Results 11 to 20 of about 667,722 (335)
Designing a Serious Game: Teaching Developers to Embed Privacy into Software Systems [PDF]
Software applications continue to challenge user privacy when users interact with them. Privacy practices (e.g. Data Minimisation (DM), Privacy by Design (PbD) or General Data Protection Regulation (GDPR)) and related "privacy engineering" methodologies exist and provide clear instructions for developers to implement privacy into software systems they ...
Amagir Aisa+17 more
arxiv +3 more sources
Advanced Cloud Privacy Threat Modeling [PDF]
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system .
Gholami, Ali, Laure, Erwin
arxiv +3 more sources
Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study [PDF]
Mobile applications (apps) have become deeply personal, constantly demanding access to privacy-sensitive information in exchange for more personalized user experiences. Such privacy-invading practices have generated major multidimensional and unconventional privacy concerns among app users.
Fahimeh Ebrahimi+2 more
arxiv +3 more sources
Privacy in Social Software [PDF]
While using social software and interacting with others on the Internet, users share a lot of information about themselves. An important issue for these users is maintaining control over their own personal data and being aware to whom which data is disclosed. In this chapter, we present specific requirements and realised solutions to these problems for
Filipe Beato+4 more
openaire +5 more sources
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams [PDF]
With the increase in the number of privacy regulations, small development teams are forced to make privacy decisions on their own. In this paper, we conduct a mixed-method survey study, including statistical and qualitative analysis, to evaluate the privacy perceptions, practices, and knowledge of members involved in various phases of the Software ...
Maxwell Prybylo+3 more
arxiv +3 more sources
SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers [PDF]
In the absence of data protection measures, software applications lead to privacy breaches, posing threats to end-users and software organisations. Privacy Enhancing Technologies (PETs) are technical measures that protect personal data, thus minimising such privacy breaches.
Arachchilage, Nalin Asanka Gamagedara+3 more
arxiv +2 more sources
Healthcare services and organizations rely on Electronic Health Records (EHRs) to manage, store, and transmit patient data records. Consequently, EHRs play a crucial role in providing high-quality services and maintaining the privacy and security of ...
Rodrigo Tertulino+2 more
doaj +2 more sources
New Privacy Practices for Blockchain Software [PDF]
The benefits of blockchain technologies for industrial applications are unquestionable. However, it is a considerable challenge to use a transparent system like blockchain and at the same time provide privacy to sensitive data. Privacy technologies permit conducting private transactions about sensitive data over transparent networks, but their inherent
Bellés Muñoz, Marta+3 more
openaire +5 more sources
Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj +1 more source
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem.
José Bacelar Almeida+11 more
doaj +1 more source