Privacy in mobile technology for personal healthcare
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …
survey, we examine the privacy requirements of mobile computing technologies that have …
Addressing legal requirements in requirements engineering
PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …
requirements engineering and system development. Monitoring systems for requirements …
User perceptions of smart home IoT privacy
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …
households including Internet-connected devices that continuously monitor user activities. In …
Consumer privacy and the future of data-based innovation and marketing
Digitization makes it easier for firms to build their innovation and marketing efforts around
consumers' personal data. In this research, we employ a privacy perspective based on …
consumers' personal data. In this research, we employ a privacy perspective based on …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Privacy-enhancing technology and everyday augmented reality: Understanding bystanders' varying needs for awareness and consent
Fundamental to Augmented Reality (AR) headsets is their capacity to visually and aurally
sense the world around them, necessary to drive the positional tracking that makes …
sense the world around them, necessary to drive the positional tracking that makes …
A design space for privacy choices: Towards meaningful privacy control in the internet of things
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …
considerable user-centered research on providing effective privacy notices but not enough …
A contextual approach to privacy online
H Nissenbaum - Daedalus, 2011 - direct.mit.edu
Recent media revelations have demonstrated the extent of third-party tracking and
monitoring online, much of it spurred by data aggregation, profiling, and selective targeting …
monitoring online, much of it spurred by data aggregation, profiling, and selective targeting …
Privacy and data protection by design-from policy to engineering
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
Smartphone security research has produced many useful tools to analyze the privacy-
related behaviors of mobile apps. However, these automated tools cannot assess people's …
related behaviors of mobile apps. However, these automated tools cannot assess people's …