Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/790
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHansen, Marit. ;en_US
dc.contributor.authorKosta, Eleni. ;en_US
dc.contributor.authorNai-Fovino, Igor. ;en_US
dc.contributor.authorFischer-Hebner, Simone. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:07Z-
dc.date.available2020-05-17T08:22:07Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319929255 ;en_US
dc.identifier.isbn9783319929248 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/790-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319929248. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy. ;en_US
dc.description.statementofresponsibilityedited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hebner.en_US
dc.description.tableofcontentsThe Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmfule Re-examining Privacy Concerns -- Forget About Privacy ... or Note -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoTe Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokemon Go Players in Germany -- mHealth Applications for Goal Management Training ee Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. ;en_US
dc.format.extentXI, 371 p. 54 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.haspart9783319929248.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titlePrivacy and Identity Management. The Smart Revolutionen_US
dc.title.alternative12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319929248.pdf12.37 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHansen, Marit. ;en_US
dc.contributor.authorKosta, Eleni. ;en_US
dc.contributor.authorNai-Fovino, Igor. ;en_US
dc.contributor.authorFischer-Hebner, Simone. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:07Z-
dc.date.available2020-05-17T08:22:07Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319929255 ;en_US
dc.identifier.isbn9783319929248 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/790-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319929248. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy. ;en_US
dc.description.statementofresponsibilityedited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hebner.en_US
dc.description.tableofcontentsThe Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmfule Re-examining Privacy Concerns -- Forget About Privacy ... or Note -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoTe Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokemon Go Players in Germany -- mHealth Applications for Goal Management Training ee Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. ;en_US
dc.format.extentXI, 371 p. 54 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.haspart9783319929248.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titlePrivacy and Identity Management. The Smart Revolutionen_US
dc.title.alternative12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319929248.pdf12.37 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHansen, Marit. ;en_US
dc.contributor.authorKosta, Eleni. ;en_US
dc.contributor.authorNai-Fovino, Igor. ;en_US
dc.contributor.authorFischer-Hebner, Simone. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:07Z-
dc.date.available2020-05-17T08:22:07Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319929255 ;en_US
dc.identifier.isbn9783319929248 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/790-
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319929248. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy. ;en_US
dc.description.statementofresponsibilityedited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hebner.en_US
dc.description.tableofcontentsThe Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmfule Re-examining Privacy Concerns -- Forget About Privacy ... or Note -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoTe Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokemon Go Players in Germany -- mHealth Applications for Goal Management Training ee Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID. ;en_US
dc.format.extentXI, 371 p. 54 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology, ; 1868-4238 ; ; 526. ;en_US
dc.relation.haspart9783319929248.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.titlePrivacy and Identity Management. The Smart Revolutionen_US
dc.title.alternative12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319929248.pdf12.37 MBAdobe PDFThumbnail
Preview File