Results 41 to 50 of about 703,183 (313)

Money for Nothing and Privacy for Free? [PDF]

open access: yes, 2011
Privacy in the context of ubiquitous social computing systems has become a major concern for the society at large. As the number of online social computing systems that collect user data grows, this privacy threat is further exacerbated.
Kaiser, Gail E.   +2 more
core   +2 more sources

Computer-Aided Identification and Validation of Privacy Requirements

open access: yesInformation, 2016
Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are ...
Rene Meis, Maritta Heisel
doaj   +1 more source

OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python

open access: yesSoftwareX, 2023
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole   +5 more
doaj   +1 more source

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

Prochlo: Strong Privacy for Analytics in the Crowd

open access: yes, 2017
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M.   +22 more
core   +1 more source

Mobile recommender apps with privacy management for accessible and usable technologies [PDF]

open access: yes, 2017
The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people.
Hersh, Marion, Leporini, Barbara
core   +1 more source

Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research

open access: yesJournal of Theoretical and Applied Electronic Commerce Research, 2021
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj   +1 more source

Computer-Aided Identification and Validation of Intervenability Requirements

open access: yesInformation, 2017
Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data.
Rene Meis, Maritta Heisel
doaj   +1 more source

Software-Defined Location Privacy Protection for Vehicular Networks [PDF]

open access: yes, 2021
While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs).
Boualouache, Abdelwahab   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy