Privacy and identity management : the smart revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised selected papers /: the smart revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised selected papers. (2018)
- Record Type:
- Book
- Title:
- Privacy and identity management : the smart revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised selected papers /: the smart revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised selected papers. (2018)
- Main Title:
- Privacy and identity management : the smart revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised selected papers
- Further Information:
- Note: Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner (eds.).
- Editors:
- Hansen, Marit
Kosta, Eleni
Nai-Fovino, Igor
Fischer-Hübner, Simone - Other Names:
- IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, 12th
- Contents:
- The Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmful? Re-examining Privacy Concerns -- Forget About Privacy ... or Not? -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots -- A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokémon Go Players inThe Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmful? Re-examining Privacy Concerns -- Forget About Privacy ... or Not? -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots -- A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokémon Go Players in Germany -- mHealth Applications for Goal Management Training – Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xi, 371 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Access control -- Congresses
Computer networks -- Access control
Computer security
Computer Science
Systems and Data Security
Computers -- Security -- General
Computers -- Social Aspects -- General
Computers -- User Interfaces
Computers -- Intelligence (AI) & Semantics
Computers -- Hardware -- General
Computer security
Ethical & social aspects of IT
User interface design & usability
Artificial intelligence
Computer networking & communications
Data protection
Artificial intelligence
Computer network architectures
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319929255
3319929259 - Related ISBNs:
- 9783319929248
3319929240 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed June 14, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.336078
- Ingest File:
- 01_283.xml