Results 21 to 30 of about 2,247 (174)
Smart cyber-physical systems:beyond usable security to security ergonomics by design [PDF]
Securing cyber-physical systems is hard. They are complex infrastructures comprising multiple technological artefacts, designers, operators and users. Existing research has established the security challenges in such systems as well as the role of usable
Craggs, Barnaby, Rashid, Awais
core +1 more source
Examining the interplay between privacy by design (PbD) schemes and privacy patterns [PDF]
Privacy is a vague concept. This vagueness makes it difficult to understand what it means. Software engineering is an area such ambiguity creates a significant problem. For example, if the software developers do not understand privacy properly, they are not going to develop the software in a privacy-protected manner.
Alkhariji, Lamya +2 more
openaire
Roadmap for NIS education programmes in Europe:education [PDF]
This document continues work from previous activities by suggesting training materials, scenarios and a way forward for implementing the EC roadmap for NIS education in Europe.
Berendt, Bettina +5 more
core +3 more sources
A Methodology for Assuring Privacy by Design in Information Systems [PDF]
There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection. Certainly this paradigm has been in use since 1995; however the GDRP "The General Data Protection Regulation", by considering PbD in 2018 as a ...
Arfaoui, Siham +2 more
core +2 more sources
Engineering privacy requirements valuable lessons from another realm [PDF]
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, 'vague', 'disconnected from technology', or 'aspirational' are some terms
Martín García, Yod Samuel +2 more
core +1 more source
Designing Privacy-aware Internet of Things Applications [PDF]
Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals.
Arosha K. Bandara +47 more
core +6 more sources
PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology [PDF]
Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software.
Antignac, Thibaud +8 more
core +3 more sources
This paper offers a comparative systematic literature review of the key principles, norms, and strategies associated with Security by Design (SbD) and Privacy by Design (PbD).
Cristina Del-Real +2 more
semanticscholar +1 more source
Ethical considerations in advanced metering infrastructure integration: A systematic review
The integration of Advanced Metering Infrastructure (AMI) within energy utility systems promises significant improvements in efficiency, service delivery, and sustainability.
Xiao-Yu Zhang +3 more
doaj +1 more source
ABSTRACT: Privacy by design requires privacy to be taken into account, during the entire engineering process, while security by design requires embedding the principles of secure coding and software design starting from the requirements elicitation phase.
openaire +1 more source

