Table of Contents
|
Privacy and Identity Management. Sharing in a Digital World Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering |
Front Matter |
Keynote Papers
|
Blueprints for Deploying Privacy Enhancing Technologies in E-Government Liina Kamm, Dan Bogdanov, Eduardo Brito, Andre Ostrak |
3-19 |
The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU’s Regulatory Architecture Maria Grazia Porcedda |
20-28 |
Selected Student Papers
|
Towards an Affordance-Based Typology of Personal Data Stores August Bourgeus, Tim Theys, Nanouk Verhulst, Laurens Vandercruysse, Peter Mechant |
31-45 |
Assuring GDPR Conformance Through Language-Based Compliance Chinmayi Prabhu Baramashetru, Silvia Lizeth Tapia Tarifa, Olaf Owe |
46-63 |
User Interaction Data in Apps: Comparing Policy Claims to Implementations Feiyang Tang, Bjarte M. Østvold |
64-80 |
Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development Bjørn Aslak Juliussen, Jon Petter Rui, Dag Johansen |
81-96 |
Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access Proposal Cynthia Ng |
97-113 |
Educating Parents in Managing Online Privacy Risks: Media Educators’ Perspectives Ann-Kristin Lieberknecht |
114-126 |
A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific Research Paweł Hajduk |
127-142 |
Who Is the Attacker - Analyzing Data Protection Violations in Health Care Ramona Schmidt, Ina Schiering |
143-157 |
Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges Mehdi Akbari Gurabi, Felix Hermsen, Avikarsha Mandal, Stefan Decker |
158-174 |
Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement Malte Hansen, Andre Büttner |
175-191 |
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman |
192-210 |
Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility Ecosystem Daniel Richter, Jürgen Anke |
211-226 |
Enhancing Transparency Through Personal Information Management Systems: Current State of Service Offerings and Considerations for Further Advancements Janina Rochon |
227-243 |
User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT Piero Romare |
244-264 |
Privacy and Utility Evaluation of Synthetic Tabular Data for Machine Learning Felix Hermsen, Avikarsha Mandal |
265-281 |
Empirical Evaluation of Synthetic Data Created by Generative Models via Attribute Inference Attack Saloni Kwatra, Vicenç Torra |
282-291 |
How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context Vera Schmitt, Paul Ferrer, Arooj Anwar Khan, Ina Kern, Sebastian Möller |
292-308 |
Workshop and Tutorial Papers
|
Private Training Approaches - A Primer Jenni Reuben, Ala Sarah Alaqra |
311-324 |
Workshop on Cybersecurity of Critical Infrastructures Aida Akbarzadeh, Sabarathinam Chockalingam, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo-Palacios, László Erdődi, Nathan Lau, Siv Hilde Houmb |
325-339 |