDF]

open access: yesCommunications of the ACM, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms into system requirements.
S. Shapiro
semanticscholar   +3 more sources

Privacy by Design

open access: yes, 2018
Digital identification systems, integrated with civil registration, can play a transformational role across many development areas, such as financial inclusion, expanding access to services and social safety nets, and effective humanitarian response.
Security Engineering Group
semanticscholar   +5 more sources

Ethics and Privacy Implications of Using the Internet and Social Media to Recruit Participants for Health Research: A Privacy-by-Design Framework for Online Recruitment.

open access: yesJ Med Internet Res, 2017
Background The Internet and social media offer promising ways to improve the reach, efficiency, and effectiveness of recruitment efforts at a reasonable cost, but raise unique ethical dilemmas.
Bender JL   +3 more
europepmc   +2 more sources

Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines

open access: yesACM Computing Surveys, 2022
Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online services.
Susanne Barth, D. Ionita, P. Hartel
semanticscholar   +1 more source

Privacy Laws and Privacy by Design Schemes for the Internet of Things

open access: yesACM Computing Surveys, 2021
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws ...
Atheer Aljeraisy   +3 more
semanticscholar   +1 more source

Digital natives aren’t concerned much about privacy, or are they?

open access: yesi-com, 2023
Voice assistants have become embedded in people’s private spaces and domestic lives where they gather enormous amounts of personal information which is why they evoke serious privacy concerns. The paper reports the findings from a mixed-method study with
Maier Edith   +3 more
doaj   +1 more source

Privacy and mechanism design [PDF]

open access: yesACM SIGecom Exchanges, 2013
This paper is a survey of recent work at the intersection of mechanism design and privacy. The connection is a natural one, but its study has been jump-started in recent years by the advent of differential privacy , which provides a rigorous, quantitative way of reasoning about the costs that an agent might ...
Pai, Mallesh, Roth, Aaron
openaire   +2 more sources

A Systematic Literature Review on Privacy by Design in the Healthcare Sector

open access: yesElectronics, 2020
In this digital age, we are observing an exponential proliferation of sophisticated hardware- and software-based solutions that are able to interact with the users at almost every sensitive aspect of our lives, collecting and analysing a range of data ...
Farida Habib Semantha   +3 more
semanticscholar   +1 more source

Engineering Privacy by Design: Are engineers ready to live up to the challenge? [PDF]

open access: yesThe Information Society, 2018
Organizations struggle to comply with legal requirements as well as customers’ calls for better data protection. On the implementation level, incorporation of privacy protections in products and services depends on the commitment of the engineers who ...
Kathrin Bednar   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy