Results 221 to 230 of about 2,194 (257)
Some of the next articles are maybe not open access.
Privacy Enabled Software Architecture
2021Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Emilia Stefanova, Aleksandar Dimov
openaire +1 more source
Privacy Oriented Software Development
2019Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
Baldassarre M. T. +3 more
openaire +2 more sources
Quantitative analysis for privacy leak software with privacy Petri net
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics, 2012Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan +3 more
openaire +1 more source
Privacy-Invasive Software and Preventive Mechanisms
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006Computers are increasingly more integrated into peoples? daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This
Martin Boldt, Bengt Carlsson
openaire +1 more source
Software and privacy: revising Orwell
IEEE Software, 1993It is argued that employers frequently use computers as a surveillance device and a means to monitor almost every aspect of employee performance. Employers justify such conduct by asserting that this helps ensure job safety and workplace security, reduce costs and limit liability; and increase productivity, efficiency, and product quality.
openaire +1 more source
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
Information Sciences, 2020Abstract In an increasingly connected world, a diversity of data is collected from the environment and its inhabitants. Because of the richness of the information, privacy becomes an important requirement. Although there are principles and rules, there is still a lack of methodologies to guide the integration of privacy guidelines into the ...
Pedro Barbosa +2 more
openaire +1 more source
Commercial software, adware, and consumer privacy
International Journal of Industrial Organization, 2013Abstract I study the choice between selling new software commercially and bundling it with ads and distributing it for free as adware. Adware allows advertisers to send targeted information to consumers which improves their purchasing decisions, but also entails a loss of privacy.
openaire +1 more source
Towards Software-Agent Enhanced Privacy Protection
2014The ability to control the use of personal information is part of the right to privacy. With higher digitalization than ever, the lack of control is an essential privacy issue discussed extensively. Estonia is a unique society in terms of the highest level of digital public services available for a citizen, enabled by the omnibus X-Road infrastructure ...
Addi Rull, Ermo Täks, Alexander Norta
openaire +1 more source
Privacy by Design and Software Engineering
Proceedings of the XXI Brazilian Symposium on Software Quality, 2022Vinícius Camargo Andrade +4 more
openaire +1 more source

