Perceptions of ICT Practitioners Regarding Software Privacy [PDF]
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of ...
Edna Dias Canedo +4 more
doaj +7 more sources
A privacy-preserving federated meta-learning framework for cross-project defect prediction in software systems. [PDF]
Software defect prediction (SDP) is a critical task in software engineering, aiming to identify fault-prone modules before deployment. This paper introduces the Efficient Communication Federated Meta-Learning (ECFML) framework for cross-project defect ...
Potharlanka JL, Shaik KY, N BK.
europepmc +4 more sources
Assessing software privacy using the privacy flow-graph [PDF]
We increasingly rely on digital services and the conveniences they provide. Processing of personal data is integral to such services and thus privacy and data protection are a growing concern, and governments have responded with regulations such as the EU's GDPR.
Feiyang Tang, Bjarte M. Østvold
openalex +3 more sources
Privacy-Enabled Recommendations for Software Vulnerabilities [PDF]
New software vulnerabilities are published daily. Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process. While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.
Linus Karlsson, Nicolae Paladi
openalex +3 more sources
Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance [PDF]
Background: Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information.
Baker, Matthew Charles +6 more
core +4 more sources
A Systematic Mapping Study on Privacy by Design in Software Engineering
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehécatl Morales-Trujillo +3 more
openalex +4 more sources
A Privacy Awareness System for Software Design [PDF]
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology.
Inah Omoronyia, Ubong Etuk, Peter Inglis
openalex +2 more sources
Design a Software Reference Architecture to Enhance Privacy and Security in Electronic Health Records [PDF]
Healthcare services and organizations rely on Electronic Health Records (EHRs) to manage, store, and transmit patient data records. Consequently, EHRs play a crucial role in providing high-quality services and maintaining the privacy and security of ...
Rodrigo Tertulino +2 more
openalex +3 more sources
Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj +1 more source
New Privacy Practices for Blockchain Software [PDF]
In this article, we present the software tools we have implemented to bring complex privacy technologies closer to developers and to facilitate the implementation of privacyenabled blockchain applications.
Bellés Muñoz, Marta +3 more
openaire +4 more sources

