Projects
Privacy engineering methods for software development KU Leuven
To enhance the security and privacy maturity of software systems, an increasing security and privacy effort is being spent in the early phases of software development. This ongoing paradigm shift (security-by-design and privacy-by-design) demands for novel privacy engineering techniques to underpin the software engineering activities, such privacy threat modeling, architectural privacy analysis and privace-aware design patterns. In this ...
Analysis of user privacy in online location-based services KU Leuven
Location-based services (LBSs) have transformed social interactions and personal experiences in the digital landscape. The widespread adoption of smartphones, equipped with GPS sensors, has been instrumental in the rapid integration of LBSs into our daily lives. Notably, LBSs stand as among the most popular applications on major app stores, appreciated by users for their capacity to enhance social connectivity. These services enable users to ...
Personalised advertising on social networking sites: the interplay between advertising effectiveness and the user's privacy concern. University of Antwerp
Critical and playful subjectivity in networked families: Investigating family privacy practices, norms and smart home technology Ghent University
New technologies that drive on personal information have made an entry into the family household (e.g., intelligent personal assistents, smart toys, tracking technologie) and are involved in processes that relate to surveillance and privacy. The datafication of childhood and parenthood, the normalization of networked and smart home technologies as partners of socialization and changing parental mediation styles with a focus on monitoring ...
Security and Privacy for Cyber-Physical Systems and the Internet of Things KU Leuven
Internet connectivity has been extending its reach from servers and clients into mobile devices, consumer products and increasingly also embedded systems that connect to industrial processes, vehicles, home automation, and even the human body. The resulting cyber-physical systems create a huge potential for the development of smarter and more efficient manufacturing, tele-medecine, traffic management and so forth. Maintaining security and ...
children’s rights perspective on privacy and data protection in the digital age: a critical and forward-looking analysis of the General Data Protection Regulation and its implementation with respect to children and youth Ghent University
project aims to examine whether and how the rights to privacy and data protection for children in the digital age should be re-thought. It proposes a critical evaluation of the 2016 EU General Data Protection Regulation, its implementation and its impact on the protection and participation of children and youth in the information society.
SAGACITY: SustAinable data GovernAnce: Contextual InTegrity as privacY management tool. KU Leuven
Expected outcome:
• Guidelines for assessing privacy risks based on context and economic value of data
• Privacy/Security metrics (context is used as a yardstick to build these metrics)
• SW based on semantic technologies to attach attributes (context) to data. Data travel encapsulated
• Interface with users (privacy-friendly/raise awareness/transparency): the “Trust thermometer” +
provides information on the ...
Traffic Analysis Resistant Privacy Enhancing Technologies. KU Leuven
This project will focus on systematizing the modeling, analysis and design of TAR systems. The main applications to be considered are: anonymous communications systems, location privacy technologies, privacy preserving social networking, and web search. Our goals are
- to model and formalize TAR properties, mechanisms, and threats in these diverse application domains
- to study trac data leakages and identify the key features ...
Privacy preserving data and knowledge fusion in personalized biomedicine KU Leuven
In our research we will investigate privacy preserving data and knowledge fusion methods in personalized medicine, and specifically privacy preservation at both levels: at the level of a single data set containing potentially sensitive, personal samples and in a multi-centric context with distributed, privately owned data sets.