Results 31 to 40 of about 232,045 (243)
Community clouds within M-commerce: a privacy by design perspective
The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices.
Farid Shirazi, Amna Iqbal
doaj +1 more source
Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them.
Saranya Saetang
doaj +1 more source
The essay examines the EU Regulation n.2016/679, that will enter into force as from 2018, ponting out its impact on the Data Protection for workers.The Author assesses the UE Regulation key topics: the need of Risk Analysis and Impact Privacy Assessment ...
Claudia Ogriseg
doaj +1 more source
L’identità digitale nel metaverso [PDF]
The essay analyses and explores the concept of personal identity in the light not only of the already tested digital dimension but also of a further evolution of the Internet represented by the so-called metaverse to be understood as a convergence zone ...
Michele Iaselli
doaj
Responsible innovation at work: gamification, public engagement, and privacy by design
Public engagement is crucial to strengthen responsibility frameworks in highly innovative contexts, including as part of business organisations. One particular innovation that calls for public engagement is gamification.
Daniele Ruggiu+7 more
doaj +1 more source
Privacy and Security Best Practices for IoT Solutions
The rapid increase in Internet of Things (IoT) applications has raised security and privacy issues due to the huge amount of data acquired by IoT devices and transmitted through the Internet.
Matteo Anedda+7 more
doaj +1 more source
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto+3 more
doaj +1 more source
This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service ...
Simeon de Brouwer
doaj +1 more source
PharmaLedger: Blockchain-Enabled Healthcare: Privacy-Enhancement with Blockchain
Topics such as supply chain, clinical trials and health data will be explored along with how blockchian can exist in harmony with GDPR.
Halid Kayhan, Co-lead for Regulatory, Legal and Data Privacy Framework, PharmaLedger
doaj +1 more source
Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal
The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and data. Without accurate and verified management, they could become severe back-doors for security
Said Daoudagh+7 more
doaj +1 more source