Results 321 to 330 of about 667,722 (335)

Quantitative analysis for privacy leak software with privacy Petri net [PDF]

open access: possibleProceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics, 2012
Nowadays, lots of private information are collected and spread without proper protection. privacy leak behavior has been widely discovered in many malwares and suspicious applications. We refer to such software as privacy leak software (PLS). In this paper we present an abstract model called Privacy Petri Net (PPN) for privacy leaks analysis.
Lejun Fan   +3 more
openaire   +1 more source

Privacy Enabled Software Architecture

2021
Establishment of privacy legislation regulations like the General Data Protection Regulation (GDPR) makes privacy to become one of the very important quality requirements towards software systems. Software companies need to develop strict strategies to comply with such regulations. However, currently privacy is frequently studied together with security,
Aleksandar Dimov, Emilia Stefanova
openaire   +2 more sources

Privacy by Evidence: A Methodology to develop privacy-friendly software applications

Information Sciences, 2020
Abstract In an increasingly connected world, a diversity of data is collected from the environment and its inhabitants. Because of the richness of the information, privacy becomes an important requirement. Although there are principles and rules, there is still a lack of methodologies to guide the integration of privacy guidelines into the ...
Hyggo Almeida   +2 more
openaire   +2 more sources

Are Designers Ready for Privacy by Design? Examining Perceptions of Privacy Among Information Systems Designers [PDF]

open access: possibleSSRN Electronic Journal, 2014
How do information systems designers handle privacy when designing systems? How do they perceive and interpret privacy? Privacy by Design (PbD) is the idea that designers should apply technological measures that aim to address privacy concerns, applied to the very same technology that might create the privacy risk.
Arod Balissa   +6 more
openaire   +3 more sources

Privacy Oriented Software Development

2019
Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data, on ...
Baldassarre M. T.   +3 more
openaire   +3 more sources

Software and privacy: revising Orwell

IEEE Software, 1993
It is argued that employers frequently use computers as a surveillance device and a means to monitor almost every aspect of employee performance. Employers justify such conduct by asserting that this helps ensure job safety and workplace security, reduce costs and limit liability; and increase productivity, efficiency, and product quality.
openaire   +2 more sources

Commercial software, adware, and consumer privacy [PDF]

open access: possibleInternational Journal of Industrial Organization, 2013
Abstract I study the choice between selling new software commercially and bundling it with ads and distributing it for free as adware. Adware allows advertisers to send targeted information to consumers which improves their purchasing decisions, but also entails a loss of privacy.
openaire   +1 more source

Privacy-Invasive Software and Preventive Mechanisms

2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006
Computers are increasingly more integrated into peoples? daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This
Martin Boldt, Bengt Carlsson
openaire   +2 more sources

Modifications to GCC for increased software privacy

International Journal of Information and Computer Security, 2015
The paper describes methodologies added to the Gnu compiler collection GCC in an effort to create an obfuscating compiler. An obfuscating compiler creates programs which, when run, execute with the same results as un-obfuscated code, but which are more difficult to reverse engineer from the binary artefact.
openaire   +2 more sources

Software Security, Privacy, and Dependability: Metrics and Measurement

IEEE Software, 2016
Measurement of software security is an ongoing research field. Privacy is also becoming an imperative target as social networking and ubiquitous computing evolve and users exchange high volumes of personal information. However, security and privacy alone don't guarantee proper data protection; software must also be dependable.
Charalampos Manifavas   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy