peer-reviewedApplications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy concerns. Partly, this is due to frequently changing context that introduces new privacy threats, and makes it difficult to continuously satisfy privacy requirements. To address this problem, applications may need to adapt in order to manage changing privacy concerns. Thus, we propose a framework that exploits the notion of privacy awareness requirements to identify runtime privacy properties to satisfy. These properties are used to support disclosure decision making by applications. Our evaluations...
[Context and motivation] Ensuring privacy of users’ data has become a top concern in software develo...
Data privacy when using online systems like Facebook and Amazon has become an increasingly popular t...
Privacy policies are widely used to draw clear image of risks to users’ personal information in diff...
Applications that continuously gather and disclose personal information about users are increasingly...
—Modern distributed software platforms are linking smart objects such as smartphones, cars and heal...
In networked computing environments, it becomes increasingly difficult for normal people to manage pr...
Privacy requirements for mobile applications offer a distinct set of challenges for requirements eng...
peer-reviewedIn a dynamic environment where context changes frequently, users’ privacy requirements...
In this paper, we propose a model that could be used by system developers to measure the perceived p...
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from ...
Ubiquitous software systems (online shopping, social networking apps) today collect, store and proce...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
and other research outputs Engineering adaptive privacy: on the role of privacy awareness requiremen...
As mobile computing applications have become commonplace, it is increasingly important for them to a...
Software development produces large amounts of data both from the process, as well as the usage of t...
[Context and motivation] Ensuring privacy of users’ data has become a top concern in software develo...
Data privacy when using online systems like Facebook and Amazon has become an increasingly popular t...
Privacy policies are widely used to draw clear image of risks to users’ personal information in diff...
Applications that continuously gather and disclose personal information about users are increasingly...
—Modern distributed software platforms are linking smart objects such as smartphones, cars and heal...
In networked computing environments, it becomes increasingly difficult for normal people to manage pr...
Privacy requirements for mobile applications offer a distinct set of challenges for requirements eng...
peer-reviewedIn a dynamic environment where context changes frequently, users’ privacy requirements...
In this paper, we propose a model that could be used by system developers to measure the perceived p...
There have been concerting policy and legal initiatives to mitigate the privacy harm resulting from ...
Ubiquitous software systems (online shopping, social networking apps) today collect, store and proce...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
and other research outputs Engineering adaptive privacy: on the role of privacy awareness requiremen...
As mobile computing applications have become commonplace, it is increasingly important for them to a...
Software development produces large amounts of data both from the process, as well as the usage of t...
[Context and motivation] Ensuring privacy of users’ data has become a top concern in software develo...
Data privacy when using online systems like Facebook and Amazon has become an increasingly popular t...
Privacy policies are widely used to draw clear image of risks to users’ personal information in diff...