Iwaya, Leonardo H Alaqra, Ala Sarah Hansen, Marit Fischer-Hübner, Simone
Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effecti...
Pailler, Ludovic Tchana, Alain Combemale, Benoît
International audience
Blanchard, Enka Gabasova, Levi
Public institutions and private companies both frequently rely on user surveys for a variety of assessments (e.g. equality issues or quality of work environment). However, many such surveys struggle to garner sufficient responses, especially when they ask about sensitive subjects (such as work harassment), which also makes them exist in a legal gre...
Iwaya, Leonardo Horn Babar, M Ali Rashid, Awais Wijayarathna, Chamila
Published in
Empirical software engineering
An increasing number of mental health services are now offered through mobile health (mHealth) systems, such as in mobile applications (apps). Although there is an unprecedented growth in the adoption of mental health services, partly due to the COVID-19 pandemic, concerns about data privacy risks due to security breaches are also increasing. Whils...
Pailler, Ludovic Tchana, Alain Combemale, Benoit
Les enjeux d’une protection effective des données ne peuvent être relevés par le seul droit. La nécessité avérée d’une alliance à la technique a mené au projet de construction d’un système d’exploitation incorporant les règles de protection des données parce qu’il est l’intermédiaire entre le traitement et la donnée. Trois idées centrales structure...
Altman, Micah Cohen, Aloni
Published in
PeerJ. Computer science
We introduce "Natural" differential privacy (NDP)-which utilizes features of existing hardware architecture to implement differentially private computations. We show that NDP both guarantees strong bounds on privacy loss and constitutes a practical exception to no-free-lunch theorems on privacy. We describe how NDP can be efficiently implemented an...
Dzurenda, Petr Jacques, Florian Knockaert, Manon Laurent, Maryline Malina, Lukas Matulevicius, Raimundas Tang, Qiang Tasidou, Aimilia
Today, many modern cities adopt online smart parking services as best practices. Citizens can easily access these services using their smartphones or the infotainment panels in their cars. These services’ primary objective is to give drivers the ability to quickly identify free parking slots, which should reduce parking time, save fuel, and relieve...
Newton, Natasha Bertelli, Virginia Petersen, Laura
This paper provides the results of the privacy impact assessment conducted for the PROACTIVE solutions and its subsequent privacy by design integration process. PROACTIVE is a solution for fostering coordination and communication between stakeholders before and during CBRNe events focusing on providing guidance to vulnerable populations. Based on e...
Lamari, Selena Benblidia, Nadjia Tibermacine, Chouki Urtado, Christelle Vauttier, Sylvain
Today, the mine vast troves of personal data contained in applications raises the issue of user privacy. Indeed, privacy is increasingly threatened by the spread of unethical practices by device and service providers. Despite the existence of privacy preservation standards such as the European General Data Protection Regulation (GDPR), effective si...
Arizon-Peretz, Renana Hadar, Irit Luria, Gil Sherman, Sofia
Published in
Empirical Software Engineering
Privacy and security by design are policy measures that guide software developers to engineer privacy and security solutions inherently into the software systems they develop. However, although these policy measures have been widely discussed and promoted over the years, recent studies still show a consistent underperformance of privacy and securit...