The pros and cons of legal automation and its governance

U Pagallo, M Durante - European Journal of Risk Regulation, 2016 - cambridge.org
The article examines the field of legal automation, its advantages and drawbacks, the ways
in which legal constraints and safeguards can be embedded into technology and how the …

The disclosure of private data: measuring the privacy paradox in digital services

H Gimpel, D Kleindienst, D Waldmann - Electronic Markets, 2018 - Springer
Privacy is a current topic in the context of digital services because such services demand
mass volumes of consumer data. Although most consumers are aware of their personal …

On the principle of privacy by design and its limits: Technology, ethics and the rule of law

U Pagallo - Italian Philosophy of Technology: Socio-Cultural, Legal …, 2021 - Springer
Over the last years lawmakers, privacy commissioners and scholars have discussed the
idea of embedding data protection safeguards in ICT and other types of technology, by …

Protecting and managing privacy information in video surveillance systems

SCS Cheung, MV Venkatesh, JK Paruchuri… - Protecting Privacy in …, 2009 - Springer
Recent widespread deployment and increased sophistication of video surveillance systems
have raised apprehension of their threat to individuals' right of privacy. Privacy protection …

Privacy leakage on the Web: Diffusion and countermeasures

D Malandrino, V Scarano - Computer Networks, 2013 - Elsevier
Protecting privacy on the Web is becoming increasingly complicated because of the
considerable amount of personal and sensitive information left by users in many locations …

Towards privacy engineering for real-time analytics in the human-centered internet of things

T Plagemann, V Goebel, M Hollick… - arXiv preprint arXiv …, 2022 - arxiv.org
Big data applications offer smart solutions to many urgent societal challenges, such as
health care, traffic coordination, energy management, etc. The basic premise for these …

Privacy apps for smartphones: An assessment of users' preferences and limitations

T Sharma, M Bashir - HCI for Cybersecurity, Privacy and Trust: Second …, 2020 - Springer
Smartphones are becoming our most trusted computing devices for storing and dealing with
highly sensitive information which makes smartphones an essential platform to take under …

Managing privacy data in pervasive camera networks

SC Sen-ching, JK Paruchuri… - 2008 15th IEEE …, 2008 - ieeexplore.ieee.org
Privacy protection of visual information is increasingly important as pervasive camera
networks becomes more prevalent. The proposed scheme addresses the problem of …

Anonymous subject identification and privacy information management in video surveillance

Y Luo, SS Cheung, R Lazzeretti, T Pignata… - International Journal of …, 2018 - Springer
The widespread deployment of surveillance cameras has raised serious privacy concerns,
and many privacy-enhancing schemes have been recently proposed to automatically redact …

Designing data protection safeguards ethically

U Pagallo - Information, 2011 - mdpi.com
Since the mid 1990s, lawmakers and scholars have worked on the idea of embedding data
protection safeguards in information and communication technology (ICT) with the aim to …