|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Felix Bieker , Silvia de Conca , Nils Gruschka , Meiko JensenPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Volume: 695 ISBN: 9783031579776ISBN 10: 3031579771 Pages: 342 Publication Date: 23 April 2024 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsKeynote Papers.- Blueprints for Deploying Privacy Enhancing Technologies in E-government.- The effacement of information technology from EU law: the need for collaborative approaches to redesign the EU’s regulatory architecture.- Selected Student Papers.- Towards an Affordance-Based Typology of Personal Data Stores.- Assuring GDPR Conformance through Language-Based Compliance.- User Interaction Data in Apps: Comparing Policy Claims to Implementations.- Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development.- Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal.- Educating Parents in Managing Online Privacy Risks: Media Educators’ Perspectives.- A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research.- Who is the attacker - Analyzing data protection violations in health care.- Towards privacy-preserving machine learning in sovereign data spaces: opportunities and challenges.- Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement.- Non-Interactive Authentication Scheme for Vehicular Ad-hoc Networks: Security, Privacy, and Accountability.- Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem.- Enhancing transparency through Personal Information Management Systems: current state of service offerings and considerations for further advancements.- User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT.- Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning.- Empirical Evaluation of Synthetic Data Generated by GANs and Diffusion Models.-How much is your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context.- Workshop and Tutorial Papers.- Private Training Approaches - A Primer.- Workshop on Cybersecurity of Critical Infrastructures.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |