Table of Contents
|
Privacy and Identity Management. The Smart Revolution Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner |
Front Matter |
Introduction
|
The Smart World Revolution Eleni Kosta, Igor Fovino, Simone Fischer-Hübner, Marit Hansen, Charles Raab, Ignacio Sanchez, Diane Whitehouse |
3-12 |
Privacy Engineering
|
Towards Organizing the Growing Knowledge on Privacy Engineering Jose M. Del Alamo, Yod-Samuel Martín, Julio Caiza |
15-24 |
Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering Kjetil Rommetveit, Alessia Tanas, Niels Dijk |
25-37 |
Anonymity Online – Current Solutions and Challenges Matthias Marx, Erik Sy, Christian Burkert, Hannes Federrath |
38-55 |
Privacy in the Era of the Smart Revolution
|
Is It Harmful? Re-examining Privacy Concerns Agnieszka Kitkowska, Erik Wästlund, Joachim Meyer, Leonardo Martucci |
59-75 |
Forget About Privacy … or Not? Norberto Patrignani, Diane Whitehouse, Monica Gemo |
76-85 |
From Privacy to Algorithms’ Fairness Chiara Sabelli, Mariachiara Tallacchini |
86-110 |
The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection Benjamin Bergemann |
111-131 |
Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices Alexandr Railean, Delphine Reinhardt |
132-149 |
Improving Privacy and Security in the Ear of Smart Environments
|
Secure and Privacy-Friendly Storage and Data Processing in the Cloud Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini |
153-169 |
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments Aderonke Sakpere, Anne Kayem |
170-186 |
Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures Yefim Shulman |
187-204 |
Safeguarding Personal Data and Mitigating Risks
|
Data Protection Impact Assessment: A Hands-On Tour of the GDPR’s Most Practical Tool Felix Bieker, Nicholas Martin, Michael Friedewald, Marit Hansen |
207-220 |
Designing a GDPR-Compliant and Usable Privacy Dashboard Philip Raschke, Axel Küpper, Olha Drozd, Sabrina Kirrane |
221-236 |
Blockchain-based Identity Management and Data Usage Control (Extended Abstract) Ricardo Neisse, Gary Steri, Igor Fovino |
237-239 |
Identification Services for Online Social Networks (OSNs) Extended Abstract Elena Ferrari |
240-242 |
Cyber Security and Privacy Experiments: A Design and Reporting Toolkit Kovila Coopamootoo, Thomas Groß |
243-262 |
Assistive Robots
|
Privacy and Socially Assistive Robots - A Meta Study Tanja Heuer, Ina Schiering, Reinhard Gerndt |
265-281 |
From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots Silvia Conca |
282-298 |
Mobility and Privacy
|
A Comparative Study of Android and iOS Mobile Applications’ Data Handling Practices Versus Compliance to Privacy Policy Sophia Kununka, Nikolay Mehandjiev, Pedro Sampaio |
301-313 |
Privacy Concerns and Behavior of Pokémon Go Players in Germany David Harborth, Sebastian Pape |
314-329 |
mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies Alexander Gabel, Ina Schiering, Sandra Müller, Funda Ertas |
330-345 |
NFC Payments – Gaps Between User Perception and Reality Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi |
346-353 |
Real-World Identification for an Extensible and Privacy-Preserving Mobile eID Michael Hölzl, Michael Roland, René Mayrhofer |
354-370 |