Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Alexandra Michota"'
Autor:
Alexandra Michota, Nineta Polemi
Publikováno v:
2022 IEEE International Conference on Cyber Security and Resilience (CSR).
Autor:
Jlenia Puma, Julien Mascolo, Sofoklis Efremidis, Eleni-Maria Kalogeraki, Fabio De Donato, Cristiano Casadei, Danijela Boberic Krsticev, Alexandra Michota, Nineta Polemi, Nikos Argyropoulos, Manolis Chatzimpyrros, Haralambos Mouratidis, Gregory Chrysos, Farhan Sahito, Pablo Giménez Salazar, Norma Zanetti, Sophia Karagiorgou
The objective of this deliverable is to report the results of the activities performed in the first phase of CYRENE’s Work Package 2. The main output is related to the requirements that have been collected from relevant standards and literature rev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a44a592146cdc9d789159c663053662
Publikováno v:
Computer Law & Security Review. 34:1247-1257
The recent enforcement of the GDPR has put extra burdens to data controllers operating within the EU. Beyond other challenges, the exercise of the Right to be Forgotten by individuals who request erasure of their personal information has also become
Autor:
Alexandra Michota
Η ιδιωτικότητα των διαμοιραζόμενων δεδομένων δε θεωρείται δεδομένη για τα ενεργά μέλη στις πλατφόρμες κοινωνικής δικτύωσης. Συνδυασμο
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::705f6d824777cc4570fa467b8f94cb0e
https://dione.lib.unipi.gr/xmlui/handle/unipi/10915
https://dione.lib.unipi.gr/xmlui/handle/unipi/10915
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319711164
e-Democracy
e-Democracy
Empirical privacy evaluation in OSNs may provide a better under standing of the effectiveness and the efficiency of the default privacy controls and those customized by the users. Proper user perception of the privacy risk could restrict possible pri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::815759c651a8f45eaa0970cc80bd6402
https://doi.org/10.1007/978-3-319-71117-1_5
https://doi.org/10.1007/978-3-319-71117-1_5
Publikováno v:
International Journal of Information Privacy, Security and Integrity
The privacy policies of online social network (OSN) service providers are criticised as falling short of satisfying their users’ privacy expectations letting huge quantities of their personally identifiable information (PII) exposed to unknown audi
Publikováno v:
Panhellenic Conference on Informatics
High-quality privacy policies can form the basis for verifiable automated access decisions in Online Social Networks (OSNs). The aim of the privacy policies is to provide direction and support for data privacy in accordance with user requirements and
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319203690
WISE Workshops
WISE Workshops
Sharing personal information in online social networks can be risky, considering that unauthorized users can get access to this information and use it for purposes other than those intended to by the data subjects or those specified by the privacy po
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7f08b83b6042383cdfc39deacfc29de8
https://doi.org/10.1007/978-3-319-20370-6_6
https://doi.org/10.1007/978-3-319-20370-6_6
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319271637
e-Democracy
e-Democracy
Tagged information in Online Social Networks (OSNs) is considered to be the basis of the semantic network that connects online resources based on their characteristics, and not only their URLs. The semantic interoperability creates difficulties in en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::484dad2bde55c394f0128cf97271d425
https://doi.org/10.1007/978-3-319-27164-4_7
https://doi.org/10.1007/978-3-319-27164-4_7
Publikováno v:
International Journal of Electronic Governance. 9:343
Tagging services in online social networks (OSNs) allow users to connect online resources based on their characteristics in addition to their uniform resource locators (URLs). The semantic interoperability creates authorisation conflicts when accessi