Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

Addressing legal requirements in requirements engineering

PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …

User perceptions of smart home IoT privacy

S Zheng, N Apthorpe, M Chetty… - Proceedings of the ACM on …, 2018 - dl.acm.org
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …

Consumer privacy and the future of data-based innovation and marketing

A Bleier, A Goldfarb, C Tucker - International Journal of Research in …, 2020 - Elsevier
Digitization makes it easier for firms to build their innovation and marketing efforts around
consumers' personal data. In this research, we employ a privacy perspective based on …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Privacy-enhancing technology and everyday augmented reality: Understanding bystanders' varying needs for awareness and consent

J O'Hagan, P Saeghe, J Gugenheimer… - Proceedings of the …, 2023 - dl.acm.org
Fundamental to Augmented Reality (AR) headsets is their capacity to visually and aurally
sense the world around them, necessary to drive the positional tracking that makes …

A design space for privacy choices: Towards meaningful privacy control in the internet of things

Y Feng, Y Yao, N Sadeh - Proceedings of the 2021 CHI Conference on …, 2021 - dl.acm.org
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …

A contextual approach to privacy online

H Nissenbaum - Daedalus, 2011 - direct.mit.edu
Recent media revelations have demonstrated the extent of third-party tracking and
monitoring online, much of it spurred by data aggregation, profiling, and selective targeting …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arxiv preprint arxiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing

J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist… - Proceedings of the 2012 …, 2012 - dl.acm.org
Smartphone security research has produced many useful tools to analyze the privacy-
related behaviors of mobile apps. However, these automated tools cannot assess people's …