Table of Contents
|
Privacy and Identity Management Felix Bieker, Joachim Meyer, Sebastian Pape, Ina Schiering, Andreas Weich |
Front Matter |
Keynote Paper
|
How to Build Organisations for Privacy-Friendly Solutions Christian Buggedei |
3-7 |
Workshop and Tutorial Papers
|
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning Simone Fischer-Hübner, Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen |
11-20 |
From Research to Privacy-Preserving Industry Applications Jesús García-Rodríguez, David Goodman, Stephan Krenn, Vasia Liagkou, Rafael Torres Moreno |
21-33 |
What is There to Criticize About Voice, Speech and Face Recognition and How to Structure the Critique? Murat Karaboga, Frank Ebbers, Greta Runge, Michael Friedewald |
34-43 |
Raising Awareness for Privacy Risks and Supporting Protection in the Light of Digital Inequalities Yannic Meier |
44-51 |
The Hitchhiker’s Guide to the Social Media Data Research Galaxy - A Primer Arianna Rossi |
52-65 |
Selected Student Papers
|
Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis Michael Khavkin, Eran Toch |
69-84 |
Promises and Problems in the Adoption of Self-Sovereign Identity Management from a Consumer Perspective Marco Hünseler, Eva Pöll |
85-100 |
Usability Evaluation of SSI Digital Wallets Abylay Satybaldy |
101-117 |
Influence of Privacy Knowledge on Privacy Attitudes in the Domain of Location-Based Services Vera Schmitt |
118-132 |
Privacy and Data Protection in the Era of Recommendation Systems: A Postphenomenological Approach Ana Fernández Inguanzo |
133-147 |
The DMA and the GDPR: Making Sense of Data Accumulation, Cross-Use and Data Sharing Provisions Muhammed Demircan |
148-164 |
Towards Assessing Features of Dark Patterns in Cookie Consent Processes Emre Koçyiğit, Arianna Rossi, Gabriele Lenzini |
165-183 |
Accessibility Statements and Data Protection Notices: What Can Data Protection Law Learn from the Concept of Accessibility? Olga Gkotsopoulou |
184-197 |
SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryptions Shokofeh Vahidiansadegh, Lena Wiese, Michael Brenner |
198-213 |