Privacy and Identity Management. Data for Better Living: AI and Privacy [E-Book] : 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers / edited by Michael Friedewald, Melek nen, Eva Lievens, Stephan Krenn, Samuel Fricker.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submis...
Saved in:
Full text |
|
Personal Name(s): | Fricker, Samuel, editor |
Friedewald, Michael, editor / Krenn, Stephan, editor / Lievens, Eva, editor / nen, Melek, editor | |
Edition: |
1st edition 2020 |
Imprint: |
Cham :
Springer,
2020
|
Physical Description: |
XI, 480 pages 196 illustrations, 46 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030425043 |
DOI: |
10.1007/978-3-030-42504-3 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
IFIP AICT Tutorials ;
576 |
Subject (ZB): | |
Subject (LOC): | |
Classification: |
LEADER | 05838nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-42504-3 | ||
003 | Springer | ||
008 | 200310s2020 gw | s |||| 0|eng d | ||
020 | |a 9783030425043 | ||
024 | 7 | |a 10.1007/978-3-030-42504-3 |2 doi | |
035 | |a (Sirsi) a850944 | ||
035 | |a (Sirsi) a850944 | ||
041 | |a eng | ||
082 | 0 | 4 | |a 005.8 |2 23 |
084 | 0 | |a DZE - Data privacy, data security | |
245 | 1 | 0 | |a Privacy and Identity Management. Data for Better Living: AI and Privacy |h [E-Book] : |b 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers / |c edited by Michael Friedewald, Melek nen, Eva Lievens, Stephan Krenn, Samuel Fricker. |
250 | |a 1st edition 2020 | ||
264 | 1 | |a Cham : |b Springer, |c 2020 |e (Springer LINK) |f SpringerComputerScience20210423 | |
300 | |a XI, 480 pages 196 illustrations, 46 illustrations in color (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | |a IFIP AICT Tutorials ; |v 576 | ||
500 | |a englisch | ||
505 | 0 | |a Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software -- Recommended for you: "You don't need no thought control" - An analysis of news personalisation in light of Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection -- Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context. | |
520 | |a This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com. | ||
596 | |a 1 | ||
650 | 0 | |a Application software. | |
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Data mining. | |
650 | 4 | |a biometry | |
650 | 4 | |a computer network | |
650 | 4 | |a cryptography | |
650 | 4 | |a data communication | |
650 | 4 | |a identification | |
650 | 4 | |a law | |
650 | 4 | |a personal right | |
650 | 4 | |a protection | |
650 | 4 | |a security | |
650 | 4 | |a software engineering | |
700 | 1 | |a Fricker, Samuel, |e editor | |
700 | 1 | |a Friedewald, Michael, |e editor | |
700 | 1 | |a Krenn, Stephan, |e editor | |
700 | 1 | |a Lievens, Eva, |e editor | |
700 | 1 | |a nen, Melek, |e editor | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-42504-3 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ3 | ||
932 | |a Computer Science (R0) (SpringerNature-43710) | ||
932 | |a Computer Science (SpringerNature-11645) | ||
949 | |a XX(850944.1) |w AUTO |c 1 |i 850944-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 23/4/2021 |x ZB-D |z UNKNOWN |1 ONLINE |2 KONFERENZ |