Skip to main content

Showing 1–4 of 4 results for author: Paja, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.06406  [pdf

    cs.SE

    Consent verification monitoring

    Authors: Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini

    Abstract: Advances in service personalization are driven by low-cost data collection and processing, in addition to the wide variety of third-party frameworks for authentication, storage, and marketing. New privacy regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), increasingly require organizations to explicitly state their data practices in p… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: Accepted 5 October 2021 to ACM Transactions on Software Engineering and Methodology (TOSEM), to appear in print in January 2023 issue

  2. arXiv:2105.09312  [pdf, other

    cs.DB

    Knowledge-driven Data Ecosystems Towards Data Transparency

    Authors: Sandra Geisler, Maria-Esther Vidal, Cinzia Cappiello, Bernadette Farias Lóscio, Avigdor Gal, Matthias Jarke, Maurizio Lenzerini, Paolo Missier, Boris Otto, Elda Paja, Barbara Pernici, Jakob Rehof

    Abstract: A Data Ecosystem offers a keystone-player or alliance-driven infrastructure that enables the interaction of different stakeholders and the resolution of interoperability issues among shared data. However, despite years of research in data governance and management, trustability is still affected by the absence of transparent and traceable data-driven pipelines. In this work, we focus on requiremen… ▽ More

    Submitted 21 May, 2021; v1 submitted 19 May, 2021; originally announced May 2021.

  3. arXiv:2104.04030  [pdf, other

    cs.CR

    A Mixed-method Study on Security and Privacy Practices in Danish Companies

    Authors: Asmita Dalela, Saverio Giallorenzo, Oksana Kulyk, Jacopo Mauro, Elda Paja

    Abstract: Increased levels of digitalization in society expose companies to new security threats, requiring them to establish adequate security and privacy measures. Additionally, the presence of exogenous forces like new regulations, e.g., GDPR and the global COVID-19 pandemic, pose new challenges for companies that should preserve an adequate level of security while having to adapt to change. In this pape… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  4. arXiv:2007.05259  [pdf, other

    cs.CR cs.CY

    "It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark

    Authors: Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja

    Abstract: Although Denmark is reportedly one of the most digitised countries in Europe, IT security in Danish companies has not followed along. To shed light into the challenges that companies experience with implementing IT security, we conducted a preliminary study running semi-structured interviews with four employees from four different companies, asking about their IT security and what they need to red… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.