Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is a continuous challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem. Our aim was to focus on human aspects for designing usable crypto-based privacy-enhancing solutions. In this thesis, we followed a user centered design method by using empirical qualitative means for investigating user’s perceptions and opinions of our solutions. ...
International audiencePrivacy by design places the user's privacy and the protection of his/her pers...
People engage with multiple online services and carry out a range of different digital transactions ...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduc...
Data privacy has been growing in importance in recent years, especially with the continuous increase...
Data privacy has been growing in importance in recent years, especially with the constant increase o...
Currently, a popular topic in the ever growing world of information technology is the protection of ...
With the technological advances and the evolution of online services, user privacy is becoming a cru...
Background: Patients' privacy is regarded as essential for the patient-doctor relationship. One exam...
often must make security and privacy decisions, yet they are rarely equipped to do so. We ask users ...
Today's digital information systems and applications collect every day a huge amount of personal hea...
As a result of the ongoing digitization, people are increasingly interacting with digital data. Sinc...
This article claims that the Notice and Consent (N&C) approach is not efficient to protect the priva...
International audience—Security is one of the biggest concerns about Cloud Computing. Most issues ar...
The amount of personal identifiable information that people distribute over different online service...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities,...
International audiencePrivacy by design places the user's privacy and the protection of his/her pers...
People engage with multiple online services and carry out a range of different digital transactions ...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduc...
Data privacy has been growing in importance in recent years, especially with the continuous increase...
Data privacy has been growing in importance in recent years, especially with the constant increase o...
Currently, a popular topic in the ever growing world of information technology is the protection of ...
With the technological advances and the evolution of online services, user privacy is becoming a cru...
Background: Patients' privacy is regarded as essential for the patient-doctor relationship. One exam...
often must make security and privacy decisions, yet they are rarely equipped to do so. We ask users ...
Today's digital information systems and applications collect every day a huge amount of personal hea...
As a result of the ongoing digitization, people are increasingly interacting with digital data. Sinc...
This article claims that the Notice and Consent (N&C) approach is not efficient to protect the priva...
International audience—Security is one of the biggest concerns about Cloud Computing. Most issues ar...
The amount of personal identifiable information that people distribute over different online service...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities,...
International audiencePrivacy by design places the user's privacy and the protection of his/her pers...
People engage with multiple online services and carry out a range of different digital transactions ...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduc...