Results 21 to 30 of about 2,247 (174)

Smart cyber-physical systems:beyond usable security to security ergonomics by design [PDF]

open access: yes, 2017
Securing cyber-physical systems is hard. They are complex infrastructures comprising multiple technological artefacts, designers, operators and users. Existing research has established the security challenges in such systems as well as the role of usable
Craggs, Barnaby, Rashid, Awais
core   +1 more source

Examining the interplay between privacy by design (PbD) schemes and privacy patterns [PDF]

open access: yes, 2020
Privacy is a vague concept. This vagueness makes it difficult to understand what it means. Software engineering is an area such ambiguity creates a significant problem. For example, if the software developers do not understand privacy properly, they are not going to develop the software in a privacy-protected manner.
Alkhariji, Lamya   +2 more
openaire  

Roadmap for NIS education programmes in Europe:education [PDF]

open access: yes, 2014
This document continues work from previous activities by suggesting training materials, scenarios and a way forward for implementing the EC roadmap for NIS education in Europe.
Berendt, Bettina   +5 more
core   +3 more sources

A Methodology for Assuring Privacy by Design in Information Systems [PDF]

open access: yes, 2022
There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection. Certainly this paradigm has been in use since 1995; however the GDRP "The General Data Protection Regulation", by considering PbD in 2018 as a ...
Arfaoui, Siham   +2 more
core   +2 more sources

Engineering privacy requirements valuable lessons from another realm [PDF]

open access: yes, 2014
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, 'vague', 'disconnected from technology', or 'aspirational' are some terms
Martín García, Yod Samuel   +2 more
core   +1 more source

Designing Privacy-aware Internet of Things Applications [PDF]

open access: yes, 2019
Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals.
Arosha K. Bandara   +47 more
core   +6 more sources

PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology [PDF]

open access: yes, 2015
Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software.
Antignac, Thibaud   +8 more
core   +3 more sources

A systematic literature review of security and privacy by design principles, norms, and strategies for digital technologies

open access: yesInternational Review of Law, Computers & Technology
This paper offers a comparative systematic literature review of the key principles, norms, and strategies associated with Security by Design (SbD) and Privacy by Design (PbD).
Cristina Del-Real   +2 more
semanticscholar   +1 more source

Ethical considerations in advanced metering infrastructure integration: A systematic review

open access: yesEnergy Strategy Reviews
The integration of Advanced Metering Infrastructure (AMI) within energy utility systems promises significant improvements in efficiency, service delivery, and sustainability.
Xiao-Yu Zhang   +3 more
doaj   +1 more source

An Exploratory Survey on the perceptions regarding the inclusion of security and privacy by design (SBD, PbD) principles during Software development lifecycle (SDLC) requirements gathering phase among Business Analysts

open access: yes, 2020
ABSTRACT: Privacy by design requires privacy to be taken into account, during the entire engineering process, while security by design requires embedding the principles of secure coding and software design starting from the requirements elicitation phase.
openaire   +1 more source

Home - About - Disclaimer - Privacy