Results 21 to 30 of about 643,939 (333)

Comprehensive quantitative analysis on privacy leak behavior. [PDF]

open access: yesPLoS ONE, 2013
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security.
Lejun Fan   +5 more
doaj   +1 more source

VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis

open access: yesMachine Learning and Knowledge Extraction, 2022
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan   +5 more
doaj   +1 more source

Towards a privacy debt

open access: yesIET Software, 2021
This study argues the difference between security and privacy and outlines the concept of Privacy Debt as a new Technical Debt. Privacy is gaining momentum in any software system due to mandatory compliance with respect to laws and regulations. There are
Xabier Larrucea   +2 more
doaj   +1 more source

Ethics in Software Engineering: Privacy

open access: goldInternational Journal of Science and Research (IJSR)
Prasanth Yadla
openalex   +2 more sources

Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]

open access: yesColombo Business Journal, 2023
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj   +1 more source

A Privacy Awareness System for Software Design [PDF]

open access: yesInternational Journal of Software Engineering and Knowledge Engineering, 2019
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology.
Omoronyia, Inah   +2 more
openaire   +2 more sources

On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]

open access: yes, 2013
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea   +3 more
core   +1 more source

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Privacy-Enabled Recommendations for Software Vulnerabilities [PDF]

open access: yes2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019
New software vulnerabilities are published daily. Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process. While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.
Karlsson, Linus, Paladi, Nicolae
openaire   +3 more sources

Speranza: Usable, Privacy-friendly Software Signing

open access: yesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
15 pages, 5 ...
Kelsey Merrill   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy