Login / Signup
Exploring how experienced and unexperienced professionals use a privacy threat modeling methodology.
Andrey Antonio Rodrigues
Maria Lúcia Bento Villela
Eduardo Feitosa
Published in:
J. Interact. Syst. (2023)
Keyphrases
</>
information systems
discrete event simulation
information technology
privacy preserving
privacy issues
computer science
data sets
modeling method
end users
security concerns
security risks
security issues
model driven
bayesian networks
artificial intelligence
data mining
databases