Journal articles on the topic 'Privacy design'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy design.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Galindo Q, July. "Privacy by design. Implementing privacy as a good business decision." Revista de Derecho, Comunicaciones y Nuevas Tecnologías 12 (December 18, 2014): 1–24. http://dx.doi.org/10.15425/redecom.12.2014.11.
Full textSchaar, Peter. "Privacy by Design." Identity in the Information Society 3, no. 2 (April 1, 2010): 267–74. http://dx.doi.org/10.1007/s12394-010-0055-x.
Full textShapiro, Stuart S. "Privacy by design." Communications of the ACM 53, no. 6 (June 2010): 27–29. http://dx.doi.org/10.1145/1743546.1743559.
Full textKipker, Dennis-Kenji. "Privacy by Default und Privacy by Design." Datenschutz und Datensicherheit - DuD 39, no. 6 (May 2015): 410. http://dx.doi.org/10.1007/s11623-015-0438-0.
Full textAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (January 2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v6.854.
Full textAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v8.854.
Full textLavallee, Tim, and Kenneth Good. "Speech privacy in design: A cost‐privacy analysis." Journal of the Acoustical Society of America 119, no. 5 (May 2006): 3351. http://dx.doi.org/10.1121/1.4786474.
Full textCACM Staff. "Operationalizing privacy by design." Communications of the ACM 55, no. 9 (September 2012): 7. http://dx.doi.org/10.1145/2330667.2330669.
Full textDuncan, G. "ENGINEERING: Privacy By Design." Science 317, no. 5842 (August 31, 2007): 1178–79. http://dx.doi.org/10.1126/science.1143464.
Full textPai, Mallesh M., and Aaron Roth. "Privacy and mechanism design." ACM SIGecom Exchanges 12, no. 1 (June 2013): 8–29. http://dx.doi.org/10.1145/2509013.2509016.
Full textCai, Yang, Joseph Laws, and Nathaniel Bauernfeind. "Design Privacy with Analogia Graph." Proceedings of the AAAI Conference on Artificial Intelligence 24, no. 2 (October 7, 2021): 1769–74. http://dx.doi.org/10.1609/aaai.v24i2.18810.
Full textRajamäki, Jyri. "Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems." Information & Security: An International Journal 43, no. 2 (2019): 196–214. http://dx.doi.org/10.11610/isij.4316.
Full textSui, Xin, and Craig Boutilier. "Efficiency and Privacy Tradeoffs in Mechanism Design." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (August 4, 2011): 738–44. http://dx.doi.org/10.1609/aaai.v25i1.7865.
Full textHe, Jianping, Lin Cai, Chengcheng Zhao, Peng Cheng, and Xinping Guan. "Privacy-Preserving Average Consensus: Privacy Analysis and Algorithm Design." IEEE Transactions on Signal and Information Processing over Networks 5, no. 1 (March 2019): 127–38. http://dx.doi.org/10.1109/tsipn.2018.2866342.
Full textAnjum, Nomana, Roland Ashcroft, and Jeanette Paul. "Privacy in the Workplace Design." Design Journal 7, no. 1 (March 2004): 27–42. http://dx.doi.org/10.2752/146069204789355236.
Full textBuss, Sebastian. "Privacy by Design und Software." Computer und Recht 36, no. 1 (January 1, 2020): 1–6. http://dx.doi.org/10.9785/cr-2020-360107.
Full textPark, Su-min, Man-pyo Hong, Tae-shik Shon, and Jin Kwak. "VANET Privacy Assurance Architecture Design." Journal of Internet Computing and Services 17, no. 6 (December 31, 2016): 81–91. http://dx.doi.org/10.7472/jksii.2016.17.6.81.
Full textSaini, Mukesh. "Privacy-aware surveillance system design." ACM SIGMultimedia Records 4, no. 3 (September 2012): 11–12. http://dx.doi.org/10.1145/2452556.2452565.
Full textWiese Schartum, Dag. "Making privacy by design operative." International Journal of Law and Information Technology 24, no. 2 (February 24, 2016): 151–75. http://dx.doi.org/10.1093/ijlit/eaw002.
Full textCavoukian, Ann. "Privacy by Design [Leading Edge]." IEEE Technology and Society Magazine 31, no. 4 (2012): 18–19. http://dx.doi.org/10.1109/mts.2012.2225459.
Full textGedeon, Ibrahim J., Pamela Snively, Carey Frey, Wahab Almuhtadi, and Saraju P. Mohanty. "Privacy and Security by Design." IEEE Consumer Electronics Magazine 9, no. 2 (March 1, 2020): 76–77. http://dx.doi.org/10.1109/mce.2019.2954762.
Full textMohsin, Farhad, Ao Liu, Pin-Yu Chen, Francesca Rossi, and Lirong Xia. "Learning to Design Fair and Private Voting Rules." Journal of Artificial Intelligence Research 75 (November 30, 2022): 1139–76. http://dx.doi.org/10.1613/jair.1.13734.
Full textBabu, M. Suresh, Mohammed Irfan, and Suneetha V. "Privacy preservation and Privacy by Design techniques in Big Data." International Journal of Computer Sciences and Engineering 7, no. 4 (April 30, 2019): 588–93. http://dx.doi.org/10.26438/ijcse/v7i4.588593.
Full textRallet, Alain, Fabrice Rochelandet, and Célia Zolynski. "De la Privacy by Design à la Privacy by Using." Réseaux 189, no. 1 (2015): 15. http://dx.doi.org/10.3917/res.189.0015.
Full textCohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Full textBarth, Susanne, Dan Ionita, and Pieter Hartel. "Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines." ACM Computing Surveys 55, no. 3 (April 30, 2023): 1–37. http://dx.doi.org/10.1145/3502288.
Full textHeuer, Tanja, Ina Schiering, and Reinhard Gerndt. "Privacy-centered design for social robots." Interaction Studies 20, no. 3 (November 18, 2019): 509–29. http://dx.doi.org/10.1075/is.18063.heu.
Full textNissim, Kobbi, and Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (August 6, 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Full textHaer, Roos, and Nadine Meidert. "Undisclosed privacy. The effect of privacy rights design on response rates." Survey Practice 7, no. 2 (April 1, 2014): 1–10. http://dx.doi.org/10.29115/sp-2014-0006.
Full textvan Lieshout, Marc, Linda Kool, Bas van Schoonhoven, and Marjan de Jonge. "Privacy by Design: an alternative to existing practice in safeguarding privacy." info 13, no. 6 (September 27, 2011): 55–68. http://dx.doi.org/10.1108/14636691111174261.
Full textLv, Qiu Yun, Xiang Hong Tang, and Qiu Hua Wang. "EID System's Privacy Protection Enhancement Design." Applied Mechanics and Materials 411-414 (September 2013): 192–98. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.192.
Full textKawano, Yu, and Ming Cao. "Design of Privacy-Preserving Dynamic Controllers." IEEE Transactions on Automatic Control 65, no. 9 (September 2020): 3863–78. http://dx.doi.org/10.1109/tac.2020.2994030.
Full textSpiekermann, Sarah. "The challenges of privacy by design." Communications of the ACM 55, no. 7 (July 2012): 38–40. http://dx.doi.org/10.1145/2209249.2209263.
Full textTretzmüller, Tobias. "Privacy by Design in der Softwareentwicklung." Zeitschrift für Informationsrecht 8, no. 2 (2020): 145. http://dx.doi.org/10.33196/ziir202002014501.
Full textRoy, Kenneth P. "New developments in speech privacy design." Journal of the Acoustical Society of America 119, no. 5 (May 2006): 3326. http://dx.doi.org/10.1121/1.4786370.
Full textHustinx, Peter. "Privacy by design: delivering the promises." Identity in the Information Society 3, no. 2 (May 7, 2010): 253–55. http://dx.doi.org/10.1007/s12394-010-0061-z.
Full textRahmani Miyandehi, Safoora, Azadeh Rahmani, and Azadeh Khaki Ghasr. "The Concept of Re-Creation of Persian Garden Privacy in Mosque Design." Environment-Behaviour Proceedings Journal 1, no. 2 (July 4, 2016): 109. http://dx.doi.org/10.21834/e-bpj.v1i2.285.
Full textEbadi, Hamid, David Sands, and Gerardo Schneider. "Differential Privacy." ACM SIGPLAN Notices 50, no. 1 (May 11, 2015): 69–81. http://dx.doi.org/10.1145/2775051.2677005.
Full textNahmias, Yifat. "Privacy Preserving Social Norm Nudges." Michigan Technology Law Review, no. 26.1 (2019): 43. http://dx.doi.org/10.36645/mtlr.26.1.privacy.
Full textBasso, Tania, Leonardo Montecchi, Regina Moraes, Mario Jino, and Andrea Bondavalli. "PrivAPP: An integrated approach for the design of privacy-aware applications." Software: Practice and Experience 48, no. 3 (October 11, 2017): 499–527. http://dx.doi.org/10.1002/spe.2546.
Full textBorrett, Donald S., Heather Sampson, and Ann Cavoukian. "Research ethics by design: A collaborative research design proposal." Research Ethics 13, no. 2 (October 5, 2016): 84–91. http://dx.doi.org/10.1177/1747016116673135.
Full textGao, Jie, Ruobin Gong, and Fang-Yi Yu. "Subspace Differential Privacy." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 4 (June 28, 2022): 3986–95. http://dx.doi.org/10.1609/aaai.v36i4.20315.
Full textAlkhariji, Lamya, Nada Alhirabi, Mansour Naser Alraja, Mahmoud Barhamgi, Omer Rana, and Charith Perera. "Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in Healthcare." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 2s (June 10, 2021): 1–29. http://dx.doi.org/10.1145/3434186.
Full textBraman, Sandra. "Privacy by design: Networked computing, 1969–1979." New Media & Society 14, no. 5 (December 26, 2011): 798–814. http://dx.doi.org/10.1177/1461444811426741.
Full textKlitou, Demetrius. "Privacy by Design and Privacy-Invading Technologies: Safeguarding Privacy, Liberty and Security in the 21st Century." Legisprudence 5, no. 3 (December 2011): 297–329. http://dx.doi.org/10.5235/175214611799248904.
Full textFerrari, Edoardo, Yue Tian, Chenglong Sun, Zuxing Li, and Chao Wang. "Privacy-Preserving Design of Scalar LQG Control." Entropy 24, no. 7 (June 22, 2022): 856. http://dx.doi.org/10.3390/e24070856.
Full textOmoronyia, Inah, Ubong Etuk, and Peter Inglis. "A Privacy Awareness System for Software Design." International Journal of Software Engineering and Knowledge Engineering 29, no. 10 (October 2019): 1557–604. http://dx.doi.org/10.1142/s0218194019500499.
Full textAljeraisy, Atheer, Masoud Barati, Omer Rana, and Charith Perera. "Privacy Laws and Privacy by Design Schemes for the Internet of Things." ACM Computing Surveys 54, no. 5 (June 2021): 1–38. http://dx.doi.org/10.1145/3450965.
Full textHuo, Xiang, and Mingxi Liu. "Privacy-Preserving Distributed Multi-Agent Cooperative Optimization—Paradigm Design and Privacy Analysis." IEEE Control Systems Letters 6 (2022): 824–29. http://dx.doi.org/10.1109/lcsys.2021.3086441.
Full textChaudhuri, Abhik, and Ann Cavoukian. "The Proactive and Preventive Privacy (3P) Framework for IoT Privacy by Design." EDPACS 57, no. 1 (January 2, 2018): 1–16. http://dx.doi.org/10.1080/07366981.2017.1343548.
Full text