Results 11 to 20 of about 703,183 (313)

Perceptions of ICT Practitioners Regarding Software Privacy [PDF]

open access: goldEntropy, 2020
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of ...
Edna Dias Canedo   +4 more
doaj   +7 more sources

A privacy-preserving federated meta-learning framework for cross-project defect prediction in software systems. [PDF]

open access: goldSci Rep
Software defect prediction (SDP) is a critical task in software engineering, aiming to identify fault-prone modules before deployment. This paper introduces the Efficient Communication Federated Meta-Learning (ECFML) framework for cross-project defect ...
Potharlanka JL, Shaik KY, N BK.
europepmc   +4 more sources

Assessing software privacy using the privacy flow-graph [PDF]

open access: greenProceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security, 2022
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Feiyang Tang, Bjarte M. Østvold
openalex   +3 more sources

Privacy-Enabled Recommendations for Software Vulnerabilities [PDF]

open access: green2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
New software vulnerabilities are published daily. Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process. While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.
Linus Karlsson, Nicolae Paladi
openalex   +3 more sources

Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance [PDF]

open access: yesPLoS ONE, 2012
Background: Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information.
Baker, Matthew Charles   +6 more
core   +4 more sources

A Systematic Mapping Study on Privacy by Design in Software Engineering

open access: diamondCLEI Electronic Journal, 2019
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehécatl Morales-Trujillo   +3 more
openalex   +4 more sources

A Privacy Awareness System for Software Design [PDF]

open access: hybridInternational Journal of Software Engineering and Knowledge Engineering, 2019
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology.
Inah Omoronyia, Ubong Etuk, Peter Inglis
openalex   +2 more sources

Design a Software Reference Architecture to Enhance Privacy and Security in Electronic Health Records [PDF]

open access: greenIEEE Access
Healthcare services and organizations rely on Electronic Health Records (EHRs) to manage, store, and transmit patient data records. Consequently, EHRs play a crucial role in providing high-quality services and maintaining the privacy and security of ...
Rodrigo Tertulino   +2 more
openalex   +3 more sources

Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]

open access: yesProblems and Perspectives in Management, 2022
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj   +1 more source

New Privacy Practices for Blockchain Software [PDF]

open access: yesIEEE Software, 2022
In this article, we present the software tools we have implemented to bring complex privacy technologies closer to developers and to facilitate the implementation of privacyenabled blockchain applications.
Bellés Muñoz, Marta   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy