On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea +3 more
core +1 more source
Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj +1 more source
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel +3 more
core +2 more sources
Privacy, Software and Insurance
This paper deals with the use of software in insurance production and distribution considering the privacy issues that can arise. With regards to those uses, we will first consider the use of software in distribution that is needed to better perform the compliance with the regulations in insurance distribution (submission of information documents ...
openaire +2 more sources
A qualitative study of stakeholders' perspectives on the social network service environment [PDF]
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information.
Arazy O. +48 more
core +1 more source
A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution
As people have become more and more connected, there are certain scenarios where items need to be recommended to groups of users rather than individual user, which motivate studies on group recommender systems (GRSs).
Zhiwei Guo +4 more
doaj +1 more source
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph +4 more
core +3 more sources
Children's data and privacy online: Growing up in a digital age [PDF]
Adolescents in the age of technology face a variety of security issues, but one of the most significant ones, that needs to be addressed by legislators, is privacy and data protection.
Domazet Siniša S. +1 more
doaj +1 more source
Retaining Expression on De-identified Faces [PDF]
© Springer International Publishing AG 2017The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents.
AK Ho +18 more
core +3 more sources
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions [PDF]
To be published in "IEEE Security & Privacy: Special Issue on Usable Security for Security Workers" 11 pages, 4 ...
Mohammad Tahaei +2 more
openaire +4 more sources

