Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These sele...

Full description

Bibliographic Details
Other Authors: Schweighofer, Erich (Editor), Leitold, Herbert (Editor), Mitrakas, Andreas (Editor), Rannenberg, Kai (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2017, 2017
Edition:1st ed. 2017
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03520nmm a2200397 u 4500
001 EB001651714
003 EBX01000000000000000954389
005 00000000000000.0
007 cr|||||||||||||||||||||
008 171103 ||| eng
020 |a 9783319672809 
100 1 |a Schweighofer, Erich  |e [editor] 
245 0 0 |a Privacy Technologies and Policy  |h Elektronische Ressource  |b 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers  |c edited by Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg 
250 |a 1st ed. 2017 
260 |a Cham  |b Springer International Publishing  |c 2017, 2017 
300 |a XIV, 231 p. 59 illus  |b online resource 
505 0 |a The GDPR and Big Data: leading the way for Big Genetic Data? -- Towards a Privacy-preserving Reliable European Identity Ecosystem -- Forget Me, Forget Me Not - Redefining the Boundaries of the Right to be Forgotten to Address Current Problems and Areas of Criticism -- A Refinement Approach for the Reuse of Privacy Risk Analysis Results -- Neutralisation and Anonymization -- Gamified Approach to explore Techniques of Neutralization of Threat Actors in Cybercrime -- Design Data Exchange between CSIRTs -- Mr X vs. Mr Y: the Emergence of Externalities in Differential Privacy -- High-Utility Database Anonymization -- Privacy Policies in Practice -- Towards a Principled Approach for Engineering Privacy by Design -- PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites -- Privacy Data Management  and Awareness for Public Administrations: a Case Study from the Healthcare Domain -- Better Data Protection by Design through Multicriteria Decision Making: On False Tradeoffs between Privacy and Utility 
653 |a Computers and Society 
653 |a Electronic commerce 
653 |a Algorithms 
653 |a Application software 
653 |a Data protection 
653 |a e-Commerce and e-Business 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
653 |a Computers and civilization 
700 1 |a Leitold, Herbert  |e [editor] 
700 1 |a Mitrakas, Andreas  |e [editor] 
700 1 |a Rannenberg, Kai  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-319-67280-9 
856 4 0 |u https://doi.org/10.1007/978-3-319-67280-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 303.4834 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.