Results 21 to 30 of about 1,097,797 (367)

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms [PDF]

open access: yesIoT, 2016
The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms.
Charith Perera   +4 more
semanticscholar   +1 more source

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +3 more sources

A Conceptual Framework to Ensure Privacy in Patient Record Management System

open access: yesIEEE Access, 2021
Privacy has become an increasingly significant apprehension in today’s rapidly changing economy primarily for personal and sensitive user data. The levels of personal data violation are increasing day by day however privacy-preserving frameworks ...
Farida Habib Semantha   +4 more
doaj   +1 more source

Privacy by design

open access: yesAustralasian Journal of Information Systems, 2020
Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice.
Kirsten Wahlstrom   +2 more
openaire   +3 more sources

Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services

open access: yesComputers, 2021
Trust is one of the most critical factors that determine willingness to use e-government services. Despite its significance, most previous studies investigated the factors that lead to trusting such services in theoretical aspects without examining the ...
Hilal AlAbdali   +3 more
doaj   +1 more source

Towards Privacy by Design on the Internet of Things (IoT) Use: A Qualitative Descriptive Study

open access: yesJournal of Information Systems and Informatics, 2022
From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-edge services to improve our lives. Nevertheless, IoT technologies raise complicated, innovative privacy-related issues that might limit their widespread ...
Ahmad Luthfi, Emigawaty Emigawaty
doaj   +1 more source

Operationalizing Privacy by Design: an Indian illustration

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2023
This article identifies Privacy by Design [“PbD”] as a suitable regulatory approach to address the attack on personal data in the Fourth Industrial Revolution.
Ankit Kapoor
doaj   +1 more source

Privacy framework for context-aware robot development

open access: yesPaladyn, 2021
Privacy is an essential topic in (social) robotics and becomes even more important when considering interactive and autonomous robots within the domestic environment.
Heuer Tanja   +2 more
doaj   +1 more source

Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro normativo sulla privacy: revisione dei differenti approcci per bilanciare i rischi per la privacy e l'usabilità dei sistemi informativi sanitari

open access: yesEuropean Journal of Privacy Law & Technologies, 2022
The integration of information and communication technologies with advanced machine learning, or artificial intelligence, brings both benefits and risks.
Matjaž Drev   +2 more
doaj   +1 more source

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics [PDF]

open access: yesarXiv.org, 2015
The extensive collection and processing of personal information in big data analytics has given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling, and disclosure of private data.
G. D'Acquisto   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy