Results 31 to 40 of about 1,065,424 (332)
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them.
Saranya Saetang
doaj +1 more source
How to make privacy policies both GDPR-compliant and usable [PDF]
It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline.
Renaud, Karen, Shepherd, Lynsay
core +4 more sources
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto +3 more
doaj +1 more source
L’identità digitale nel metaverso [PDF]
The essay analyses and explores the concept of personal identity in the light not only of the already tested digital dimension but also of a further evolution of the Internet represented by the so-called metaverse to be understood as a convergence zone ...
Michele Iaselli
doaj
PharmaLedger: Blockchain-Enabled Healthcare: Privacy-Enhancement with Blockchain
Topics such as supply chain, clinical trials and health data will be explored along with how blockchian can exist in harmony with GDPR.
Halid Kayhan, Co-lead for Regulatory, Legal and Data Privacy Framework, PharmaLedger
doaj +1 more source
Examined Lives: Informational Privacy and the Subject as Object [PDF]
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core +2 more sources
Privacy and Security Best Practices for IoT Solutions
The rapid increase in Internet of Things (IoT) applications has raised security and privacy issues due to the huge amount of data acquired by IoT devices and transmitted through the Internet.
Matteo Anedda +7 more
doaj +1 more source
Privacy Games: Optimal User-Centric Data Obfuscation
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core +2 more sources
Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz +20 more
core +4 more sources

