Results 31 to 40 of about 941,166 (211)

Privacy by design

open access: yesAustralasian Journal of Information Systems, 2020
Privacy is important because it supports freedom, dignity, autonomy, justice, and democracy, and therefore it is important that privacy is studied in ontologically robust ways. A form of privacy is implemented in the right to be forgotten, which is a human right established by the European Court of Justice.
Anwaar Ulhaq   +2 more
openaire   +3 more sources

Reasons and Strategies for Privacy Features in Tracking and Tracing Systems—A Systematic Literature Review

open access: yesSensors, 2021
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry.
Christian Jandl   +3 more
doaj   +1 more source

Privacy Invasion Experiences and Perceptions: a Comparison Between Germany and the Arab World [PDF]

open access: yes, 2018
Similar to research in behavioral psychology, research in privacy and usable security has focused mainly on Western, Educated, Industrialized, Rich, and Democratic (WEIRD) societies.
Khamis, Mohamed   +2 more
core   +1 more source

Bringing Design to the Privacy Table [PDF]

open access: yesProceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the richness of the concept of "privacy." In contrast, "design" in HCI is comprised of rich and complex concepts and practices, but has received much less attention in the PBD context. Conducting a literature review of HCI publications discussing privacy and design,
Wong, Richmond Y, Mulligan, Deirdre K
openaire   +3 more sources

Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs

open access: yesSensors, 2023
Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent management systems.
Muhammad Irfan Khalid   +2 more
doaj   +1 more source

Buying Private Data without Verification [PDF]

open access: yes, 2014
We consider the problem of designing a survey to aggregate non-verifiable information from a privacy-sensitive population: an analyst wants to compute some aggregate statistic from the private bits held by each member of a population, but cannot verify ...
Ghosh, Arpita   +3 more
core   +3 more sources

Data Protection by Design and by Default : Deciphering the EU’s Legislative Requirements

open access: yesOslo Law Review, 2017
In this paper, a critical examination is conducted of Article 25 of the European Union’s General Data Protection Regulation (Regulation 2016/679). Bearing the title ʻdata protection by design and by default’, Article 25 requires that core data protection
Lee A. Bygrave
doaj   +1 more source

Community clouds within M-commerce: a privacy by design perspective

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices.
Farid Shirazi, Amna Iqbal
doaj   +1 more source

Il Regolamento UE n. 2016/679 e la protezione dei dati personali nelle dinamiche giuslavoristiche: la tutela riservata al dipendente

open access: yesLabour & Law Issues, 2016
The essay examines the EU Regulation n.2016/679, that will enter into force as from 2018, ponting out its impact on the Data Protection for workers.The Author assesses the UE Regulation key topics: the need of Risk Analysis and Impact Privacy Assessment ...
Claudia Ogriseg
doaj   +1 more source

Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers

open access: yesวารสารวิทยาการสารสนเทศและเทคโนโลยีประยุกต์, 2021
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them.
Saranya Saetang
doaj   +1 more source

Home - About - Disclaimer - Privacy