|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Olha Drozd and Sabrina Kirrane
The General Data Protection Regulation (GDPR) identifies consent as one of the legal bases for personal data processing and requires that it should be freely given, specific, informed, unambiguous, understandable, and easily revocable. Unfortunately, cur...
ver más
|
|
|
|
|
|
|
Veronika Belcheva, Tatiana Ermakova and Benjamin Fabian
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases conc...
ver más
|
|
|
|
|
|
|
Ricardo Martins Gonçalves, Miguel Mira da Silva and Paulo Rupino da Cunha
The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal. Eur...
ver más
|
|
|
|
|
|
|
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions ...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Jane Henriksen-Bulmer, Cagatay Yucel, Shamal Faily and Ioannis Chalkias
The introduction of Data Protection by Default and Design (DPbDD) brought in as part of the General Data Protection Regulation (GDPR) in 2018, has necessitated that businesses review how best to incorporate privacy into their processes in a transparent m...
ver más
|
|
|
|
|
|
|
Amar Tauqeer, Anelia Kurteva, Tek Raj Chhetri, Albin Ahmeti and Anna Fensel
In the past few years, the main research efforts regarding General Data Protection Regulation (GDPR)-compliant data sharing have been focused primarily on informed consent (one of the six GDPR lawful bases for data processing). In cases such as Business-...
ver más
|
|
|
|
|
|
|
Michael Petrolini, Stefano Cagnoni and Monica Mordonini
The General Data Protection Regulation (GDPR) has allowed EU citizens and residents to have more control over their personal data, simplifying the regulatory environment affecting international business and unifying and homogenising privacy legislation w...
ver más
|
|
|
|
|
|
|
Dimitrios Papamartzivanos, Sofia Anna Menesidou, Panagiotis Gouvas and Thanassis Giannetsos
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy...
ver más
|
|
|
|