[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 16, Issue 1March 2011Special Issue on Digital privacy: theory, policies and technologies
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Table Of Content Section
article
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic, effective methodologies exist that deal with privacy ...

article
Commitment analysis to operationalize software requirements from privacy policies

Online privacy policies describe organizations’ privacy practices for collecting, storing, using, and protecting consumers’ personal information. Users need to understand these policies in order to know how their personal information is being collected, ...

article
The “Panopticon” of search engines: the response of the European data protection framework

Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise. ...

article
A methodology for security assurance-driven system development

In this work, we introduce an assurance methodology that integrates assurance case creation with system development. It has been developed in order to provide trust and privacy assurance to the evolving European project PICOS (Privacy and Identity ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.