Privacy Technologies and Policy

5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers
 Paperback
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I
Alle Preise inkl. MwSt. | Versandkostenfrei
Nicht verfügbar Zum Merkzettel
Gewicht:
382 g
Format:
235x155x14 mm
Beschreibung:

Includes supplementary material: sn.pub/extras
The GDPR and Big Data: leading the way for Big Genetic Data?.- Towards a Privacy-preserving Reliable European Identity Ecosystem.- Forget Me, Forget Me Not - Redefining the Boundaries of the Right to be Forgotten to Address Current Problems and Areas of Criticism.- A Refinement Approach for the Reuse of Privacy Risk Analysis Results.- Neutralisation and Anonymization.- Gamified Approach to explore Techniques of Neutralization of Threat Actors in Cybercrime.- Design Data Exchange between CSIRTs.- Mr X vs. Mr Y: the Emergence of Externalities in Differential Privacy.- High-Utility Database Anonymization.- Privacy Policies in Practice.- Towards a Principled Approach for Engineering Privacy by Design.-  PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.- Privacy Data Management and Awareness for Public Administrations: a Case Study from the Healthcare Domain.- Better Data Protection by Design through Multicriteria Decision Making: On False Tradeoffs between Privacy and Utility.

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.