Results 21 to 30 of about 1,065,424 (332)

Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro normativo sulla privacy: revisione dei differenti approcci per bilanciare i rischi per la privacy e l'usabilità dei sistemi informativi sanitari

open access: yesEuropean Journal of Privacy Law & Technologies, 2022
The integration of information and communication technologies with advanced machine learning, or artificial intelligence, brings both benefits and risks.
Matjaž Drev   +2 more
doaj   +1 more source

Privacy by design [PDF]

open access: yesCommunications of the ACM, 2010
Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms into system requirements.
openaire   +2 more sources

Privacy by Design: Adding Privacy to Publishing Platforms

open access: green, 2013
Privacy can be considered a measure of degree of control over personal data. While information system owners have control over personal data as long as it is stored on a system under their immediate control, this control diminishes when data is copied from the information system (e.g., a website) and to a different system.
Joakim Valla
openaire   +2 more sources

Reasons and Strategies for Privacy Features in Tracking and Tracing Systems—A Systematic Literature Review

open access: yesSensors, 2021
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry.
Christian Jandl   +3 more
doaj   +1 more source

Data Protection by Design and by Default : Deciphering the EU’s Legislative Requirements

open access: yesOslo Law Review, 2017
In this paper, a critical examination is conducted of Article 25 of the European Union’s General Data Protection Regulation (Regulation 2016/679). Bearing the title ʻdata protection by design and by default’, Article 25 requires that core data protection
Lee A. Bygrave
doaj   +1 more source

A Privacy-Aware Zero Interaction Smart Mobility System

open access: yesIEEE Access, 2022
Smart cities often rely on technological innovations to improve citizens’ safety and quality of life. This paper presents a novel smart mobility system that facilitates people’s access to public mobility while preserving their privacy.
Stefano Righini   +2 more
doaj   +1 more source

Community clouds within M-commerce: a privacy by design perspective

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices.
Farid Shirazi, Amna Iqbal
doaj   +1 more source

Buying Private Data without Verification [PDF]

open access: yes, 2014
We consider the problem of designing a survey to aggregate non-verifiable information from a privacy-sensitive population: an analyst wants to compute some aggregate statistic from the private bits held by each member of a population, but cannot verify ...
Ghosh, Arpita   +3 more
core   +3 more sources

Il Regolamento UE n. 2016/679 e la protezione dei dati personali nelle dinamiche giuslavoristiche: la tutela riservata al dipendente

open access: yesLabour & Law Issues, 2016
The essay examines the EU Regulation n.2016/679, that will enter into force as from 2018, ponting out its impact on the Data Protection for workers.The Author assesses the UE Regulation key topics: the need of Risk Analysis and Impact Privacy Assessment ...
Claudia Ogriseg
doaj   +1 more source

Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs

open access: yesSensors, 2023
Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent management systems.
Muhammad Irfan Khalid   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy