Privacy and Identity Management

Privacy and Identity Management

17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30-September 2, 2022, Proceedings

Schiering, Ina; Weich, Andreas; Meyer, Joachim; Pape, Sebastian; Bieker, Felix

Springer International Publishing AG

06/2024

215

Mole

9783031319730

15 a 20 dias

Descrição não disponível.
Keynote Paper.- How to Build Organisations for Privacy-Friendly Solutions.- Workshop and Tutorial Papers. -Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning.- From Research to Privacy-Preserving Industry Applications.- What is there to criticize about voice, speech and face recognition and how to structure the critique.- Raising awareness for privacy risks and supporting protection in the light of digital inequalities.- The Hitchhiker's Guide to the Social Media Data Research Galaxy - a Primer.- Selected Student Papers. -Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis.- Promises and Problems in the Adoption of Self-Sovereign Identity Management from a Consumer Perspective.- Usability Evaluation of SSI Digital Wallets.- Influence of Privacy Knowledge on Privacy Attitudes in the Domain of Location-Based Services.- Privacy and data protection in the era of recommendation systems: a postphenomenological approach.- The DMA and the GDPR: Making Sense of Data Accumulation, Cross-Use and Data Sharing Provisions.- Towards Assessing Features of Dark Patterns in Cookie Consent Processes.- Accessibility statements and data protection notices: what can data protection law learn from the concept of accessibility.- SeCCA: Towards Privacy-preserving Biclustering Algorithm with Homomorphic Encryptions.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;authentication;computer networks;data security;cryptography;data communication systems;ata mining;digital sovereignty;GDPR;general data protection regulation;information security;network protocols;network security;privacy;privacy awareness;security systems;signal processing