Results 31 to 40 of about 3,580,379 (342)
The recent success of deep neural networks is attributed in part to large-scale well-labeled training data. However, with the ever-increasing size of modern datasets, combined with the difficulty of obtaining label information, semi-supervised learning ...
Xiaotao Wei+4 more
doaj +1 more source
Comprehensive quantitative analysis on privacy leak behavior. [PDF]
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security.
Lejun Fan+5 more
doaj +1 more source
Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges
Software development teams are responsible for making and implementing software design decisions that directly impact end-user privacy, a challenging task to do well.
Mohammad Tahaei, Alisa Frik, Kami Vaniea
semanticscholar +1 more source
On Privacy Weaknesses and Vulnerabilities in Software Systems
In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting vulnerabilities found in those software applications.
Sangaroonsilp, Pattaraporn+2 more
openaire +3 more sources
This study argues the difference between security and privacy and outlines the concept of Privacy Debt as a new Technical Debt. Privacy is gaining momentum in any software system due to mandatory compliance with respect to laws and regulations. There are
Xabier Larrucea+2 more
doaj +1 more source
VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan+5 more
doaj +1 more source
Ethics in Software Engineering: Privacy
Prasanth Yadla
openalex +2 more sources
Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study [PDF]
Fahimeh Ebrahimi+2 more
openalex +3 more sources
A Privacy Awareness System for Software Design [PDF]
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from badly designed software technology. But one main challenge to realizing these initiatives is the difficulty in translating proposed principles and regulations into concrete and verifiable evidence in technology.
Omoronyia, Inah+2 more
openaire +2 more sources
Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj +1 more source