Privacy and Identity Management. Data for Better Living: AI and Privacy 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submis...

Full description

Bibliographic Details
Other Authors: Friedewald, Michael (Editor), Önen, Melek (Editor), Lievens, Eva (Editor), Krenn, Stephan (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2020, 2020
Edition:1st ed. 2020
Series:IFIP AICT Tutorials
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 05324nmm a2200469 u 4500
001 EB001895274
003 EBX01000000000000001058280
005 00000000000000.0
007 cr|||||||||||||||||||||
008 200401 ||| eng
020 |a 9783030425043 
100 1 |a Friedewald, Michael  |e [editor] 
245 0 0 |a Privacy and Identity Management. Data for Better Living: AI and Privacy  |h Elektronische Ressource  |b 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers  |c edited by Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker 
250 |a 1st ed. 2020 
260 |a Cham  |b Springer International Publishing  |c 2020, 2020 
300 |a XI, 480 p. 196 illus., 46 illus. in color  |b online resource 
505 0 |a Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context 
505 0 |a Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software --  
505 0 |a Recommended for you: "You don't need no thought control" – An analysis of news personalisation in lightof Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection --  
653 |a Computer Communication Networks 
653 |a Cryptography 
653 |a Artificial Intelligence 
653 |a Data mining 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Artificial intelligence 
653 |a Cryptology 
653 |a Data Mining and Knowledge Discovery 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a Önen, Melek  |e [editor] 
700 1 |a Lievens, Eva  |e [editor] 
700 1 |a Krenn, Stephan  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a IFIP AICT Tutorials 
028 5 0 |a 10.1007/978-3-030-42504-3 
856 4 0 |u https://doi.org/10.1007/978-3-030-42504-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com