Добірка наукової літератури з теми "Privacy design"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Privacy design".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Privacy design"
Galindo Q, July. "Privacy by design. Implementing privacy as a good business decision." Revista de Derecho, Comunicaciones y Nuevas Tecnologías 12 (December 18, 2014): 1–24. http://dx.doi.org/10.15425/redecom.12.2014.11.
Повний текст джерелаSchaar, Peter. "Privacy by Design." Identity in the Information Society 3, no. 2 (April 1, 2010): 267–74. http://dx.doi.org/10.1007/s12394-010-0055-x.
Повний текст джерелаShapiro, Stuart S. "Privacy by design." Communications of the ACM 53, no. 6 (June 2010): 27–29. http://dx.doi.org/10.1145/1743546.1743559.
Повний текст джерелаKipker, Dennis-Kenji. "Privacy by Default und Privacy by Design." Datenschutz und Datensicherheit - DuD 39, no. 6 (May 2015): 410. http://dx.doi.org/10.1007/s11623-015-0438-0.
Повний текст джерелаAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (January 2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v6.854.
Повний текст джерелаAlalouch, Chaham, Peter A. Aspinall, and Harry Smith. "Design Criteria for Privacy-Sensitive Healthcare Buildings." International Journal of Engineering and Technology 8, no. 1 (2016): 32–39. http://dx.doi.org/10.7763/ijet.2016.v8.854.
Повний текст джерелаLavallee, Tim, and Kenneth Good. "Speech privacy in design: A cost‐privacy analysis." Journal of the Acoustical Society of America 119, no. 5 (May 2006): 3351. http://dx.doi.org/10.1121/1.4786474.
Повний текст джерелаCACM Staff. "Operationalizing privacy by design." Communications of the ACM 55, no. 9 (September 2012): 7. http://dx.doi.org/10.1145/2330667.2330669.
Повний текст джерелаDuncan, G. "ENGINEERING: Privacy By Design." Science 317, no. 5842 (August 31, 2007): 1178–79. http://dx.doi.org/10.1126/science.1143464.
Повний текст джерелаPai, Mallesh M., and Aaron Roth. "Privacy and mechanism design." ACM SIGecom Exchanges 12, no. 1 (June 2013): 8–29. http://dx.doi.org/10.1145/2509013.2509016.
Повний текст джерелаДисертації з теми "Privacy design"
Alhussein, Nawras. "Privacy by Design & Internet of Things: managing privacy." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20590.
Повний текст джерелаPrivacy means the right to be left alone. It has been questioned many times if privacy really exists on the internet, especially in Internet of Things systems or smart systems as they are also called. More questions occur when the new general data protection regulation (GDPR) within the European Union applies in May. In this paper privacy by design that the general data protection regulation comes with is being studied. This study answers whether privacy by design will be able to increase the protection of privacy in Internet of Things systems. Advantages and disadvantages are also addressed and how companies and common users are affected by the implementation of privacy by design. The question has been answered by a literature review and two interviews. It turned out that a significant part of the problems in Internet of Things regarding privacy may be solved by data management. The privacy by design includes protection of data in all states through different methods such as encryption. In this way, privacy by design contributes to increased security within Internet of Things system.
Iachello, Giovanni. "Privacy and Proportionality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10487.
Повний текст джерелаWITTE, NATHAN ALLAN. "PRIVACY: ARCHITECTURE IN SUPPORT OF PRIVACY REGULATION." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1053701814.
Повний текст джерелаSpiekermann-Hoff, Sarah. "The Challenges of Privacy by Design." The Association for Computing Machinery, 2012. http://dx.doi.org/10.1145/2209249.2209263.
Повний текст джерелаIslam, Mohammad Badiul. "Privacy by design for social networks." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71389/1/Mohammad%20Badiul_Islam_Thesis.pdf.
Повний текст джерелаFischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.
Повний текст джерелаFloderus, Sebastian, and Vincent Tewolde. "Analysing privacy concerns in smartcameras : in correlation with GDPR and Privacy by Design." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21980.
Повний текст джерелаRipmann, Nina. "User Interface Design for Privacy Enhancing Technology." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18731.
Повний текст джерелаSimmingsköld, Carl. "Privacy by Design : Inbyggd integritet i patientjournaler." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-8331.
Повний текст джерелаSegal, Aaron. "Design and Implementation of Privacy-Preserving Surveillance." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584958.
Повний текст джерелаThe modern internet and phone networks offer very little security, privacy, or accountability to their users. As people conduct their business and social lives online and over the phone, they naturally generate private or sensitive data about themselves. But any number of parties can and do track this data. Not only the services people interact with everyday, but third-party services for ad tracking, malicious hackers, government agencies operating with nebulous legal authority, and service providers themselves can and do observe and track users. They can then use the sensitive data in a variety of objectionable ways.
Changing this state of affairs without an earth-shattering technological breakthrough may appear to be a hopeless situation. But, in this dissertation, we demonstrate how existing technology can, if deployed and used properly, markedly improve privacy for users and accountability for those collecting data. We discuss two techniques for achieving these improvements: privacy-preserving surveillance and anonymous communication. For each technique, we present example protocols for which we have implemented fast prototypes running on commercial hardware.
First, we define the notion of privacy-preserving surveillance. Currently, a government agency can collect and examine bulk user data while making no distinction between the legitimate target of investigation and the average person, and with little or no oversight from other agencies. Privacy-preserving surveillance is an alternative legal regime in which searches of sensitive user data could only take place with the active collaboration of multiple government agencies. Trust is distributed amongst these agencies, assuring that no single authority can unilaterally view sensitive user data (or metadata). We then show how two types of bulk surveillance, currently in use by the authorities, could be made privacy-preserving by the adoption of modern cryptographic protocols to secure data.
We also discuss protocols for anonymous communication. We take two approaches to anonymity. First, we present an improvement to the Tor network, an anonymity substrate based on onion routing that is already deployed in the wild. Second, we present a complete specification of the dining-cryptographers-based Verdict protocol arid formally prove its anonymity, security, and accountability properties.
Книги з теми "Privacy design"
Klitou, Demetrius. Privacy-Invading Technologies and Privacy by Design. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-026-8.
Повний текст джерелаWeb Privacy with P3P. Beijing: O'Reilly, 2002.
Знайти повний текст джерелаR, Elden Charles, ed. Wireless security and privacy: Best practices and design techniques. Boston: Addison-Wesley, 2003.
Знайти повний текст джерелаPoukman, Natalie. Intruding privacy in visual communication: M.A. Communication Design Thesis 2001. London: Central Saint Martins College of Art & Design, 2001.
Знайти повний текст джерелаLandscaping for privacy: Innovative ways to turn your outdoor space into a peaceful retreat. Portland, Or: Timber Press, 2012.
Знайти повний текст джерелаFarrant, Tim. How to build straw bale landscape & privacy walls: A working paper. [Tucson, Ariz.?: s.n., 1995.
Знайти повний текст джерелаRoett, Tracy A. A study of privacy, experimenter self-disclosure on respondent's self-disclosure: Using a web-based design. Sudbury, Ont: Laurentian University, 2007.
Знайти повний текст джерелаHook, Chris. Data protection implications for systems design. Manchester: NCC Publications, 1989.
Знайти повний текст джерелаHousing for the elderly: Privacy and independence in environments for the aging. New York: Van Nostrand Reinhold, 1985.
Знайти повний текст джерелаInternational, Creative Publishing, and Black & Decker Corporation (Towson, Md.), eds. The complete guide to garden walls & fences: Improve backyard environments, enhance privacy & enjoyment, define space & borders. Minneapolis, Minn: Creative Pub. International, 2010.
Знайти повний текст джерелаЧастини книг з теми "Privacy design"
Mikhail, David. "Privacy." In The Housing Design Handbook, 224–37. Second edition. | New York : Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9780203704516-17.
Повний текст джерелаHoepman, Jaap-Henk. "Privacy Design Strategies." In ICT Systems Security and Privacy Protection, 446–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_38.
Повний текст джерелаGuarnieri, Claudio. "Agency for All, Privacy for None." In Design, 121–32. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457603-007.
Повний текст джерелаvan Rest, Jeroen, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. "Designing Privacy-by-Design." In Privacy Technologies and Policy, 55–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54069-1_4.
Повний текст джерелаTamò-Larrieux, Aurelia. "Strengthening Privacy by Design." In Law, Governance and Technology Series, 227–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98624-1_10.
Повний текст джерелаRobichau, Bernard Peter. "Application Design." In Healthcare Information Privacy and Security, 81–98. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6677-8_8.
Повний текст джерелаDennedy, Michelle Finneran, Jonathan Fox, and Thomas R. Finneran. "Organizational Design and Alignment." In The Privacy Engineer’s Manifesto, 257–76. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6356-2_12.
Повний текст джерелаGarg, Vaibhav, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. "Risk Communication Design: Video vs. Text." In Privacy Enhancing Technologies, 279–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31680-7_15.
Повний текст джерелаDiamantopoulou, Vasiliki, Christos Kalloniatis, Stefanos Gritzalis, and Haralambos Mouratidis. "Supporting Privacy by Design Using Privacy Process Patterns." In ICT Systems Security and Privacy Protection, 491–505. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0_33.
Повний текст джерелаIschen, Carolin, Theo Araujo, Hilde Voorveld, Guda van Noort, and Edith Smit. "Privacy Concerns in Chatbot Interactions." In Chatbot Research and Design, 34–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39540-7_3.
Повний текст джерелаТези доповідей конференцій з теми "Privacy design"
Le Métayer, Daniel. "Privacy by design." In the third ACM conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2435349.2435361.
Повний текст джерелаTang, F., and R. Wei. "Implement privacy for an OMS." In in Design (CSCWD). IEEE, 2008. http://dx.doi.org/10.1109/cscwd.2008.4537072.
Повний текст джерелаMolesky, Monroe J. "Communicating Cybersecurity and Privacy Design Attributes through Privacy Labeling of Consumer Electronic Medical Devices." In 2022 Design of Medical Devices Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/dmd2022-1045.
Повний текст джерелаVeseli, Fatbardh, Jetzabel Serna Olvera, Tobias Pulls, and Kai Rannenberg. "Engineering privacy by design." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297429.
Повний текст джерелаNissim, Kobbi, Claudio Orlandi, and Rann Smorodinsky. "Privacy-aware mechanism design." In the 13th ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2229012.2229073.
Повний текст джерелаNohl, Karsten, and David Evans. "Privacy through Noise: A Design Space for Private Identification." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.55.
Повний текст джерелаLiang, Z., and R. Wei. "Efficient K-anonymization for privacy preservation." In in Design (CSCWD). IEEE, 2008. http://dx.doi.org/10.1109/cscwd.2008.4537070.
Повний текст джерелаAhmadian, Amir Shayan, Daniel Strüber, and Jan Jürjens. "Privacy-enhanced system design modeling based on privacy features." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297431.
Повний текст джерелаDegeling, Martin, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, and Kai-Uwe Loser. "Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design." In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 2016. http://dx.doi.org/10.1109/cic.2016.077.
Повний текст джерелаSchmutte, Ian M., and Nathan Yoder. "Information Design for Differential Privacy." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538302.
Повний текст джерелаЗвіти організацій з теми "Privacy design"
Ridgeway, Diane, Mary F. Theofanos, Terese W. Manley, and Christine Task. Challenge Design and Lessons Learned from the 2018 Differential Privacy Challenges. National Institute of Standards and Technology, April 2021. http://dx.doi.org/10.6028/nist.tn.2151.
Повний текст джерелаEugenio, Evercita. Federated Learning and Differential Privacy: What might AI-Enhanced co-design of microelectronics learn?. Office of Scientific and Technical Information (OSTI), May 2022. http://dx.doi.org/10.2172/1868417.
Повний текст джерелаAyele, Seife, and Wei Shen. Renewable Energy Procurement by Private Suppliers in Ethiopia. Institute of Development Studies (IDS), February 2022. http://dx.doi.org/10.19088/ids.2022.008.
Повний текст джерелаKaitlin, Ball. New Technologies for Combatting Sexual Violence in Conflict and Non-conflict Settings. Institute of Development Studies, June 2022. http://dx.doi.org/10.19088/k4d.2022.136.
Повний текст джерелаJunejo, A. A., A. Karki, and R. K. L. Karna. Manual for Survey and Layout Design of Private Micro-hydropower Plants. Kathmandu, Nepal: International Centre for Integrated Mountain Development (ICIMOD), 1999. http://dx.doi.org/10.53055/icimod.311.
Повний текст джерелаJunejo, A. A., A. Karki, and R. K. L. Karna. Manual for Survey and Layout Design of Private Micro-hydropower Plants. Kathmandu, Nepal: International Centre for Integrated Mountain Development (ICIMOD), 1999. http://dx.doi.org/10.53055/icimod.311.
Повний текст джерелаAndrabi, Tahir, Natalie Bau, Jishnu Das, and Asim I. Khwaja. Heterogeneity in School Value-Added and the Private Premium. Research on Improving Systems of Education (RISE), November 2022. http://dx.doi.org/10.35489/bsg-risewp_2022/116.
Повний текст джерелаAndrabi, Tahir, Natalie Bau, Jishnu Das, Naureen Karachiwalla, and Asim I. Khwaja. Crowding in Private Quality: The Equilibrium Effects of Public Spending in Education. Research on Improving Systems of Education (RISE), January 2023. http://dx.doi.org/10.35489/bsg-rise-wp_2023/124.
Повний текст джерелаGoyeneche, Laura, Cynthia Boruchowicz, Florencia Lopez Boo, Luis Tejerina, Benjamin Roseth, and Jennifer Nelson. Pandemics, privacy, and adoption of technology: Perceptions of the use of digital tools and data sharing during COVID-19 from 10 Latin American countries. Inter-American Development Bank, December 2022. http://dx.doi.org/10.18235/0004546.
Повний текст джерелаStrachan, Anna Louise. Potential Private Sector Involvement in Supporting Refugee Livelihoods and Self-reliance in Uganda: Annotated Bibliography. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.072.
Повний текст джерела