000891787 000__ 02853cam\a2200577Ii\4500 000891787 001__ 891787 000891787 005__ 20230306150221.0 000891787 006__ m\\\\\o\\d\\\\\\\\ 000891787 007__ cr\cn\nnnunnun 000891787 008__ 190703s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000891787 019__ $$a1106164780 000891787 020__ $$a9783030217525$$q(electronic book) 000891787 020__ $$a3030217523$$q(electronic book) 000891787 020__ $$z9783030217518 000891787 0247_ $$a10.1007/978-3-030-21752-5$$2doi 000891787 0247_ $$a10.1007/978-3-030-21 000891787 035__ $$aSP(OCoLC)on1107230429 000891787 035__ $$aSP(OCoLC)1107230429$$z(OCoLC)1106164780 000891787 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dLQU$$dUKMGB 000891787 049__ $$aISEA 000891787 050_4 $$aQA76.9.A25 000891787 08204 $$a005.8$$223 000891787 1112_ $$aAnnual Privacy Forum$$n(7th :$$d2019 :$$cRome, Italy) 000891787 24510 $$aPrivacy technologies and policy :$$b7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings /$$cMaurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.). 000891787 2463_ $$aAPF 2019 000891787 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000891787 300__ $$a1 online resource (xii, 211 pages) :$$billustrations. 000891787 336__ $$atext$$btxt$$2rdacontent 000891787 337__ $$acomputer$$bc$$2rdamedia 000891787 338__ $$aonline resource$$bcr$$2rdacarrier 000891787 4901_ $$aLecture notes in computer science ;$$v11498 000891787 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000891787 500__ $$aInternational conference proceedings. 000891787 500__ $$aIncludes author index. 000891787 506__ $$aAccess limited to authorized users. 000891787 520__ $$aThis book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications. 000891787 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 3, 2019). 000891787 650_0 $$aComputer security$$vCongresses. 000891787 650_0 $$aData encryption (Computer science)$$vCongresses. 000891787 650_0 $$aData protection$$vCongresses. 000891787 7001_ $$aNaldi, Maurizio,$$eeditor. 000891787 7001_ $$aItaliano, Giuseppe F.,$$eeditor. 000891787 7001_ $$aRannenberg, Kai,$$eeditor. 000891787 7001_ $$aMedina, Manel,$$eeditor. 000891787 7001_ $$aBourka, Athena,$$eeditor. 000891787 830_0 $$aLecture notes in computer science ;$$v11498. 000891787 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000891787 852__ $$bebk 000891787 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-21752-5$$zOnline Access$$91397441.1 000891787 909CO $$ooai:library.usi.edu:891787$$pGLOBAL_SET 000891787 980__ $$aEBOOK 000891787 980__ $$aBIB 000891787 982__ $$aEbook 000891787 983__ $$aOnline 000891787 994__ $$a92$$bISE