Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

C Negri-Ribalta, M Lombard-Platet… - Requirements Engineering, 2024 - Springer
Data protection compliance is critical from a requirements engineering (RE) perspective,
both from a software development lifecycle (SDLC) perspective and regulatory compliance …

Privacy law's false promise

AE Waldman - Wash. UL Rev., 2019 - HeinOnline
Privacy laws have never seemed stronger. New international, national, state, and local laws
have been passed with the promise of greater protection for consumers. Courts across the …

Privacy by designers: software developers' privacy mindset

I Hadar, T Hasson, O Ayalon, E Toch… - Empirical Software …, 2018 - Springer
Privacy by design (PbD) is a policy measure that guides software developers to apply
inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is …

Engineering Privacy by Design: Are engineers ready to live up to the challenge?

K Bednar, S Spiekermann… - The Information Society, 2019 - Taylor & Francis
Organizations struggle to comply with legal requirements as well as customers' calls for
better data protection. On the implementation level, incorporation of privacy protections in …

Methods and tools for GDPR compliance through privacy and data protection engineering

YS Martin, A Kung - … IEEE European symposium on security and …, 2018 - ieeexplore.ieee.org
In this position paper we posit that, for Privacy by Design to be viable, engineers must be
effectively involved and endowed with methodological and technological tools closer to their …

Data privacy: From transparency to fairness

C Wu - Technology in Society, 2024 - Elsevier
In recent years, data privacy has attracted increasing public concerns, especially with public
scandals from top Internet companies, emerging over inappropriate data collection, lack of …

Desirable inefficiency

P Ohm, J Frankle - Fla. L. Rev., 2018 - HeinOnline
Computer scientists have recently begun designing systems that appear, at least at first glance,
to be surprisingly, wa Page 1 DESIRABLE INEFFICIENCY Paul Ohm* and Jonathan Frankle …

Realising the right to data portability for the domestic Internet of things

L Urquhart, N Sailaja, D McAuley - Personal and Ubiquitous Computing, 2018 - Springer
Bringing the new right to data portability (RTDP) from an abstract legal provision in Article 20
of the EU General Data Protection Regulation (GDPR) 2016 into practice requires a greater …

Ontological security, cyber technology, and states' responses

A Lupovici - European Journal of International Relations, 2023 - journals.sagepub.com
How do interactions in the cyber domain affect states' ontological security and how do states
respond to these challenges? These are pertinent questions given the increasing influence …

Understanding developers' privacy and security mindsets via climate theory

R Arizon-Peretz, I Hadar, G Luria… - Empirical Software …, 2021 - Springer
Privacy and security by design are policy measures that guide software developers to
engineer privacy and security solutions inherently into the software systems they develop …