Results 41 to 50 of about 1,097,797 (367)

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Privacy-aware mechanism design [PDF]

open access: yesProceedings of the 13th ACM Conference on Electronic Commerce, 2012
In traditional mechanism design, agents only care about the utility they derive from the outcome of the mechanism. We look at a richer model where agents also assign non-negative dis-utility to the information about their private types leaked by the outcome of the mechanism.
Nissim, K.   +2 more
openaire   +2 more sources

Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review

open access: yesIEEE Access
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto   +3 more
doaj   +1 more source

L’identità digitale nel metaverso [PDF]

open access: yesDemocrazia e Diritti Sociali, 2023
The essay analyses and explores the concept of personal identity in the light not only of the already tested digital dimension but also of a further evolution of the Internet represented by the so-called metaverse to be understood as a convergence zone ...
Michele Iaselli
doaj  

Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers

open access: yesวารสารวิทยาการสารสนเทศและเทคโนโลยีประยุกต์, 2021
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them.
Saranya Saetang
doaj   +1 more source

Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]

open access: yes, 2014
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz   +20 more
core   +4 more sources

Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation

open access: yesInternet Policy Review, 2020
This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service ...
Simeon de Brouwer
doaj   +1 more source

PharmaLedger: Blockchain-Enabled Healthcare: Privacy-Enhancement with Blockchain

open access: yesBlockchain in Healthcare Today, 2022
Topics such as supply chain, clinical trials and health data will be explored along with how blockchian can exist in harmony with GDPR.
Halid Kayhan, Co-lead for Regulatory, Legal and Data Privacy Framework, PharmaLedger
doaj   +1 more source

Privacy Games: Optimal User-Centric Data Obfuscation

open access: yes, 2015
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core   +2 more sources

Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study

open access: yesIEEE Access, 2019
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy