Internet of Things (IoT) applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complying with regulations. One key reason is that, at times, regulations are vague, and could be challenging to extract and enact such legal requirements. In our research paper, we have conducted a systematic analysis of the data protection laws that are used across different continents, namely: (i) General Data Protection Regulations (GDPR), (ii) the Pe...
Internet of Things (IoT) systems are designed and developed either as standalone applications from t...
Internet of Things (IoT) applications typically collect and analyse personal data that can be used t...
Internet of Things (IoT) applications typically collect and analyse personal data that is categorise...
Internet of Things (IoT) applications have the potential to derive sensitive information about indiv...
Internet of Things (IoT) applications have the potential to derive sensitive information about indiv...
Internet of Things applications have the potential to derive sensitive information about individuals...
From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-ed...
Internet of Things (IoT) applications typically collect and analyse personal data that can be used t...
Doctoral Degree. University of KwaZulu-Natal, Durban.The dissertation presents a comparative deskto...
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks h...
The EU’s General Data Protection Regulation (GDPR) has recently come into effect and insofar as IoT ...
Internet of things (IoT) applications (apps) are challenging to design because of their heterogeneou...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduc...
People are interacting with online systems all the time. In order to use the services being provided...
The Internet of Things’ potential for major privacy invasion is a concern. This paper reports on a s...
Internet of Things (IoT) systems are designed and developed either as standalone applications from t...
Internet of Things (IoT) applications typically collect and analyse personal data that can be used t...
Internet of Things (IoT) applications typically collect and analyse personal data that is categorise...
Internet of Things (IoT) applications have the potential to derive sensitive information about indiv...
Internet of Things (IoT) applications have the potential to derive sensitive information about indiv...
Internet of Things applications have the potential to derive sensitive information about individuals...
From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-ed...
Internet of Things (IoT) applications typically collect and analyse personal data that can be used t...
Doctoral Degree. University of KwaZulu-Natal, Durban.The dissertation presents a comparative deskto...
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks h...
The EU’s General Data Protection Regulation (GDPR) has recently come into effect and insofar as IoT ...
Internet of things (IoT) applications (apps) are challenging to design because of their heterogeneou...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduc...
People are interacting with online systems all the time. In order to use the services being provided...
The Internet of Things’ potential for major privacy invasion is a concern. This paper reports on a s...
Internet of Things (IoT) systems are designed and developed either as standalone applications from t...
Internet of Things (IoT) applications typically collect and analyse personal data that can be used t...
Internet of Things (IoT) applications typically collect and analyse personal data that is categorise...