Related references
Note: Only part of the references are listed.The impact of general data protection regulation on software engineering practices
Luis Leite et al.
INFORMATION AND COMPUTER SECURITY (2022)
Towards privacy compliance: A design science study in a small organization
Ze Shi Li et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2022)
A survey on solutions to support developers in privacy-preserving IoT development
Patrick Kuehtreiber et al.
PERVASIVE AND MOBILE COMPUTING (2022)
Towards privacy-aware software design in small and medium enterprises
Lelio Campanile et al.
2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) (2022)
Human-GDPR Interaction: Practical Experiences of Accessing Personal Data
Alex Bowyer et al.
PROCEEDINGS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI' 22) (2022)
From GDPR to Privacy Design Patterns: The MATERIALIST Framework
Vita Barletta et al.
SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (2022)
DICON: A Domain-Independent Consent Management for Personal Data Protection
Emre Olca et al.
IEEE ACCESS (2022)
User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes
Oshrat Ayalon et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2021)
I’m all ears! Listening to software developers on putting GDPR principles into software development practice
Abdulrahman Alhazmi et al.
Personal and Ubiquitous Computing (2021)
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web
Michael Kretschmer et al.
ACM TRANSACTIONS ON THE WEB (2021)
Guidelines for GDPR compliance in Big Data systems
Mouna Rhahla et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)
A Model-based Approach to Realize Privacy and Data Protection by Design
Gabriel Pedroza et al.
2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021) (2021)
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
Pedro Barbosa et al.
INFORMATION SCIENCES (2020)
Integrating security and privacy in software development
Maria Teresa Baldassarre et al.
SOFTWARE QUALITY JOURNAL (2020)
Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence
Midas Nouwens et al.
PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) (2020)
A formal approach to build privacy-awareness into clinical workflows
Saliha Irem Besik et al.
SICS SOFTWARE-INTENSIVE CYBER-PHYSICAL SYSTEMS (2020)
The impact of transparency on mobile privacy decision making
Jan Hendrik Betzing et al.
ELECTRONIC MARKETS (2020)
Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers
Majid Hatamian
IEEE ACCESS (2020)
A mapping of IoT user-centric privacy preserving approaches to the GDPR
Alexia Dini Kounoudes et al.
INTERNET OF THINGS (2020)
Transparency by design in data-informed research: A collection of information design patterns
Arianna Rossi et al.
COMPUTER LAW & SECURITY REVIEW (2020)
Smart City IoT Platform Respecting GDPR Privacy and Security Aspects
Claudio Badii et al.
IEEE ACCESS (2020)
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
Hezam Akram Abdulghani et al.
SYMMETRY-BASEL (2019)
The Security Implications of Data Subject Rights
Jatinder Singh et al.
IEEE SECURITY & PRIVACY (2019)
Privacy in Internet of Things: From Principles to Technologies
Chao Li et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Privacy Engineering for Domestic IoT: Enabling Due Diligence
Tom Lodge et al.
SENSORS (2019)
It Is About What They Could Do with the Data: A User Perspective on Privacy in Smart Metering
Timo Jakobi et al.
ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION (2019)
Adaptive Architecture and Personal Data
Holger Schnadelbach et al.
ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION (2019)
A Novel Privacy Framework for Secure M-health Applications: The Case of the GDPR
Uzma Mustafa et al.
PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019) (2019)
User-Centered and Privacy-Driven Process Mining System Design for IoT
Judith Michael et al.
INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019 (2019)
Achieving GDPR Compliance of BPMN Process Models
Simone Agostinelli et al.
INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019 (2019)
Practical evaluation of a reference architecture for the management of privacy level agreements
Vasiliki Diamantopoulou et al.
INFORMATION AND COMPUTER SECURITY (2019)
Reusable Elements for the Systematic Design of Privacy-Friendly information Systems: A Mapping Study
Julio C. Caiza et al.
IEEE ACCESS (2019)
Accomplishing Transparency within the General Data Protection Regulation
Dayana Spagnuelo et al.
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2019)
A Generic Information and Consent Framework for the IoT
Mathieu Cunche et al.
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)
Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments
Riad Ladjel et al.
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)
Data Protection by Design for cybersecurity systems in a Smart Home environment
Olga Gkotsopoulou et al.
PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019) (2019)
An Architectural View for Data Protection by Design
Laurens Sion et al.
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA) (2019)
Analysis of Privacy Policies to Enhance Informed Consent
Raul Pardo et al.
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII (2019)
Privacy Patterns for Pseudonymity
Alexander Gabel et al.
PRIVACY AND IDENTITY MANAGEMENT: FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY IN THE AGE OF BIG DATA (2019)
Using Models to Enable Compliance Checking against the GDPR: An Experience Report
Damiano Torre et al.
2019 ACM/IEEE 22ND INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2019) (2019)
The General Data Protection Regulation: Requirements, Architectures, and Constraints
Kalle Hjerppe et al.
2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019) (2019)
Continuous Requirements: An Example Using GDPR
Ze Shi Li et al.
2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019) (2019)
CrowdRE, User Feedback and GDPR Towards Tracking GDPR Implications with Adequate Technical and Organizational Measures in an Effort-Minimal Way
Eduard C. Groen et al.
2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019) (2019)
(Un)informed Consent: Studying GDPR Consent Notices in the Field
Christine Utz et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy
Oshrat Ayalon et al.
CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)
Privacy-Preserving Solutions for Blockchain: Review and Challenges
Jorge Bernal Bernabe et al.
IEEE ACCESS (2019)
GDPR impacts and opportunities for computer-aided diagnosis Guidelines and legal perspectives
Micael Pedrosa et al.
2019 IEEE 32ND INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS) (2019)
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Thomas Loruenser et al.
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)
Bringing Design to the Privacy Table Broadening Design in Privacy by Design Through the Lens of HCI
Richmond Y. Wong et al.
CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)
Recommender-based Privacy Requirements Elicitation - EPICUREAN An Approach to Simplify Privacy Settings in IoT Applications with Respect to the GDPR
Christoph Stach et al.
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)
Privacy-Enhanced System Design Modeling Based on Privacy Features
Amir Shayan Ahmadian et al.
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)
Realising the right to data portability for the domestic Internet of things
Lachlan Urquhart et al.
PERSONAL AND UBIQUITOUS COMPUTING (2018)
Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice
Achilleas Papageorgiou et al.
IEEE ACCESS (2018)
Integrating Technical and Legal Concepts of Privacy
Ana Sokolovska et al.
IEEE ACCESS (2018)
Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services
Mehrnaz Ataei et al.
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION (2018)
HCI Patterns for Cryptographically Equipped Cloud Services
Thomas Langer et al.
HUMAN-COMPUTER INTERACTION: THEORIES, METHODS, AND HUMAN ISSUES, HCI INTERNATIONAL 2018, PT I (2018)
Personal Data Management: An Abstract Personal Data Lifecycle Model
Majed Alshammari et al.
BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM 2017) (2018)
Rethinking the Proposition of Privacy Engineering
Aaron Ceross et al.
NSPW '18: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP (2018)
A System of Privacy Patterns for Informing Users: Creating a Pattern System
Michael Colesky et al.
EUROPLOP 2018: PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (2018)
Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
Stevan Coroller et al.
PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18) (2018)
Presence Patterns and Privacy Analysis
Ella Roubtsova et al.
BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2018 (2018)
Privacy Challenges for Process Mining in Human-centered Industrial Environments
Felix Mannhardt et al.
2018 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE 2018) (2018)
Optimal Evidence Collection for Accountability in the Cloud
Fatma Masmoudi et al.
2018 IEEE 15TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2018) (2018)
Extending ISO/IEC 29110 Basic Profile with Privacy-by-Design Approach: a Case Study in the Health Care Sector
Miguel Ehecatl Morales-Trujillo et al.
2018 11TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC) (2018)
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection
Majed Alshammari et al.
PROCEEDINGS OF THE 2018 WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'18) (2018)
Security-Driven Information Flow Modelling for Component Integration in Complex Environments
Veronika Kupfersberger et al.
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION TECHNOLOGY (IAIT2018) (2018)
Solution-aware Data Flow Diagrams for Security Threat Modeling
Laurens Sion et al.
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)
Helping John to Make Informed Decisions on Using Social Login
Farzaneh Karegar et al.
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)
Extending Model-Based Privacy Analysis for the Industrial Data Space by Exploiting Privacy Level Agreements
Amir Shayan Ahmadian et al.
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)
Supporting Privacy Impact Assessment by Model-Based Privacy Analysis
Amir Shayan Ahmadian et al.
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)
Privacy by designers: software developers' privacy mindset
Irit Hadar et al.
EMPIRICAL SOFTWARE ENGINEERING (2018)
Towards a Principled Approach for Engineering Privacy by Design
Majed Alshammari et al.
PRIVACY TECHNOLOGIES AND POLICY, APF 2017 (2017)
Towards Systematic Privacy and Operability (PRIOP) Studies
Rene Meis et al.
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017 (2017)
A Literature Study on Privacy Patterns Research
Jorg Lenhard et al.
2017 43RD EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA) (2017)
Privacy by Design: Informed Consent and Internet of Things for Smart Health
Yvonne O'Connor et al.
8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS (2017)
Orchestrating Privacy Enhancing Technologies and Services with BPM Tools The WITDOM Data Protection Orchestrator
Nicolas Notario et al.
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) (2017)
Privacy as a Service: Protecting the Individual in Healthcare Data Processing
Xiang Su et al.
COMPUTER (2016)
Informed Consent in Internet of Things: the Case Study of Cooperative Intelligent Transport Systems
Ricardo Neisse et al.
2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) (2016)
Protection Goals for Privacy Engineering
Marit Hansen et al.
2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)
A Guide to End-to-End Privacy Accountability
Denis Butin et al.
2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015 (2015)
Universal usability
B Shneiderman
COMMUNICATIONS OF THE ACM (2000)