000 05680nam a22006495i 4500
001 978-3-031-57978-3
003 DE-He213
005 20240730171917.0
007 cr nn 008mamaa
008 240422s2024 sz | s |||| 0|eng d
020 _a9783031579783
_9978-3-031-57978-3
024 7 _a10.1007/978-3-031-57978-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aPrivacy and Identity Management. Sharing in a Digital World
_h[electronic resource] :
_b18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers /
_cedited by Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXI, 342 p. 78 illus., 66 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v695
505 0 _aKeynote Papers -- Blueprints for Deploying Privacy Enhancing Technologies in E-government -- The effacement of information technology from EU law: the need for collaborative approaches to redesign the EU's regulatory architecture -- Selected Student Papers -- Towards an Affordance-Based Typology of Personal Data Stores -- Assuring GDPR Conformance through Language-Based Compliance -- User Interaction Data in Apps: Comparing Policy Claims to Implementations -- Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development -- Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal -- Educating Parents in Managing Online Privacy Risks: Media Educators' Perspectives -- A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research -- Who is the attacker - Analyzing data protection violations in health care -- Towards privacy-preserving machine learning in sovereign data spaces: opportunities and challenges -- Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement -- Non-Interactive Authentication Scheme for Vehicular Ad-hoc Networks: Security, Privacy, and Accountability -- Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem -- Enhancing transparency through Personal Information Management Systems: current state of service offerings and considerations for further advancements -- User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT -- Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning -- Empirical Evaluation of Synthetic Data Generated by GANs and Diffusion Models.-How much is your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context -- Workshop and Tutorial Papers -- Private Training Approaches - A Primer -- Workshop on Cybersecurity of Critical Infrastructures.
520 _aThis book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Oslo, Norway during August 8 - 11, 2023. The 21 full papers, including 2 workshops papers, presented in this book were carefully reviewed and selected from 30 submissions. The proceedings also contain two invited talks. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aComputers.
_98172
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9100853
650 2 4 _aComputing Milieux.
_955441
650 2 4 _aCryptology.
_931769
700 1 _aBieker, Felix.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100856
700 1 _ade Conca, Silvia.
_eeditor.
_0(orcid)
_10000-0002-9356-9815
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100857
700 1 _aGruschka, Nils.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100858
700 1 _aJensen, Meiko.
_eeditor.
_0(orcid)
_10009-0003-2397-9813
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100859
700 1 _aSchiering, Ina.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100860
710 2 _aSpringerLink (Online service)
_9100862
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031579776
776 0 8 _iPrinted edition:
_z9783031579790
776 0 8 _iPrinted edition:
_z9783031579806
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v695
_9100863
856 4 0 _uhttps://doi.org/10.1007/978-3-031-57978-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87880
_d87880