Data protection Impact Assessments (DPIA) are used to assess how well a series of design choices safeguard the privacy concerns of data subjects, but they don’t address how to analyse privacy conflicts. The challenge with current work on privacy conflict is the necessity to understand the perceived levels of sensitivity to facilitate negotiations. It is unclear how this can be achieved in DPIA procedure. In this work we introduce our model checking tool along with our method to address privacy conflict. We present our evaluation plan before concluding with our research roadmap
Connected products and applications increasingly leverage users’ personal data in their core functio...
We increasingly rely on digital services and the conveniences they provide. Processing of personal d...
Many stakeholders are involved in complex electronic services. Individuals release personal informa...
User privacy has become an important topic with strong implications for the manner by which software...
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers are oblig...
In this chapter we propose a modeling framework for assessing privacy technologies. The main contrib...
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring...
For companies that develop and operate IT applications that process the personal data of customers a...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Recent changes have increased the need for and awareness of privacy assessments. Organizations focus...
The General Data Protection Regulation (GDPR) encourages the use of Data Protection Impact Assessmen...
As the number of online services powered by personal data is growing, the technology behind those se...
An authorisation system determines who is authorised to do what i.e. it assigns privileges to users ...
A major problem for companies that develop and operate IT applications that process personal data of...
This work is concerned with user perceived privacy and how clients (which we call data subjects here...
Connected products and applications increasingly leverage users’ personal data in their core functio...
We increasingly rely on digital services and the conveniences they provide. Processing of personal d...
Many stakeholders are involved in complex electronic services. Individuals release personal informa...
User privacy has become an important topic with strong implications for the manner by which software...
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers are oblig...
In this chapter we propose a modeling framework for assessing privacy technologies. The main contrib...
Cyber Physical Systems (CPS) seamlessly integrate physical objects with technology, thereby blurring...
For companies that develop and operate IT applications that process the personal data of customers a...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Recent changes have increased the need for and awareness of privacy assessments. Organizations focus...
The General Data Protection Regulation (GDPR) encourages the use of Data Protection Impact Assessmen...
As the number of online services powered by personal data is growing, the technology behind those se...
An authorisation system determines who is authorised to do what i.e. it assigns privileges to users ...
A major problem for companies that develop and operate IT applications that process personal data of...
This work is concerned with user perceived privacy and how clients (which we call data subjects here...
Connected products and applications increasingly leverage users’ personal data in their core functio...
We increasingly rely on digital services and the conveniences they provide. Processing of personal d...
Many stakeholders are involved in complex electronic services. Individuals release personal informa...