


default search action
Privacy and Identity Management 2019: Windisch, Switzerland
- Michael Friedewald

, Melek Önen
, Eva Lievens
, Stephan Krenn
, Samuel Fricker:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 576, Springer 2020, ISBN 978-3-030-42503-6
Invited Papers
- Daniel Bachlechner, Marc van Lieshout, Tjerk Timan

:
Privacy as Enabler of Innovation. 3-16 - Francien Dechesne

:
Fair Enough? On (Avoiding) Bias in Data, Algorithms and Decisions. 17-26
Workshop and Tutorial Papers
- Eva Schlehahn, Patrick Murmann, Farzaneh Karegar, Simone Fischer-Hübner:

Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics. 29-44 - Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno:

Identity Management: State of the Art, Challenges and Perspectives. 45-62 - Monir Azraoui, Muhammad Barham, Beyza Bozdemir, Sébastien Canard, Eleonora Ciceri, Orhan Ermis, Ramy Masalha, Marco Mosconi, Melek Önen, Marie Paindavoine, Boris Rozenberg, Bastien Vialla, Sauro Vicini

:
SoK: Cryptography for Neural Networks. 63-81 - Alessandra Bagnato

, Paulo Silva
, Ala Sarah Alaqra, Orhan Ermis:
Workshop on Privacy Challenges in Public and Private Organizations. 82-89 - Glen Joris

, Camiel Colruyt, Judith Vermeulen
, Stefaan Vercoutere, Frederik De Grove, Kristin Van Damme, Orphée De Clercq, Cynthia Van Hee, Lieven De Marez, Véronique Hoste, Eva Lievens, Toon De Pessemier, Luc Martens:
News Diversity and Recommendation Systems: Setting the Interdisciplinary Scene. 90-105
Language and Privacy
- Jens Hjort Schwee

, Fisayo Caleb Sangogboye
, Aslak Johansen
, Mikkel Baun Kjærgaard
:
Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing. 109-125 - Joseph Bugeja

, Andreas Jacobsson:
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces. 126-141 - Shukun Tokas, Olaf Owe

, Toktam Ramezanifarkhani:
Language-Based Mechanisms for Privacy-by-Design. 142-158
Law, Ethics and AI
- Júlia Zomignani Barboza, Lina Jasmontaite-Zaniewicz, Laurence Diver

:
Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data Protection. 161-176 - Oguz Özgür Karadeniz, Stefan Schiffner:

Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software. 177-189 - Judith Vermeulen

:
Recommended for You: "You Don't Need No Thought Control". An Analysis of News Personalisation in Light of Article 22 GDPR. 190-205
Biometrics and Privacy
- Giuseppe Garofalo

, Davy Preuveneers, Wouter Joosen:
Data Privatizer for Biometric Applications and Online Identity Management. 209-225 - Jacob Leon Kröger

, Otto Hans-Martin Lutz, Florian Müller:
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. 226-241 - Jacob Leon Kröger

, Otto Hans-Martin Lutz, Philip Raschke:
Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference. 242-258 - Mohamed Abomhara

, Sule Yildirim Yayilgan
, Marina Shalaginova, Zoltán Székely
:
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute. 259-271
Tools Supporting Data Protection Compliance
- Johanna Johansen

, Simone Fischer-Hübner:
Making GDPR Usable: A Model to Support Usability Evaluations of Privacy. 275-291 - Jens Wettlaufer, Hervais Simo:

Decision Support for Mobile App Selection via Automated Privacy Assessment. 292-307 - Salimeh Dashti, Silvio Ranise:

Tool-Assisted Risk Analysis for Data Protection Impact Assessment. 308-324
Privacy Classification and Security Assessment
- Frank Ebbers:

How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors. 327-342 - Kalle Hjerppe

, Jukka Ruohonen
, Ville Leppänen
:
Annotation-Based Static Analysis for Personal Data Protection. 343-358 - Yefim Shulman

, Thao Ngo
, Joachim Meyer
:
Order of Control and Perceived Control over Personal Information. 359-375 - Michael Schmid

, Sebastian Pape
:
Aggregating Corporate Information Security Maturity Levels of Different Assets. 376-392
Privacy Enhancing Technologies in Specific Contexts
- Teresa Anna Steiner

:
Differential Privacy in Online Dating Recommendation Systems. 395-410 - Philipp Lüthi, Thibault Gagnaux, Marcel Gygli

:
Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets. 411-426 - Chathurangi Ishara Wickramasinghe, Delphine Reinhardt

:
A Survey-Based Exploration of Users' Awareness and Their Willingness to Protect Their Data with Smart Objects. 427-446 - Tom Lorenz, Ina Schiering

:
Privacy in Location-Based Services and Their Criticality Based on Usage Context. 462-478

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














