Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privacy by design

Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process. The concept is an… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
‘Privacy by design’ is an increasingly popular paradigm. It is the principle or concept that privacy should be promoted as a… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Nigel Davies and Marc Langheinrich explore one of the greatest challenges in ubiquitous systemsa#x2014;how to provide smart… Expand
Is this relevant?
2012
2012
The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Privacy by design is the international standard for assuring privacy in the information era. In this paper a privacy by design… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The design and implementation of privacy requirements in systems is a difficult problem and requires the translation of complex… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six… Expand
Is this relevant?