Filters








52 Hits in 7.0 sec

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
This document includes details on the policy and transparency considerations of the use case, and the compliance requirements against policies (T1.3).  ...  future action would be allowed by a policy.  ...  Deliverable D1. 6 Legal requirements for a privacy-enhancing Big Data V2 exemplifies how this could potentially be done in a legally compliant way. Usage policies.  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

Qingfeng He, Annie I. Antón
2009 Information and Software Technology  
Further validation of the method was performed via an empirical study to evaluate the usefulness and effectiveness of the approach.  ...  The ReCAPS method is essentially an analysis method supported by a set of heuristics and a software tool: the Security and Privacy Requirements Analysis Tool (SPRAT).  ...  conditions, heuristics for deriving ACPs from high-level security and privacy policies) due to limitations on the scale of the study.  ... 
doi:10.1016/j.infsof.2008.11.005 fatcat:6pw6rgmdhzf6vdmd32af57sday

Privacy in pervasive environments: next generation labeling protocols

Mark S. Ackerman
2004 Personal and Ubiquitous Computing  
Recent experiences with the Platform for Privacy Preferences Project (P3P), an attempt to provide privacy mechanisms for the Web, suggest important lessons for the design of a next generation labeling  ...  In pervasive environments, privacy is likely to be a major issue for users, and users will want to be notified of potential data capture.  ...  Acknowledgements Many people have helped in my understanding both of privacy and pervasive environments.  ... 
doi:10.1007/s00779-004-0305-8 fatcat:ikrwrofntnahvgjee55ml5pbla

SYSTEMATIC ANALYSIS AND VISUALIZATION OF PRIVACY POLICIES OF ONLINE SERVICES [article]

Prashant Shantaram Dhotre
2017 PhD series, Technical Faculty of IT and Design, ˜Aalborg=ålborgœ University  
He has more than 13 years of teaching and research experience. He has authored 2 books on a subject "Theory of Computations" for UG students of Computer Engineering.  ...  As a part of his research, he has delivered several talks on "research, how to write a research proposal, how to write research papers, Use of reference manager and citation tools, etc." at Institute and  ...  On a large scale, 2,061 privacy policies were analyzed to assess requirements for readability (Massey et al., 2013) .  ... 
doi:10.5278/vbn.phd.tech.00025 fatcat:readj3cjszgjpbwq4e7x653uw4

Layering privacy on operating systems, social networks, and other platforms by design

Dawn N. Jutla
2010 Identity in the Information Society  
, and (4) use of platform network effects for increasing wide-scale user adoption of privacy services.  ...  This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided  ... 
doi:10.1007/s12394-010-0057-8 fatcat:nxco3p2nfvenvfgizcdgt6qtoe

Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements

Travis D. Breaux, Hanan Hibshi, Ashwini Rao
2013 Requirements Engineering  
We derived our methodology from an exploratory case study of the Facebook platform policy and an extended case study using privacy policies from Zynga and AOL Advertising.  ...  In this paper, we report results from multiple analysts in a literal replication study, which includes a refined methodology and set of heuristics that we used to extract privacy requirements from policy  ...  Retention requirements in P3P are categorical (no retention, stated purpose, legal requirement, business practices, and indefinite).  ... 
doi:10.1007/s00766-013-0190-7 fatcat:geu6wgt4qfbv3mlmtxpdncsp3y

Privacy and e-commerce: a consumer-centric perspective

Rhys Smith, Jianhua Shao
2007 Electronic Commerce Research  
Our study shows that historically the protection of privacy has been driven primarily both by our understanding of privacy and by the advancement of technology, analyses the limitations of privacy protections  ...  There has been much investigation into the concept of privacy, legal frameworks for protecting this most impalpable of human values and, more recently, computing technologies that help preserve an individual's  ...  P3P however has one main drawback-an e-business' P3P policy only states what their policies are, it does not ensure these policies are actually enforced.  ... 
doi:10.1007/s10660-007-9002-9 fatcat:vs253toq4zeuxinqqzaqrfjiiu

Testing Privacy Awareness [chapter]

Mike Bergmann
2009 IFIP Advances in Information and Communication Technology  
In this paper we present a test to empirically measure how the user's privacy awareness changes by presenting specific elements of the privacy policy in close proximity to the required data items.  ...  Privacy policies help to inform the user about his/her rights and to protect the user's privacy.  ...  The PrimeLife consortium members shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials  ... 
doi:10.1007/978-3-642-03315-5_18 fatcat:5cjwgkaddjcmvftthmnfcbqetu

Tolls on the Information Superhighway: Entitlement Defaults for Clickstream Data

Lee Kovarsky
2003 Virginia law review  
Defining the Market Because many accept the proposition that a state of informational privacy is a by-product of the market for information," a large subset of those who find that state undesirable may  ...  Even if a website's privacy policy is abundantly clear, no legal force guarantees the expectations it generates. 3 9 Granting a civil cause of action to the person whose expectations are disappointed does  ... 
doi:10.2307/3202424 fatcat:t7f64lf5erhf3l2x4orzdsnb2a

End-User Privacy in Human-Computer Interaction

Giovanni Iachello, Jason Hong
2007 Foundations and Trends® in Human–Computer Interaction  
This work is based on a comprehensive analysis of published academic and industrial literature spanning three decades, and on the experience of both ourselves and of many of our colleagues.  ...  Practitioners and researchers can draw upon this review when working on topics related to privacy in the context of HCI and CSCW.  ...  Support for this work was provided by the NSF Graduate Research Fellowship Program, the President of Georgia Tech, the Dean of the College of Computing of Georgia Tech, and the MacArthur Foundation through  ... 
doi:10.1561/1100000004 fatcat:scnw3n6ccnf6fj6pcpacahiori

State Regulation of Electronic Commerce

Larry E. Ribstein, Bruce H. Kobayashi
2002 Social Science Research Network  
There is a widespread belief that regulation of electronic commerce by individual states is unworkable because firms doing global business on the Internet easily can evade state regulation or, conversely  ...  It shows that regulation of electronic commerce by individual states has several advantages over federal or uniform state laws and that the problems of state regulation have been exaggerated.  ...  firms' costs of avoiding large state markets.  ... 
doi:10.2139/ssrn.294466 fatcat:3hnmtt3fp5evnohxtbzq5wtope

Privacy Issues of the W3C Geolocation API [article]

Nick Doty and Deirdre K. Mulligan and Erik Wilde
2010 arXiv   pre-print
to the API as a result of our analysis.  ...  We propose a privacy framework for the consideration of location information and use it to evaluate the W3C Geolocation API, both the specification and its use in the wild, and recommend some modifications  ...  The privacy risks of large-scale aggregation on the Web are not new: the KnowPrivacy project [14] and a study by Krishnamurthy and Wills [18] illustrate some of the possible threats.  ... 
arXiv:1003.1775v1 fatcat:aizpmck75vbrnhbkizli2uex64

Towards bridging the knowledge gap between lawyers and technologists

Rasika Dayarathna
2008 International Journal of Technology Transfer and Commercialisation  
Hence, the purpose of this study is to establish a solid foundation for building information privacy metrics by discovering some of the most critical constructs and dimensions of these metrics.  ...  Privacy is a fundamental human right. During the last decades, in the information age, information privacy has become one of the most essential aspects of privacy.  ...  The P3P Expandable Grid, which presents a privacy policy in various categories, was introduced as an alternative to plaintext privacy policy.  ... 
doi:10.1504/ijttc.2008.020695 fatcat:46borvjwwbaxfpdmtjosmmulsq

Evolution of continuing education programmes in Europe

Alex Mersel, Paulo Melo, Vjeko Jerolimov
2013 International Dental Journal  
The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private sector, and Europe's citizens  ...  It assists EU Member States in implementing relevant EU legislation and works to improve the resilience of Europe's critical information infrastructure and networks.  ...  Acknowledgements ENISA would like to thank the following people/teams for their feedback on this report: DG CONNECT team, Antonio Ramos -ISACA Madrid; ECDL; PRIPARE support action team; NIS Platform WG3  ... 
doi:10.1111/idj.12010 pmid:23410023 pmcid:PMC9374989 fatcat:ycckh24vinhabgqsnfll43rsjm

Privacy in Ubiquitous Computing [chapter]

Marc Langheinrich
2009 Ubiquitous Computing Fundamentals  
WHY A PRIVACY CHAPTER IN A UBICOMP BOOK? Privacy might indeed be an important topic, but one could argue that it would be much better suited for a text on legal or social issues.  ...  Unfortunately, privacy is such a complex issue that there is no single solution, no recipe for success, no silver bullet (or set of silver bullets) that will "fix" a system for us so that it is "privacy-safe  ...  I am also indebted to the authors and copyright holders of the various figures and images I was kindly allowed to reprint. BIBLIOGRAPHY  ... 
doi:10.1201/9781420093612.ch3 fatcat:przigdxfnbeljl2kbsn2fqiehm
« Previous Showing results 1 — 15 out of 52 results