Results 1 to 10 of about 667,722 (335)
Assessing Software Privacy using the Privacy Flow-Graph [PDF]
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Tang, Feiyang, Østvold, Bjarte M.
arxiv +7 more sources
Perceptions of ICT Practitioners Regarding Software Privacy [PDF]
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy
Edna Dias Canedo+4 more
doaj +8 more sources
Principles for privacy protection software [PDF]
The privacy impact of computer systems is clearly a hot topic in the mainstream press [10] and the research world [1]. Experience with systems that protect privacy and others that violate it provides an opportunity to evaluate issues raised by current tools and proposed designs. Study of the strengths and shortcomings of existing tools can help clarify
Harry Hochheiser
openalex +4 more sources
Privacy-Invasive Software in Filesharing Tools [PDF]
Personal privacy is affected by the occurrence of adware and spyware in peertopeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Andreas Jacobsson+2 more
openalex +4 more sources
A Privacy-Aware V-Model for Software Development [PDF]
After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice.
Ala’a M. Al-Momani+4 more
openalex +3 more sources
Is Data Privacy Always Good for Software Testing? [PDF]
Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order to achieve lower cost and higher quality. When releasing proprietary DCAs, its databases should also be made available to test engineers, so that they can test using real data ...
Mark Grechanik+3 more
openalex +3 more sources
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension [PDF]
Background Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research.
Feng Chen+9 more
doaj +2 more sources
Proposal of a Privacy Knowledge Base for Supporting Development of Privacy Friendly Software
Abstract With the spread of highly functional mobile devices, anyone can send messages in a simple manner. On the other hand, risks regarding the leakage of privacy information have increased in number. Software engineers must prevent the leakage of privacy information caused by problems of software systems.
Atsuo Hazeyama
openalex +3 more sources
A Systematic Mapping Study on Privacy by Design in Software Engineering
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehecatl Morales-Trujillo+3 more
doaj +3 more sources
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign [PDF]
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta+2 more
arxiv +3 more sources