Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …
organizations must guarantee users' privacy by protecting personal data. There are several …
Awareness requirement and performance management for adaptive systems: a survey
Self-adaptive software can assess and modify its behavior when the assessment indicates
that the program is not performing as intended or when improved functionality or …
that the program is not performing as intended or when improved functionality or …
Blockchain-based ontology driven reference framework for security risk management
Security risk management (SRM) is crucial for protecting valuable assets from malicious
harm. While blockchain technology has been proposed to mitigate security threats in …
harm. While blockchain technology has been proposed to mitigate security threats in …
Optimal event log sanitization for privacy-preserving process mining
Event logs that originate from information systems enable comprehensive analysis of
business processes. These logs serve as the starting point for the discovery of process …
business processes. These logs serve as the starting point for the discovery of process …
Systematic map** study on requirements engineering for regulatory compliance of software systems
Context: As the diversity and complexity of regulations affecting Software-Intensive Products
and Services (SIPS) is increasing, software engineers need to address the growing …
and Services (SIPS) is increasing, software engineers need to address the growing …
Integrated identity and access management metamodel and pattern system for secure enterprise architecture
K Nahar, AQ Gill - Data & Knowledge Engineering, 2022 - Elsevier
Identity and access management (IAM) is one of the key components of the secure
enterprise architecture for protecting the digital assets of the information systems. The …
enterprise architecture for protecting the digital assets of the information systems. The …
Designing intelligent agents in normative systems toward data regulation representation
Personal data protection regulation plays an important role in defining the rights and
obligations of the agents involved in processing personal data (ie, data subjects, controllers …
obligations of the agents involved in processing personal data (ie, data subjects, controllers …
Towards privacy-aware exploration of archived personal emails
This paper examines how privacy measures, such as anonymisation and aggregation
processes for email collections, can affect the perceived usefulness of email visualisations …
processes for email collections, can affect the perceived usefulness of email visualisations …
An approach to formal desription of the user notification scenarios in privacy policies
M Kuznetsov, E Novikova… - 2022 30th Euromicro …, 2022 - ieeexplore.ieee.org
Nowadays the collection and usage of users' personal data have become an extremely
common scenario. The users actively provide their personal data to customize or improve …
common scenario. The users actively provide their personal data to customize or improve …
Privacy and informational self-determination through informed consent: the way forward
M Gharib - European Symposium on Research in Computer …, 2021 - Springer
Abstract “I have read and agree to the Privacy Policy”. This can be described as one of the
biggest lies in the current times, and that is all what a service provider needs to acquire what …
biggest lies in the current times, and that is all what a service provider needs to acquire what …