000868383 000__ 05226cam\a2200529Ii\4500 000868383 001__ 868383 000868383 005__ 20230306145855.0 000868383 006__ m\\\\\o\\d\\\\\\\\ 000868383 007__ cr\cn\nnnunnun 000868383 008__ 190502s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000868383 020__ $$a9783030167448$$q(electronic book) 000868383 020__ $$a3030167445$$q(electronic book) 000868383 020__ $$z9783030167431 000868383 0247_ $$a10.1007/978-3-030-16744-8$$2doi 000868383 035__ $$aSP(OCoLC)on1099658769 000868383 035__ $$aSP(OCoLC)1099658769 000868383 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU 000868383 049__ $$aISEA 000868383 050_4 $$aQA76.9.A25 000868383 08204 $$a005.8$$223 000868383 1112_ $$aIFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School$$n(13th :$$d2018 :$$cVienna, Austria) 000868383 24510 $$aPrivacy and identity management :$$bfairness, accountability, and transparency in the age of big data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised selected papers /$$cEleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn (eds.). 000868383 264_1 $$aCham :$$bSpringer,$$c2019. 000868383 300__ $$a1 online resource (x, 291 pages) :$$billustrations 000868383 336__ $$atext$$btxt$$2rdacontent 000868383 337__ $$acomputer$$bc$$2rdamedia 000868383 338__ $$aonline resource$$bcr$$2rdacarrier 000868383 4901_ $$aIFIP Advances in information and communication technology ;$$v547 000868383 500__ $$aIncludes author index. 000868383 50500 $$a[I].$$tKeynotes and invited papers:$$g1.$$tA causal Bayesian networks viewpoint on fairness /$$rSilvia Chiappa, William S. Isaac --$$g2.$$tSharing is caring, a boundary object approach to mapping and discussing personal data processing /$$rRob Heyman. 000868383 50580 $$g[II].$$tWorkshop and tutorial papers:$$g3.$$tWho you gonna call when there's something wrong in your processing? Risk assessment and data breach notifications in practice /$$rSusan Gonscherowski, Felix Bieker --$$g4.$$tDesign and security assessment of usable multi-factor authentication and single sign-on solutions for mobile applications : a workshop experience report /$$rRoberto Carbone, Silvio Ranise, Giada Sciarretta --$$g5.$$tTowards empowering the human for privacy online /$$rKovila P.L. Coopamootoo --$$g6.$$tTrust and distrust : on sense and nonsense in big data /$$rStefan Rass, Andreas Schorn, Florian Skopik --$$g7.$$tGDPR transparency requirements and data privacy vocabularies /$$rEva Schlehahn, Rigo Wenning --$$g8.$$tWider research applications of dynamic consent /$$rArianna Schuler Scott, Michael Goldsmith, Harriet Teare. 000868383 50580 $$g[III].$$tSelected papers:$$g9.$$tGlycos : the basis for a peer-to-peer, private online social network /$$rRuben De Smet, Ann Dooms, An Braeken, Jo Pierson --$$g10.$$tGDPR and the concept of risk : the role of risk, the scope of risk and the technology involved /$$rKaterina Demetzou --$$g11.$$tPrivacy patterns for pseudonymity /$$rAlexander Gabel, Ina Schiering --$$g12.$$tImplementing GDPR in the charity sector : a case study /$$rJane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary --$$g13.$$tMe and my robot : sharing information with a new friend /$$rTanja Heuer, Ina Schiering, Reinhard Gerndt --$$g14.$$tchownIoT : enhancing IoT privacy by automated handling of ownership change /$$rMd Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger, N. Asokan --$$g15.$$tIs privacy controllable? /$$rYefim Shulman, Joachim Meyer --$$g16.$$tAsessing theories for research on personal data transparency /$$rAnette Siebenkäs, Dirk Stelzer --$$g17.$$tData protection by design for cross-border electronic identification : does the eIDAS interoperability framework need to be modernised? /$$rNiko Tsakalakis, Sophie Stalla-Bourdillon, Kieron O'Hara --$$g18.$$tRisk profiling by law enforcement agencies in the big data era : is there a need for transparency? /$$rSascha van Schendel. 000868383 506__ $$aAccess limited to authorized users. 000868383 520__ $$aThis book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. --$$cProvided by publisher. 000868383 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 2, 2019). 000868383 650_0 $$aComputer security$$vCongresses. 000868383 650_0 $$aBig data$$vCongresses. 000868383 7001_ $$aKosta, Eleni,$$eeditor. 000868383 7001_ $$aPierson, Jo,$$eeditor. 000868383 7001_ $$aSlamanig, Daniel,$$eeditor. 000868383 7001_ $$aFischer-Hübner, Simone,$$eeditor. 000868383 7001_ $$aKrenn, Stephan,$$eeditor. 000868383 830_0 $$aIFIP advances in information and communication technology ;$$v547. 000868383 852__ $$bebk 000868383 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-16744-8$$zOnline Access$$91397441.1 000868383 909CO $$ooai:library.usi.edu:868383$$pGLOBAL_SET 000868383 980__ $$aEBOOK 000868383 980__ $$aBIB 000868383 982__ $$aEbook 000868383 983__ $$aOnline 000868383 994__ $$a92$$bISE