Privacy and security are perceived as of great importance. However, readily available Privacy-Enhancing Technologies (PETs) and their development, innovation and standardization is not very forthcoming. Indeed, the dominant business model is privacy invasive: gathering and using private data as part of the business model to safeguard continuity. Meanwhile, users want their digital privacy and security safeguarded. The research strategy consists of desk research (analysing transcripts and the literature) followed by a survey to quantitatively analyse and find drivers and barriers of Privacy-Enhancing Technology adoption and diffusion. The research objective is to discover what managerial and policy recommendations can be stated in order to h...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecomm...
Trends show that privacy concerns are rising, but end users are not armed with enoughmechanisms to p...
Organizations pursuing data-driven business models (DDBM) rely on processing user data to improve an...
AbstractThis paper analyses cases where data collectors adopt privacy enhancing technologies (PETs) ...
This whitepaper provides decision-makers with insights on the benefits of Privacy Enhancing Technolo...
Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic te...
Privacy-enhancing technologies (PETs) have long been divided according to the role of trust in their...
Today’s environment of data-driven business models relies heavily on collecting as much personal dat...
Personal data are often collected and processed in a decentralized fashion, within different contex...
Part 3: Organizational and BehavioralInternational audienceToday’s environment of data-driven busine...
With the increasing use of electronic media for our daily transactions, we widely distribute our per...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
The collection of data, its analysis and the publication of insights from data promise a range of be...
Pervasive and mobile computing applications are dramatically increasing the amount of personal data ...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecomm...
Trends show that privacy concerns are rising, but end users are not armed with enoughmechanisms to p...
Organizations pursuing data-driven business models (DDBM) rely on processing user data to improve an...
AbstractThis paper analyses cases where data collectors adopt privacy enhancing technologies (PETs) ...
This whitepaper provides decision-makers with insights on the benefits of Privacy Enhancing Technolo...
Abstract. Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic te...
Privacy-enhancing technologies (PETs) have long been divided according to the role of trust in their...
Today’s environment of data-driven business models relies heavily on collecting as much personal dat...
Personal data are often collected and processed in a decentralized fashion, within different contex...
Part 3: Organizational and BehavioralInternational audienceToday’s environment of data-driven busine...
With the increasing use of electronic media for our daily transactions, we widely distribute our per...
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effectiv...
The collection of data, its analysis and the publication of insights from data promise a range of be...
Pervasive and mobile computing applications are dramatically increasing the amount of personal data ...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecomm...
Trends show that privacy concerns are rising, but end users are not armed with enoughmechanisms to p...