Academic literature on the topic 'Privacy design'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy design.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy design"
Galindo Q, July. "Privacy by design. Implementing privacy as a good business decision." Revista de Derecho, Comunicaciones y Nuevas Tecnologías 12 (December 18, 2014): 1–24. http://dx.doi.org/10.15425/redecom.12.2014.11.
Full textSchaar, Peter. "Privacy by Design." Identity in the Information Society 3, no. 2 (April 1, 2010): 267–74. http://dx.doi.org/10.1007/s12394-010-0055-x.
Full textShapiro, Stuart S. "Privacy by design." Communications of the ACM 53, no. 6 (June 2010): 27–29. http://dx.doi.org/10.1145/1743546.1743559.
Full textKipker, Dennis-Kenji. "Privacy by Default und Privacy by Design." Datenschutz und Datensicherheit - DuD 39, no. 6 (May 2015): 410. http://dx.doi.org/10.1007/s11623-015-0438-0.
Full textAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (January 2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v6.854.
Full textAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v8.854.
Full textLavallee, Tim, and Kenneth Good. "Speech privacy in design: A cost‐privacy analysis." Journal of the Acoustical Society of America 119, no. 5 (May 2006): 3351. http://dx.doi.org/10.1121/1.4786474.
Full textCACM Staff. "Operationalizing privacy by design." Communications of the ACM 55, no. 9 (September 2012): 7. http://dx.doi.org/10.1145/2330667.2330669.
Full textDuncan, G. "ENGINEERING: Privacy By Design." Science 317, no. 5842 (August 31, 2007): 1178–79. http://dx.doi.org/10.1126/science.1143464.
Full textPai, Mallesh M., and Aaron Roth. "Privacy and mechanism design." ACM SIGecom Exchanges 12, no. 1 (June 2013): 8–29. http://dx.doi.org/10.1145/2509013.2509016.
Full textDissertations / Theses on the topic "Privacy design"
Alhussein, Nawras. "Privacy by Design & Internet of Things: managing privacy." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20590.
Full textPrivacy means the right to be left alone. It has been questioned many times if privacy really exists on the internet, especially in Internet of Things systems or smart systems as they are also called. More questions occur when the new general data protection regulation (GDPR) within the European Union applies in May. In this paper privacy by design that the general data protection regulation comes with is being studied. This study answers whether privacy by design will be able to increase the protection of privacy in Internet of Things systems. Advantages and disadvantages are also addressed and how companies and common users are affected by the implementation of privacy by design. The question has been answered by a literature review and two interviews. It turned out that a significant part of the problems in Internet of Things regarding privacy may be solved by data management. The privacy by design includes protection of data in all states through different methods such as encryption. In this way, privacy by design contributes to increased security within Internet of Things system.
Iachello, Giovanni. "Privacy and Proportionality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10487.
Full textWITTE, NATHAN ALLAN. "PRIVACY: ARCHITECTURE IN SUPPORT OF PRIVACY REGULATION." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1053701814.
Full textSpiekermann-Hoff, Sarah. "The Challenges of Privacy by Design." The Association for Computing Machinery, 2012. http://dx.doi.org/10.1145/2209249.2209263.
Full textIslam, Mohammad Badiul. "Privacy by design for social networks." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71389/1/Mohammad%20Badiul_Islam_Thesis.pdf.
Full textFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Full textFloderus, Sebastian, and Vincent Tewolde. "Analysing privacy concerns in smartcameras : in correlation with GDPR and Privacy by Design." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21980.
Full textRipmann, Nina. "User Interface Design for Privacy Enhancing Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18731.
Full textSimmingsköld, Carl. "Privacy by Design : Inbyggd integritet i patientjournaler." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8331.
Full textSegal, Aaron. "Design and Implementation of Privacy-Preserving Surveillance." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584958.
Full textThe modern internet and phone networks offer very little security, privacy, or accountability to their users. As people conduct their business and social lives online and over the phone, they naturally generate private or sensitive data about themselves. But any number of parties can and do track this data. Not only the services people interact with everyday, but third-party services for ad tracking, malicious hackers, government agencies operating with nebulous legal authority, and service providers themselves can and do observe and track users. They can then use the sensitive data in a variety of objectionable ways.
Changing this state of affairs without an earth-shattering technological breakthrough may appear to be a hopeless situation. But, in this dissertation, we demonstrate how existing technology can, if deployed and used properly, markedly improve privacy for users and accountability for those collecting data. We discuss two techniques for achieving these improvements: privacy-preserving surveillance and anonymous communication. For each technique, we present example protocols for which we have implemented fast prototypes running on commercial hardware.
First, we define the notion of privacy-preserving surveillance. Currently, a government agency can collect and examine bulk user data while making no distinction between the legitimate target of investigation and the average person, and with little or no oversight from other agencies. Privacy-preserving surveillance is an alternative legal regime in which searches of sensitive user data could only take place with the active collaboration of multiple government agencies. Trust is distributed amongst these agencies, assuring that no single authority can unilaterally view sensitive user data (or metadata). We then show how two types of bulk surveillance, currently in use by the authorities, could be made privacy-preserving by the adoption of modern cryptographic protocols to secure data.
We also discuss protocols for anonymous communication. We take two approaches to anonymity. First, we present an improvement to the Tor network, an anonymity substrate based on onion routing that is already deployed in the wild. Second, we present a complete specification of the dining-cryptographers-based Verdict protocol arid formally prove its anonymity, security, and accountability properties.
Books on the topic "Privacy design"
Klitou, Demetrius. Privacy-Invading Technologies and Privacy by Design. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-026-8.
Full textWeb Privacy with P3P. Beijing: O'Reilly, 2002.
Find full textR, Elden Charles, ed. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.
Find full textPoukman, Natalie. Intruding privacy in visual communication: M.A. Communication Design Thesis 2001. London: Central Saint Martins College of Art & Design, 2001.
Find full textLandscaping for privacy: Innovative ways to turn your outdoor space into a peaceful retreat. Portland, Or: Timber Press, 2012.
Find full textFarrant, Tim. How to build straw bale landscape & privacy walls: A working paper. [Tucson, Ariz.?: s.n., 1995.
Find full textRoett, Tracy A. A study of privacy, experimenter self-disclosure on respondent's self-disclosure: Using a web-based design. Sudbury, Ont: Laurentian University, 2007.
Find full textHook, Chris. Data protection implications for systems design. Manchester: NCC Publications, 1989.
Find full textHousing for the elderly: Privacy and independence in environments for the aging. New York: Van Nostrand Reinhold, 1985.
Find full textInternational, Creative Publishing, and Black & Decker Corporation (Towson, Md.), eds. The complete guide to garden walls & fences: Improve backyard environments, enhance privacy & enjoyment, define space & borders. Minneapolis, Minn: Creative Pub. International, 2010.
Find full textBook chapters on the topic "Privacy design"
Mikhail, David. "Privacy." In The Housing Design Handbook, 224–37. Second edition. | New York : Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9780203704516-17.
Full textHoepman, Jaap-Henk. "Privacy Design Strategies." In ICT Systems Security and Privacy Protection, 446–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_38.
Full textGuarnieri, Claudio. "Agency for All, Privacy for None." In Design, 121–32. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457603-007.
Full textvan Rest, Jeroen, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. "Designing Privacy-by-Design." In Privacy Technologies and Policy, 55–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54069-1_4.
Full textTamò-Larrieux, Aurelia. "Strengthening Privacy by Design." In Law, Governance and Technology Series, 227–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98624-1_10.
Full textRobichau, Bernard Peter. "Application Design." In Healthcare Information Privacy and Security, 81–98. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_8.
Full textDennedy, Michelle Finneran, Jonathan Fox, and Thomas R. Finneran. "Organizational Design and Alignment." In The Privacy Engineer’s Manifesto, 257–76. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6356-2_12.
Full textGarg, Vaibhav, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. "Risk Communication Design: Video vs. Text." In Privacy Enhancing Technologies, 279–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31680-7_15.
Full textDiamantopoulou, Vasiliki, Christos Kalloniatis, Stefanos Gritzalis, and Haralambos Mouratidis. "Supporting Privacy by Design Using Privacy Process Patterns." In ICT Systems Security and Privacy Protection, 491–505. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_33.
Full textIschen, Carolin, Theo Araujo, Hilde Voorveld, Guda van Noort, and Edith Smit. "Privacy Concerns in Chatbot Interactions." In Chatbot Research and Design, 34–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39540-7_3.
Full textConference papers on the topic "Privacy design"
Le Métayer, Daniel. "Privacy by design." In the third ACM conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2435349.2435361.
Full textTang, F., and R. Wei. "Implement privacy for an OMS." In in Design (CSCWD). IEEE, 2008. http://dx.doi.org/10.1109/cscwd.2008.4537072.
Full textMolesky, Monroe J. "Communicating Cybersecurity and Privacy Design Attributes through Privacy Labeling of Consumer Electronic Medical Devices." In 2022 Design of Medical Devices Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/dmd2022-1045.
Full textVeseli, Fatbardh, Jetzabel Serna Olvera, Tobias Pulls, and Kai Rannenberg. "Engineering privacy by design." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297429.
Full textNissim, Kobbi, Claudio Orlandi, and Rann Smorodinsky. "Privacy-aware mechanism design." In the 13th ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2229012.2229073.
Full textNohl, Karsten, and David Evans. "Privacy through Noise: A Design Space for Private Identification." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.55.
Full textLiang, Z., and R. Wei. "Efficient K-anonymization for privacy preservation." In in Design (CSCWD). IEEE, 2008. http://dx.doi.org/10.1109/cscwd.2008.4537070.
Full textAhmadian, Amir Shayan, Daniel Strüber, and Jan Jürjens. "Privacy-enhanced system design modeling based on privacy features." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297431.
Full textDegeling, Martin, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, and Kai-Uwe Loser. "Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design." In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 2016. http://dx.doi.org/10.1109/cic.2016.077.
Full textSchmutte, Ian M., and Nathan Yoder. "Information Design for Differential Privacy." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538302.
Full textReports on the topic "Privacy design"
Ridgeway, Diane, Mary F. Theofanos, Terese W. Manley, and Christine Task. Challenge Design and Lessons Learned from the 2018 Differential Privacy Challenges. National Institute of Standards and Technology, April 2021. http://dx.doi.org/10.6028/nist.tn.2151.
Full textEugenio, Evercita. Federated Learning and Differential Privacy: What might AI-Enhanced co-design of microelectronics learn?. Office of Scientific and Technical Information (OSTI), May 2022. http://dx.doi.org/10.2172/1868417.
Full textAyele, Seife, and Wei Shen. Renewable Energy Procurement by Private Suppliers in Ethiopia. Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/ids.2022.008.
Full textKaitlin, Ball. New Technologies for Combatting Sexual Violence in Conflict and Non-conflict Settings. Institute of Development Studies, June 2022. http://dx.doi.org/10.19088/k4d.2022.136.
Full textJunejo, A. A., A. Karki, and R. K. L. Karna. Manual for Survey and Layout Design of Private Micro-hydropower Plants. Kathmandu, Nepal: International Centre for Integrated Mountain Development (ICIMOD), 1999. http://dx.doi.org/10.53055/icimod.311.
Full textJunejo, A. A., A. Karki, and R. K. L. Karna. Manual for Survey and Layout Design of Private Micro-hydropower Plants. Kathmandu, Nepal: International Centre for Integrated Mountain Development (ICIMOD), 1999. http://dx.doi.org/10.53055/icimod.311.
Full textAndrabi, Tahir, Natalie Bau, Jishnu Das, and Asim I. Khwaja. Heterogeneity in School Value-Added and the Private Premium. Research on Improving Systems of Education (RISE), November 2022. http://dx.doi.org/10.35489/bsg-risewp_2022/116.
Full textAndrabi, Tahir, Natalie Bau, Jishnu Das, Naureen Karachiwalla, and Asim I. Khwaja. Crowding in Private Quality: The Equilibrium Effects of Public Spending in Education. Research on Improving Systems of Education (RISE), January 2023. http://dx.doi.org/10.35489/bsg-rise-wp_2023/124.
Full textGoyeneche, Laura, Cynthia Boruchowicz, Florencia Lopez Boo, Luis Tejerina, Benjamin Roseth, and Jennifer Nelson. Pandemics, privacy, and adoption of technology: Perceptions of the use of digital tools and data sharing during COVID-19 from 10 Latin American countries. Inter-American Development Bank, December 2022. http://dx.doi.org/10.18235/0004546.
Full textStrachan, Anna Louise. Potential Private Sector Involvement in Supporting Refugee Livelihoods and Self-reliance in Uganda: Annotated Bibliography. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.072.
Full text