VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan +5 more
doaj +1 more source
Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj +1 more source
Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance. [PDF]
Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information.
Daniel B Kramer +6 more
doaj +1 more source
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution
As people have become more and more connected, there are certain scenarios where items need to be recommended to groups of users rather than individual user, which motivate studies on group recommender systems (GRSs).
Zhiwei Guo +4 more
doaj +1 more source
Children's data and privacy online: Growing up in a digital age [PDF]
Adolescents in the age of technology face a variety of security issues, but one of the most significant ones, that needs to be addressed by legislators, is privacy and data protection.
Domazet Siniša S. +1 more
doaj +1 more source
Computer-Aided Identification and Validation of Privacy Requirements
Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are ...
Rene Meis, Maritta Heisel
doaj +1 more source
OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole +5 more
doaj +1 more source
A Systematic Mapping Study on Privacy by Design in Software Engineering
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehecatl Morales-Trujillo +3 more
doaj +1 more source
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this
Valerie J.M. Watzlaf +3 more
doaj +1 more source
Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj +1 more source

