Results 31 to 40 of about 667,722 (335)

Comprehensive quantitative analysis on privacy leak behavior. [PDF]

open access: yesPLoS ONE, 2013
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security.
Lejun Fan   +5 more
doaj   +1 more source

Towards a privacy debt

open access: yesIET Software, 2021
This study argues the difference between security and privacy and outlines the concept of Privacy Debt as a new Technical Debt. Privacy is gaining momentum in any software system due to mandatory compliance with respect to laws and regulations. There are
Xabier Larrucea   +2 more
doaj   +1 more source

On Privacy Weaknesses and Vulnerabilities in Software Systems

open access: yes2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 2023
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting vulnerabilities found in those software applications.
Sangaroonsilp, Pattaraporn   +2 more
openaire   +3 more sources

VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis

open access: yesMachine Learning and Knowledge Extraction, 2022
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan   +5 more
doaj   +1 more source

Multiple sclerosis clinical decision support system based on projection to reference datasets

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1863-1873, December 2022., 2022
Abstract Objective Multiple sclerosis (MS) is a multifactorial disease with increasingly complicated management. Our objective is to use on‐demand computational power to address the challenges of dynamically managing MS. Methods A phase 3 clinical trial data (NCT00906399) were used to contextualize the medication efficacy of peg‐interferon beta‐1a vs ...
Chadia Ed‐driouch   +13 more
wiley   +1 more source

Ethics in Software Engineering: Privacy

open access: goldInternational Journal of Science and Research (IJSR)
Prasanth Yadla
openalex   +2 more sources

The anterior nucleus of the thalamus plays a role in the epileptic network

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 2010-2024, December 2022., 2022
Abstract Objectives We investigated both the metabolic differences and interictal/ictal discharges of the anterior nucleus of the thalamus (ANT) in patients with epilepsy to clarify the relationship between the ANT and the epileptic network. Methods Nineteen patients with drug‐resistant epilepsy who underwent stereoelectroencephalography were studied ...
Hao Yan   +9 more
wiley   +1 more source

Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]

open access: yesColombo Business Journal, 2023
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj   +1 more source

A Privacy Awareness System for Software Design [PDF]

open access: yesInternational Journal of Software Engineering and Knowledge Engineering, 2019
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology.
Omoronyia, Inah   +2 more
openaire   +2 more sources

Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices [PDF]

open access: yes, 2022
Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems. For that, software practitioners and other stakeholders in software companies need to work cooperatively toward building privacy ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy