Mobile app privacy in software engineering research: A systematic mapping study
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …
access to privacy-sensitive information in exchange for more personalized user …
Privacy by designers: software developers' privacy mindset
Privacy by design (PbD) is a policy measure that guides software developers to apply
inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is …
inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is …
Privacy requirements: present & future
P Anthonysamy, A Rashid… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Software systems are increasingly open, handle large amounts of personal or other
sensitive data and are intricately linked with the daily lives of individuals and communities …
sensitive data and are intricately linked with the daily lives of individuals and communities …
Why developers cannot embed privacy into software systems? An empirical investigation
A Senarath, NAG Arachchilage - Proceedings of the 22nd International …, 2018 - dl.acm.org
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …
interact with software systems. Even though privacy practices such as Privacy by Design …
[PDF][PDF] Contextual integrity through the lens of computer science
S Benthall, S Gürses, H Nissenbaum - Foundations and Trends® in …, 2017 - sbenthall.net
The theory of Privacy as Contextual Integrity (CI) defines privacy as appropriate information
flow according to norms specific to social contexts or spheres. CI has had uptake in different …
flow according to norms specific to social contexts or spheres. CI has had uptake in different …
Us and them: a study of privacy requirements across North America, Asia, and Europe
Data privacy when using online systems like Facebook and Amazon has become an
increasingly popular topic in the last few years. However, only a little is known about how …
increasingly popular topic in the last few years. However, only a little is known about how …
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen - Journal of Systems and Software, 2014 - Elsevier
Privacy is a key issue in today's society. Software systems handle more and more sensitive
information concerning citizens. It is important that such systems are privacy-friendly by …
information concerning citizens. It is important that such systems are privacy-friendly by …
Integrating security and privacy in HCD-scrum
M Teresa Baldassarre, V Santa Barletta… - Proceedings of the 14th …, 2021 - dl.acm.org
Nowadays, software development must face the challenge of integrating security and
privacy elements from the earliest stages of any software development process. A correct …
privacy elements from the earliest stages of any software development process. A correct …
Run-time threat models for systematic and continuous risk assessment
S Verreydt, DV Landuyt, W Joosen - Software and Systems Modeling, 2024 - Springer
Threat modeling involves systematically assessing the likelihood and potential impact of
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …
Understanding user privacy expectations: A software developer's perspective
AR Senarath, NAG Arachchilage - Telematics and Informatics, 2018 - Elsevier
Software developers are trained to develop and design software applications that provide
services to users. However, software applications sometimes collect users' data without their …
services to users. However, software applications sometimes collect users' data without their …