It is well understood that processing personal data without effective data management models may lead to privacy violations. Such concerns have motivated the development of privacy-aware practices and systems, as well as legal frameworks and standards. However, there is a disconnect between policy-makers and software engineers with respect to the meaning of privacy. In addition, it is challenging: to establish that a system underlying business processes complies with its privacy requirements; to provide technical assurances; and to meet data subjects’ expectations. We propose an abstract personal data lifecycle (APDL) model to support the management and traceability of personal data. The APDL model represents data-processing activities in a...
privacy, privacy policy enforcement, automation, data governance, identity management, privacy-aware...
Privacy has not been researched or investigated from business process management perspective and the...
In this position paper, we discuss legal and technical aspects of protecting privacy using Personal ...
Concerns over data-processing activities that may lead to privacy violations or harms have motivated...
Concerns over data-processing activities that may lead to privacy violations or harms have motivated...
Personal data is increasingly positioned as a valuable asset. While individuals generate and expose ...
Purpose – In order to enhance privacy protection during electronic transactions, we propose, develop...
Purpose – In order to enhance privacy protection during electronic transactions, we propose, develop...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
The shift from a paper-based to an electronic-based society has dramatically reduced the cost of col...
The shift from a paper-based to an electronic-based society has dra-matically reduced the cost of co...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
Personal information management systems (PIMS) aka personal data stores (PDSs) represent an emerging...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
privacy, privacy policy enforcement, automation, data governance, identity management, privacy-aware...
Privacy has not been researched or investigated from business process management perspective and the...
In this position paper, we discuss legal and technical aspects of protecting privacy using Personal ...
Concerns over data-processing activities that may lead to privacy violations or harms have motivated...
Concerns over data-processing activities that may lead to privacy violations or harms have motivated...
Personal data is increasingly positioned as a valuable asset. While individuals generate and expose ...
Purpose – In order to enhance privacy protection during electronic transactions, we propose, develop...
Purpose – In order to enhance privacy protection during electronic transactions, we propose, develop...
Abstract: Protection of personal data in the Internet is already a challenge today. Users have to ac...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
The shift from a paper-based to an electronic-based society has dramatically reduced the cost of col...
The shift from a paper-based to an electronic-based society has dra-matically reduced the cost of co...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
Personal information management systems (PIMS) aka personal data stores (PDSs) represent an emerging...
The thesis considers a systematic approach to design and develop techniques for preventing personal ...
privacy, privacy policy enforcement, automation, data governance, identity management, privacy-aware...
Privacy has not been researched or investigated from business process management perspective and the...
In this position paper, we discuss legal and technical aspects of protecting privacy using Personal ...