Results 21 to 30 of about 1,065,424 (332)
The integration of information and communication technologies with advanced machine learning, or artificial intelligence, brings both benefits and risks.
Matjaž Drev +2 more
doaj +1 more source
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms into system requirements.
openaire +2 more sources
Privacy by Design: Adding Privacy to Publishing Platforms
Privacy can be considered a measure of degree of control over personal data. While information system owners have control over personal data as long as it is stored on a system under their immediate control, this control diminishes when data is copied from the information system (e.g., a website) and to a different system.
Joakim Valla
openaire +2 more sources
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry.
Christian Jandl +3 more
doaj +1 more source
Data Protection by Design and by Default : Deciphering the EU’s Legislative Requirements
In this paper, a critical examination is conducted of Article 25 of the European Union’s General Data Protection Regulation (Regulation 2016/679). Bearing the title ʻdata protection by design and by default’, Article 25 requires that core data protection
Lee A. Bygrave
doaj +1 more source
A Privacy-Aware Zero Interaction Smart Mobility System
Smart cities often rely on technological innovations to improve citizens’ safety and quality of life. This paper presents a novel smart mobility system that facilitates people’s access to public mobility while preserving their privacy.
Stefano Righini +2 more
doaj +1 more source
Community clouds within M-commerce: a privacy by design perspective
The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices.
Farid Shirazi, Amna Iqbal
doaj +1 more source
Buying Private Data without Verification [PDF]
We consider the problem of designing a survey to aggregate non-verifiable information from a privacy-sensitive population: an analyst wants to compute some aggregate statistic from the private bits held by each member of a population, but cannot verify ...
Ghosh, Arpita +3 more
core +3 more sources
The essay examines the EU Regulation n.2016/679, that will enter into force as from 2018, ponting out its impact on the Data Protection for workers.The Author assesses the UE Regulation key topics: the need of Risk Analysis and Impact Privacy Assessment ...
Claudia Ogriseg
doaj +1 more source
Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent management systems.
Muhammad Irfan Khalid +2 more
doaj +1 more source

