


default search action
Privacy and Identity Management 2019: Windisch, Switzerland
- Michael Friedewald
, Melek Önen
, Eva Lievens
, Stephan Krenn
, Samuel Fricker:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 576, Springer 2020, ISBN 978-3-030-42503-6
Invited Papers
- Daniel Bachlechner, Marc van Lieshout, Tjerk Timan
:
Privacy as Enabler of Innovation. 3-16 - Francien Dechesne
:
Fair Enough? On (Avoiding) Bias in Data, Algorithms and Decisions. 17-26
Workshop and Tutorial Papers
- Eva Schlehahn, Patrick Murmann, Farzaneh Karegar, Simone Fischer-Hübner:
Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics. 29-44 - Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno:
Identity Management: State of the Art, Challenges and Perspectives. 45-62 - Monir Azraoui, Muhammad Barham, Beyza Bozdemir, Sébastien Canard, Eleonora Ciceri, Orhan Ermis, Ramy Masalha, Marco Mosconi, Melek Önen, Marie Paindavoine, Boris Rozenberg, Bastien Vialla, Sauro Vicini
:
SoK: Cryptography for Neural Networks. 63-81 - Alessandra Bagnato
, Paulo Silva
, Ala Sarah Alaqra, Orhan Ermis:
Workshop on Privacy Challenges in Public and Private Organizations. 82-89 - Glen Joris
, Camiel Colruyt, Judith Vermeulen
, Stefaan Vercoutere, Frederik De Grove, Kristin Van Damme, Orphée De Clercq, Cynthia Van Hee, Lieven De Marez, Véronique Hoste, Eva Lievens, Toon De Pessemier, Luc Martens:
News Diversity and Recommendation Systems: Setting the Interdisciplinary Scene. 90-105
Language and Privacy
- Jens Hjort Schwee
, Fisayo Caleb Sangogboye
, Aslak Johansen
, Mikkel Baun Kjærgaard
:
Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing. 109-125 - Joseph Bugeja
, Andreas Jacobsson:
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces. 126-141 - Shukun Tokas, Olaf Owe
, Toktam Ramezanifarkhani:
Language-Based Mechanisms for Privacy-by-Design. 142-158
Law, Ethics and AI
- Júlia Zomignani Barboza, Lina Jasmontaite-Zaniewicz, Laurence Diver
:
Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data Protection. 161-176 - Oguz Özgür Karadeniz, Stefan Schiffner:
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software. 177-189 - Judith Vermeulen
:
Recommended for You: "You Don't Need No Thought Control". An Analysis of News Personalisation in Light of Article 22 GDPR. 190-205
Biometrics and Privacy
- Giuseppe Garofalo
, Davy Preuveneers, Wouter Joosen:
Data Privatizer for Biometric Applications and Online Identity Management. 209-225 - Jacob Leon Kröger
, Otto Hans-Martin Lutz, Florian Müller:
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. 226-241 - Jacob Leon Kröger
, Otto Hans-Martin Lutz, Philip Raschke:
Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference. 242-258 - Mohamed Abomhara
, Sule Yildirim Yayilgan
, Marina Shalaginova, Zoltán Székely
:
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute. 259-271
Tools Supporting Data Protection Compliance
- Johanna Johansen
, Simone Fischer-Hübner:
Making GDPR Usable: A Model to Support Usability Evaluations of Privacy. 275-291 - Jens Wettlaufer, Hervais Simo:
Decision Support for Mobile App Selection via Automated Privacy Assessment. 292-307 - Salimeh Dashti, Silvio Ranise:
Tool-Assisted Risk Analysis for Data Protection Impact Assessment. 308-324
Privacy Classification and Security Assessment
- Frank Ebbers:
How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors. 327-342 - Kalle Hjerppe
, Jukka Ruohonen
, Ville Leppänen
:
Annotation-Based Static Analysis for Personal Data Protection. 343-358 - Yefim Shulman
, Thao Ngo
, Joachim Meyer
:
Order of Control and Perceived Control over Personal Information. 359-375 - Michael Schmid
, Sebastian Pape
:
Aggregating Corporate Information Security Maturity Levels of Different Assets. 376-392
Privacy Enhancing Technologies in Specific Contexts
- Teresa Anna Steiner
:
Differential Privacy in Online Dating Recommendation Systems. 395-410 - Philipp Lüthi, Thibault Gagnaux, Marcel Gygli:
Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets. 411-426 - Chathurangi Ishara Wickramasinghe, Delphine Reinhardt
:
A Survey-Based Exploration of Users' Awareness and Their Willingness to Protect Their Data with Smart Objects. 427-446 - Tom Lorenz, Ina Schiering
:
Privacy in Location-Based Services and Their Criticality Based on Usage Context. 462-478

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.