Results 61 to 70 of about 667,722 (335)

A Taxonomy for Mining and Classifying Privacy Requirements in Issue Reports

open access: yes, 2021
Digital and physical footprints are a trail of user activities collected over the use of software applications and systems. As software becomes ubiquitous, protecting user privacy has become challenging.
Choetkiertikul, Morakot   +4 more
core   +1 more source

Automated Cyber and Privacy Risk Management Toolkit

open access: yesSensors, 2021
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo   +8 more
doaj   +1 more source

developer factor in software privacy

open access: yes, 2021
Computer programming operates and controls our personal devices, cars, and infrastructures. These programs are written by software developers who use tools, software development platforms, and online resources to build systems used by billions of people.
openaire   +4 more sources

Security and Privacy of Protocols and Software with Formal Methods [PDF]

open access: yes, 2016
The protection of users' data conforming to best practice and legislation is one of the main challenges in computer science. Very often, large-scale data leaks remind us that the state of the art in data privacy and anonymity is severely lacking. The complexity of modern systems make it impossible for software architect to create secure software that ...
Biondi, Fabrizio, Legay, Axel
openaire   +5 more sources

Integrating security and privacy in software development

open access: yesSoftware Quality Journal, 2020
As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously evolving. Security of code and privacy of data must be implemented in both design and programming practice to face such scenarios.
Maria Teresa Baldassarre   +3 more
openaire   +3 more sources

A framework for usable end-user privacy control in social software systems

open access: yesEAI Endorsed Transactions on Security and Safety, 2011
Recent studies have shown that many users struggle to properly manage selective sharing of the diverse information artefacts they deposit in social software tools.
Maryam Najafian Razavi, Denis Gillet
doaj   +1 more source

Emotional responses and behavioral coping mechanism to sufferers′ privacy leakage among Chinese internet users during public health emergencies

open access: yesZhongguo gonggong weisheng, 2022
ObjectiveTo study emotional reactions to and behavior intentions about sufferers′ privacy leakage among internet users in China during public health emergencies (PHE) and to provide references for improving government supervision capability and risk ...
Zhi-xin LIU, Jun-ping LIU, Ming-lei SUN
doaj   +1 more source

ICSE2023-On Privacy Weaknesses and Vulnerabilities in Software Systems

open access: yes, 2023
Accepted ...
Sangaroonsilp, Pattaraporn   +2 more
openaire   +1 more source

A qualitative study of stakeholders' perspectives on the social network service environment [PDF]

open access: yes, 2014
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information.
Arazy O.   +48 more
core   +1 more source

Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services

open access: yesIEEE Access, 2017
As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it tends to disclose personal information due to collaborative computing and transparent interactions among software as a service (SaaS ...
Changbo Ke, Zhiqiu Huang, Xiaohui Cheng
doaj   +1 more source

Home - About - Disclaimer - Privacy