Results 61 to 70 of about 667,722 (335)
A Taxonomy for Mining and Classifying Privacy Requirements in Issue Reports
Digital and physical footprints are a trail of user activities collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has become challenging.
Choetkiertikul, Morakot+4 more
core +1 more source
Automated Cyber and Privacy Risk Management Toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo+8 more
doaj +1 more source
developer factor in software privacy
Computer programming operates and controls our personal devices, cars, and infrastructures. These programs are written by software developers who use tools, software development platforms, and online resources to build systems used by billions of people.
openaire +4 more sources
Security and Privacy of Protocols and Software with Formal Methods [PDF]
The protection of users' data conforming to best practice and legislation is one of the main challenges in computer science. Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking. The complexity of modern systems make it impossible for software architect to create secure software that ...
Biondi, Fabrizio, Legay, Axel
openaire +5 more sources
Integrating security and privacy in software development
As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously evolving. Security of code and privacy of data must be implemented in both design and programming practice to face such scenarios.
Maria Teresa Baldassarre+3 more
openaire +3 more sources
A framework for usable end-user privacy control in social software systems
Recent studies have shown that many users struggle to properly manage selective sharing of the diverse information artefacts they deposit in social software tools.
Maryam Najafian Razavi, Denis Gillet
doaj +1 more source
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj +1 more source
ICSE2023-On Privacy Weaknesses and Vulnerabilities in Software Systems
Accepted ...
Sangaroonsilp, Pattaraporn+2 more
openaire +1 more source
A qualitative study of stakeholders' perspectives on the social network service environment [PDF]
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information.
Arazy O.+48 more
core +1 more source
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services
As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it tends to disclose personal information due to collaborative computing and transparent interactions among software as a service (SaaS ...
Changbo Ke, Zhiqiu Huang, Xiaohui Cheng
doaj +1 more source