Translating privacy design principles into human-centered Software Lifecycle: A literature review

M Saltarella, G Desolda, R Lanzilotti… - International Journal of …, 2024 - Taylor & Francis
Companies and organizations involved in software development are stimulated and often
obliged to consider procedures and technical solutions to guarantee data privacy and …

Exploring automated gdpr-compliance in requirements engineering: A systematic mapping study

AJ Aberkane, G Poels, SV Broucke - Ieee Access, 2021 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR), adopted in 2018, profoundly impacts
information processing organizations as they must comply with this regulation. In this …

Data protection by design tool for automated GDPR compliance verification based on semantically modeled informed consent

TR Chhetri, A Kurteva, RJ DeLong, R Hilscher, K Korte… - Sensors, 2022 - mdpi.com
The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection.
Organizations face significant challenges, such as demonstrating compliance (or …

ODRL profile for expressing consent through granular access control policies in solid

B Esteves, HJ Pandit… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Solid, the emerging technology for organizing data in decentralized stores, relies on a
simple authorization mechanism for granting access to data. Solid's personal online …

Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

Identifying practical challenges in the implementation of technical measures for data privacy compliance

O Klymenko, S Meisenbacher, F Matthes - arXiv preprint arXiv:2306.15497, 2023 - arxiv.org
Modern privacy regulations provide a strict mandate for data processing entities to
implement appropriate technical measures to demonstrate compliance. In practice …

An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools

S Karagiannis, E Maragkos-Belmpas… - IFIP World Conference on …, 2020 - Springer
Capture the Flag (CTF) challenges are typically used for hosting competitions related to
cybersecurity. Like any other event, CTF competitions vary in terms of context, topics and …

Understanding the implementation of technical measures in the process of data privacy compliance: a qualitative study

O Klymenko, O Kosenkov, S Meisenbacher… - Proceedings of the 16th …, 2022 - dl.acm.org
Background: Modern privacy regulations, such as the General Data Protection Regulation
(GDPR), address privacy in software systems in a technologically agnostic way by …

Investigating GDPR fines in the light of data flows

M Saemann, D Theis, T Urban… - Proceedings on Privacy …, 2022 - petsymposium.org
While GDPR related fines to big companies like Amazon or Google have seen widespread
media attention, data protection authorities have issued several hundred more penalties …

Privacy by Design and Software Engineering: a systematic literature review

VC Andrade, RD Gomes, S Reinehr… - Proceedings of the XXI …, 2022 - dl.acm.org
Service providers increasingly collect, process, store, and share data from their users to
understand their preferences to make better decisions and make accurate estimates for the …