Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Windi » książka
Invited Papers.- Privacy as Enabler of Innovation.- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions.- Workshop and Tutorial Papers.- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics.- Identity Management: State of the Art, Challenges and Perspectives.- SoK: Cryptography for Neural Networks.- Workshop on Privacy Challenges in Public and Private Organizations.- News diversity and recommendation systems: Setting the interdisciplinary scene.- Language and Privacy.- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing.- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces.- Language-Based Mechanisms for Privacy by Design.- Law, Ethics and AI.- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software.- Recommended for you: "You don't need no thought control" – An analysis of news personalisation in light of Article 22 GDPR.- Biometrics and Privacy.- Data privatizer for biometric applications and online identity management.- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking.- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference.- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute.- Tools Supporting Data Protection Compliance.- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy.- Decision Support for Mobile App Selection via Automated Privacy Assessment.- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment.- Privacy Classification and Security Assessment.- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors.- Annotation-based Static Analysis for Personal Data Protection.- Order of Control and Perceived Control over Personal Information.- Aggregating Corporate Information Security Maturity Levels of Different Assets.- Privacy Enhancing Technologies in Specific Contexts.- Differential Privacy in Online Dating Recommendation Systems.- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets.- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects.- Self-Sovereign Identity Systems: Evaluation Framework.- Privacy in Location-Based Services and their Criticality based on Usage Context.
Michael Friedewald, Fraunhofer ISI, Germany
Melek Önen, EURECOM, France
Eva Lievens, Ghent University, Belgium
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Samuel Fricker, Fachhochschule Nordwestschweiz, Switzerland