[HTML][HTML] An analytical review of industrial privacy frameworks and regulations for organisational data sharing

SR Ghorashi, T Zia, M Bewong, Y Jiang - Applied Sciences, 2023 - mdpi.com
This study examines the privacy protection challenges in data sharing between
organisations and third-party entities, focusing on changing collaborations in the digital age …

Security and privacy in online social networking: Risk perceptions and precautionary behaviour

P Van Schaik, J Jansen, J Onibokun, J Camp… - Computers in Human …, 2018 - Elsevier
A quantitative behavioural online study examined a set of hazards that correspond with
security-and privacy settings of the major global online social network (Facebook). These …

[PDF][PDF] Privacy by design to comply with GDPR: a review on third-party data processors

C Kurtz, M Semmann, T Böhmann - 2018 - scholar.archive.org
Abstract As the General Data Protection Regulation (GDPR) within the European Union
comes into effect, organizations need to cope with novel legal requirements regarding the …

Would a Privacy Fundamentalist Sell Their {DNA} for {$1000... If} Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and …

A Woodruff, V Pihur, S Consolvo… - 10th Symposium On …, 2014 - usenix.org
Westin's Privacy Segmentation Index has been widely used to measure privacy attitudes
and categorize individuals into three privacy groups: fundamentalists, pragmatists, and …

[HTML][HTML] Integrating an information systems success model with perceived privacy, perceived security, and trust: the moderating role of Facebook addiction

M Maqableh, HY Hmoud, M Jaradat - Heliyon, 2021 - cell.com
Purpose The purpose of this study is to investigate the influence of perceived security,
perceived privacy, and satisfaction on Facebook user continuance intention. In addition, the …

Big security for big data: Addressing security challenges for the big data infrastructure

Y Demchenko, C Ngo, C de Laat, P Membrey… - … Data Management: 10th …, 2014 - Springer
Big Data technologies are changing the traditional technology domains and their successful
use will require new security models and new security design approaches to address …

[HTML][HTML] A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements

Q Ramadan, D Strüber, M Salnitri, J Jürjens… - Software and Systems …, 2020 - Springer
Requirements are inherently prone to conflicts. Security, data-minimization, and fairness
requirements are no exception. Importantly, undetected conflicts between such requirements …

[HTML][HTML] The personal is the political: Internet filtering and counter appropriation in the Islamic Republic of Iran

V Wulf, D Randall, K Aal, M Rohde - Computer Supported Cooperative …, 2022 - Springer
Issues of trust, privacy and security at the intersection of state intervention and the use of the
internet both by 'publics' and by individuals for—from the State's point of view-dispreferred …

Desperately seeking assurances: Segmenting users by their information-seeking preferences

A Morton, MA Sasse - 2014 Twelfth Annual International …, 2014 - ieeexplore.ieee.org
Users of technology services try to evaluate the risks of disclosing personal information in
light of the benefits they believe they will receive. However, because of cognitive, time or …

Solid-state circuit interrupters

M Telefus - US Patent 11,349,296, 2022 - Google Patents
A circuit interrupter includes a solid-state switch and a mode control circuit. The solid-state
switch is serially connected between a line input terminal and a load output terminal of the …