Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Senarath, Awanthika"'
Publikováno v:
The 52nd Hawaii International Conference on System Sciences (HICSS), 2019
In this paper, we propose a model that could be used by system developers to measure the privacy risk perceived by users when they disclose data into software systems. We first derive a model to measure the perceived privacy risk based on existing kn
Externí odkaz:
http://arxiv.org/abs/1809.10884
Data Minimization (DM) is a privacy practice that requires minimizing the use of user data in software systems. However, continuous privacy incidents that compromise user data suggest that the requirements of DM are not adequately implemented in soft
Externí odkaz:
http://arxiv.org/abs/1808.01479
Publikováno v:
22nd International Conference on Evaluation and Assessment in Software Engineering, 2018
Pervasive use of software applications continues to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear in- structions for software developers to embed privacy in
Externí odkaz:
http://arxiv.org/abs/1805.09485
Publikováno v:
Australasian Conference on Information Systems, 2017, Hobart, Australia
End user privacy is a critical concern for all organizations that collect, process and store user data as a part of their business. Privacy concerned users, regulatory bodies and privacy experts continuously demand organizations provide users with pr
Externí odkaz:
http://arxiv.org/abs/1710.03890
Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy an
Externí odkaz:
http://arxiv.org/abs/1703.09847
In this paper, we describe ongoing work that focuses on improving the strength of the answers to security questions. The ultimate goal of the proposed research is to evaluate the possibility of nudging users towards strong answers for ubiquitous secu
Externí odkaz:
http://arxiv.org/abs/1701.03229
Publikováno v:
In Computers & Security November 2019 87
Publikováno v:
In Telematics and Informatics October 2018 35(7):1845-1862
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Senarath, Awanthika
Ubiquitous software systems (online shopping, social networking apps) today collect, store and process user data, such as user’s name, age, credit card number and location. If these systems collect unnecessary data, and store and share data without
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d386b70ad96ad95cdb1fbda973347330