聪明 发表于 2025-3-27 00:41:58
http://reply.papertrans.cn/88/8703/870240/870240_31.pngATP861 发表于 2025-3-27 02:46:51
Socio-Technical Aspects in Security and Trust978-3-030-55958-8Series ISSN 0302-9743 Series E-ISSN 1611-3349fabricate 发表于 2025-3-27 07:42:33
http://reply.papertrans.cn/88/8703/870240/870240_33.pngCommodious 发表于 2025-3-27 11:40:00
https://doi.org/10.1007/978-3-030-55958-8access control; artificial intelligence; authentication; computer hardware; computer networks; computer s尾随 发表于 2025-3-27 16:05:24
Which Properties Has an Icon? A Critical Discussion on Data Protection Iconographyr,” several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12’s transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article.initiate 发表于 2025-3-27 18:48:12
http://reply.papertrans.cn/88/8703/870240/870240_36.png完成 发表于 2025-3-27 22:20:33
Gianpiero Costantino,Fabio Martinelli,Ilaria Matteucci,Paolo Santiprediabetes 发表于 2025-3-28 05:09:59
Julissa Milligan,Sarah Scheffler,Andrew Sellars,Trishita Tiwari,Ari Trachtenberg,Mayank VariaDebrief 发表于 2025-3-28 07:08:49
http://reply.papertrans.cn/88/8703/870240/870240_39.pngIrrepressible 发表于 2025-3-28 12:11:26
Data, Data, Everywhere: Quantifying Software Developers’ Privacy Attitudes further discuss mismatches between developers’ attitudes and their self-perceived extent of properly handling their users’ privacy, and the importance of understanding developers’ attitudes towards data monetization.