Results 71 to 80 of about 941,166 (211)

In/Visible Bodies. On patients and privacy in a networked world [PDF]

open access: yes, 2012
In the networked world, privacy and visibility become entangled in new and unexpected ways. This article uses the concept of networked visibility to explore the entanglement of technology and the visibility of patient bodies.
van der Velden, Maja
core  

Privacy, Notice, and Design

open access: yesSSRN Electronic Journal, 2016
Design configures our relationship with a space, whether offline or online. In particular, the design of built online environments can constrain our ability to understand and respond to websites’ data use practices or it can enhance agency by giving us control over information.
openaire   +3 more sources

Design of PriServ, a privacy service for DHTs [PDF]

open access: yesProceedings of the 2008 international workshop on Privacy and anonymity in information society, 2008
By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data privacy can be easily violated by untrustworthy peers wich may use data for other purposes (e.g., marketing, fraudulence, profiling, etc.).
Jawad, Mohamed   +2 more
openaire   +3 more sources

iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks [PDF]

open access: yes, 2007
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/
Abdelzaher, Tarek F.   +4 more
core  

A MOOC on Privacy by Design and the GDPR [PDF]

open access: yes, 2018
In this paper we describe how we designed a massive open online course (mooc) on Privacy by Design with a focus on how to achieve compliance with the eu gdpr principles and requirements in it engineering and management. This mooc aims at educating both professionals and undergraduate students, i.e., target groups with distinct educational needs and ...
Sebastian Herold   +7 more
openaire   +2 more sources

A Systematic Mapping Study on Privacy by Design in Software Engineering

open access: yesCLEI Electronic Journal, 2019
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehecatl Morales-Trujillo   +3 more
doaj   +1 more source

Supporting Privacy by Design Using Privacy Process Patterns [PDF]

open access: yes, 2017
Advances in Information and Communication Technology (ICT) have had significant impact on every-day life and have allowed us to share, store and manipulate information easily and at any time. On the other hand, such situation also raises important privacy concerns.
Christos Kalloniatis   +4 more
openaire   +3 more sources

Ethics of Blockchain by Design: Guiding a Responsible Future for Healthcare Innovation

open access: yesBlockchain in Healthcare Today
The rapid evolution of blockchain technology within healthcare presents unparalleled opportunities for advancements, including enhanced patient data security, decentralized systems for trustless operations, and transparent supply chain management ...
Muthu Ramachandran
doaj   +1 more source

Data privacy by design: digital infrastructures for clinical collaborations

open access: yes, 2009
The clinical sciences have arguably the most stringent security demands on the adoption and roll-out of collaborative e-Infrastructure solutions such as those based upon Grid-based middleware.
Ajayi, O., Sinnott, R.O., Stell, A.J.
core  

Privacy, Visibility, Transparency, and Exposure [PDF]

open access: yes, 2008
This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of ...
Cohen, Julie E.
core   +2 more sources

Home - About - Disclaimer - Privacy