Results 61 to 70 of about 3,580,379 (342)

"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts

open access: yesProceedings on Privacy Enhancing Technologies
To ensure data-privacy compliance, it is common for companies to consult privacy experts for the identification and communication of privacy requirements to software developers.
Stefan Albert Horstmann   +6 more
semanticscholar   +1 more source

Automated Cyber and Privacy Risk Management Toolkit

open access: yesSensors, 2021
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo   +8 more
doaj   +1 more source

developer factor in software privacy

open access: yes, 2021
Computer programming operates and controls our personal devices, cars, and infrastructures. These programs are written by software developers who use tools, software development platforms, and online resources to build systems used by billions of people.
openaire   +4 more sources

ICSE2023-On Privacy Weaknesses and Vulnerabilities in Software Systems

open access: yes, 2023
Accepted ...
Sangaroonsilp, Pattaraporn   +2 more
openaire   +1 more source

Money for Nothing and Privacy for Free? [PDF]

open access: yes, 2011
Privacy in the context of ubiquitous social computing systems has become a major concern for the society at large. As the number of online social computing systems that collect user data grows, this privacy threat is further exacerbated.
Kaiser, Gail E.   +2 more
core   +2 more sources

A framework for usable end-user privacy control in social software systems

open access: yesEAI Endorsed Transactions on Security and Safety, 2011
Recent studies have shown that many users struggle to properly manage selective sharing of the diverse information artefacts they deposit in social software tools.
Maryam Najafian Razavi, Denis Gillet
doaj   +1 more source

Emotional responses and behavioral coping mechanism to sufferers′ privacy leakage among Chinese internet users during public health emergencies

open access: yesZhongguo gonggong weisheng, 2022
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj   +1 more source

Peeling Back the Student Privacy Pledge [PDF]

open access: yes, 2017
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data.
Pfeffer-Gillett, Alexi
core   +3 more sources

Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services

open access: yesIEEE Access, 2017
As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it tends to disclose personal information due to collaborative computing and transparent interactions among software as a service (SaaS ...
Changbo Ke, Zhiqiu Huang, Xiaohui Cheng
doaj   +1 more source

Construction of geriatric hypoalbuminemia predicting model for hypoalbuminemia patients with and without pneumonia and explainability analysis

open access: yesFrontiers in Medicine
Background and objectivesPneumonia portrays a critical health concern in geriatrics. Geriatric pneumonia can lead to changes on other complications, in which hypoalbuminemia is a common complication.
Ziqi Liu   +17 more
doaj   +1 more source

Home - About - Disclaimer - Privacy