Usage and perceptions of agile software development in an industrial context: An exploratory study

A Begel, N Nagappan - First International Symposium on …, 2007 - ieeexplore.ieee.org
Agile development methodologies have been gaining acceptance in the mainstream
software development community. While there are numerous studies of agile development …

Utility-aware synthesis of differentially private and attack-resilient location traces

ME Gursoy, L Liu, S Truex, L Yu, W Wei - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
As mobile devices and location-based services become increasingly ubiquitous, the privacy
of mobile users' location traces continues to be a major concern. Traditional privacy …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012 - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

OB-PWS: Obfuscation-based private web search

E Balsa, C Troncoso, C Diaz - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Obfuscation-based private web search (OB-PWS) solutions allow users to search for
information in the Internet while concealing their interests. The basic privacy mechanism in …

Characterizing privacy leakage of public wifi networks for users on travel

N Cheng, XO Wang, W Cheng… - 2013 Proceedings …, 2013 - ieeexplore.ieee.org
Deployment of public wireless access points (also known as public hotspots) and the
prevalence of portable computing devices has made it more convenient for people on travel …

Caché: caching location-enhanced content to improve user privacy

S Amini, J Lindqvist, J Hong, J Lin, E Toch… - Proceedings of the 9th …, 2011 - dl.acm.org
We present the design, implementation, and evaluation of Caché, a system that offers
location privacy for certain classes of location-based applications. The core idea in Caché is …

Quantifying web-search privacy

A Gervais, R Shokri, A Singla, S Capkun… - Proceedings of the 2014 …, 2014 - dl.acm.org
Web search queries reveal extensive information about users' personal lives to the search
engines and Internet eavesdroppers. Obfuscating search queries through adding dummy …

Privacy risk quantification in education data using Markov model

D Vatsalan, T Rakotoarivelo, R Bhaskar… - British Journal of …, 2022 - Wiley Online Library
Abstract With Big Data revolution, the education sector is being reshaped. The current data‐
driven education system provides many opportunities to utilize the enormous amount of …

Data privacy

V Torra, G Navarro‐Arribas - Wiley Interdisciplinary Reviews …, 2014 - Wiley Online Library
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive
information. Its origin is in statistics with the goal to ensure the confidentiality of data …