Results 41 to 50 of about 643,939 (333)

OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python

open access: yesSoftwareX, 2023
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole   +5 more
doaj   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Prochlo: Strong Privacy for Analytics in the Crowd

open access: yes, 2017
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M.   +22 more
core   +1 more source

Mobile recommender apps with privacy management for accessible and usable technologies [PDF]

open access: yes, 2017
The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people.
Hersh, Marion, Leporini, Barbara
core   +1 more source

Privacy in Social Software

open access: yes, 2011
While using social software and interacting with others on the Internet, users share a lot of information about themselves. An important issue for these users is maintaining control over their own personal data and being aware to whom which data is disclosed. In this chapter, we present specific requirements and realised solutions to these problems for
Filipe Beato   +4 more
openaire   +3 more sources

Computer-Aided Identification and Validation of Intervenability Requirements

open access: yesInformation, 2017
Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data.
Rene Meis, Maritta Heisel
doaj   +1 more source

Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research

open access: yesJournal of Theoretical and Applied Electronic Commerce Research, 2021
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj   +1 more source

developer factor in software privacy

open access: yes, 2021
Computer programming operates and controls our personal devices, cars, and infrastructures. These programs are written by software developers who use tools, software development platforms, and online resources to build systems used by billions of people.
openaire   +4 more sources

Integrating security and privacy in software development

open access: yesSoftware Quality Journal, 2020
As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously evolving. Security of code and privacy of data must be implemented in both design and programming practice to face such scenarios.
Maria Teresa Baldassarre   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy