In this chapter we propose a modeling framework for assessing privacy technologies. The main contribution of the framework is that it allows us to model aspects of privacy and related system concerns (such as security and scalability) in a more comprehensive manner than the dataflow diagrams traditionally used for privacy analysis. The feature interaction perspective taken in the chapter allows us to reason about conflicts between a service user's model of how the service works and its actual implementation. In our modeling framework such conflicts can be modeled in terms of goal conflicts and service deployment. Goal conflicts allow us to reflect conflicting points of view on system concerns (primarily privacy and security) among the diffe...
Purpose - Concerns over data-processing activities that may lead to privacy violations or harms have...
Security issues for software systems ultimately concern relationships among social actors-stakeholde...
This paper presents a formal approach for the analysis of privacy properties of complex electronic s...
Many stakeholders are involved in complex electronic services. Individuals release personal informa...
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers are oblig...
Data protection Impact Assessments (DPIA) are used to assess how well a series of design choices saf...
Abstract: Online services are becoming increasingly data-centric; they collect, process, analyze and...
Ready or not, the digitalization of information has come, and privacy is standing out there, possibl...
With the growth of Internet in many different aspects of life, users are required to share private i...
This paper provides an assessment framework for privacy policies of Internet of Things Services whic...
Abstract: In a smart grid, data and information are transported, transmitted, stored, and processed ...
To ensure that patient confidentiality is securely maintained, health ICT applications that contain ...
Advanced information processing technologies are often applied to large profiles and result in detai...
Social networking sites (SNSs) are facing a challenge – to manage the privacy concerns expressed by ...
The increasing dependency on information systems to process and manage sensitive information require...
Purpose - Concerns over data-processing activities that may lead to privacy violations or harms have...
Security issues for software systems ultimately concern relationships among social actors-stakeholde...
This paper presents a formal approach for the analysis of privacy properties of complex electronic s...
Many stakeholders are involved in complex electronic services. Individuals release personal informa...
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers are oblig...
Data protection Impact Assessments (DPIA) are used to assess how well a series of design choices saf...
Abstract: Online services are becoming increasingly data-centric; they collect, process, analyze and...
Ready or not, the digitalization of information has come, and privacy is standing out there, possibl...
With the growth of Internet in many different aspects of life, users are required to share private i...
This paper provides an assessment framework for privacy policies of Internet of Things Services whic...
Abstract: In a smart grid, data and information are transported, transmitted, stored, and processed ...
To ensure that patient confidentiality is securely maintained, health ICT applications that contain ...
Advanced information processing technologies are often applied to large profiles and result in detai...
Social networking sites (SNSs) are facing a challenge – to manage the privacy concerns expressed by ...
The increasing dependency on information systems to process and manage sensitive information require...
Purpose - Concerns over data-processing activities that may lead to privacy violations or harms have...
Security issues for software systems ultimately concern relationships among social actors-stakeholde...
This paper presents a formal approach for the analysis of privacy properties of complex electronic s...