Search - IFIP Open Digital Library Access content directly

Filter your results

27 results
Structure: Internal structure identifier : 300981
Image document

Not just User Control in the General Data Protection Regulation

Claudia Quelle
Anja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.140-163, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_11⟩
Book sections hal-01629151v1
Image document

Digital Personae and Profiles as Representations of Individuals

Arnold Roosendaal
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.226-236, ⟨10.1007/978-3-642-14282-6_18⟩
Conference papers hal-01061068v1
Image document

The Draft Data Protection Regulation and the Development of Data Processing Applications

Eleni Kosta , Colette Cuijpers
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.12-32, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_2⟩
Book sections hal-01276044v1
Image document

Personalized Persuasion in Online Advertisements: A Case Study of a Micro-Funding Website

Suleman Shahid , Nicole Heise , Sundas Zaman
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.433-441, ⟨10.1007/978-3-319-67687-6_29⟩
Conference papers hal-01717218v1
Image document

To Centralize or Decentralize: What is the Question? An Application to Digital Payments

Ron Berndsen , Ruth Wandhöfer
Leon Strous; Roger Johnson; David Alan Grier; Doron Swade. Unimagined Futures – ICT Opportunities and Challenges :, AICT-555, Springer International Publishing, pp.105-118, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-64245-7. ⟨10.1007/978-3-030-64246-4_9⟩
Book sections hal-03194551v1
Image document

Massive Data Collection by Mistake?

Arnold Roosendaal
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.274-282, ⟨10.1007/978-3-642-31668-5_21⟩
Conference papers hal-01517600v1
Image document

The Uncanny Valley Everywhere? On Privacy Perception and Expectation Management

Bibi van Den Berg
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.178-191, ⟨10.1007/978-3-642-20769-3_15⟩
Conference papers hal-01559447v1
Image document

Forgetting Bits and Pieces

Paulan Korenhof
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.114-127, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_9⟩
Book sections hal-01276052v1
Image document

Floffy: Designing an Outdoor Robot for Children

Omar Mubin , Luke Vink , Pieter Oosterwijk , Abdullah Al Mahmud , Suleman Shahid
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.563-570, ⟨10.1007/978-3-642-40498-6_46⟩
Conference papers hal-01510506v1
Image document

Operationalizing Data Governance via Multi-level Metadata Management

Stefhan Van Helvoirt , Hans Weigand
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.160-172, ⟨10.1007/978-3-319-25013-7_13⟩
Conference papers hal-01448036v1

Privacy and Identity Management. The Smart Revolution

Marit Hansen , Eleni Kosta , Igor Nai-Fovino , Simone Fischer-Hübner
Springer International Publishing, AICT-526, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-92924-8. ⟨10.1007/978-3-319-92925-5⟩
Books hal-01883666v1
Image document

Explore Data, Enjoy Yourself - KUbism, A Playful Approach to Data Exploration

Bruno Cardoso , Neil Cohn , Frederik Truyen , Koenraad Brosens
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.43-64, ⟨10.1007/978-3-030-85613-7_4⟩
Conference papers hal-04292377v1
Image document

A.R.M. - Augmented Reality Muscularity

Dirk J.J. Sweere , Martin P. Hughes , Martijn G. van Laar , Lisa E. Rombout
17th International Conference on Entertainment Computing (ICEC), Sep 2018, Poznan, Poland. pp.235-240, ⟨10.1007/978-3-319-99426-0_23⟩
Conference papers hal-02128593v1
Image document

A Financial Reporting Ontology for Market, Exchange, and Enterprise Shared Information Systems

Ivars Blums , Hans Weigand
12th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2019, Luxembourg, Luxembourg. pp.83-99, ⟨10.1007/978-3-030-35151-9_6⟩
Conference papers hal-03231356v1
Image document

Culture and Facial Expressions: A Case Study with a Speech Interface

Beant Dhillon , Rafal Kocielnik , Ioannis Politis , Marc Swerts , Dalila Szostak
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.392-404, ⟨10.1007/978-3-642-23771-3_29⟩
Conference papers hal-01590881v1
Image document

Provable Network Activity for Protecting Users Against False Accusation

Panagiotis Papadopoulos , Elias Athanasopoulos , Eleni Kosta , George Siganos , Angelos D. Keromytis , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers hal-01639610v1
Image document

Writing Real-Time .Net Games in Casanova

Giuseppe Maggiore , Pieter Spronck , Renzo Orsini , Michele Bugliesi , Enrico Steffinlongo , et al.
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.341-348, ⟨10.1007/978-3-642-33542-6_30⟩
Conference papers hal-01556148v1
Image document

Infrastructure Protection in the Dutch Financial Sector

Matthijs Van Oers , Leon Strous , Ron Berndsen
6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.113-126, ⟨10.1007/978-3-642-35764-0_9⟩
Conference papers hal-01483825v1
Image document

Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software

Sandra Olislaegers
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.73-87, ⟨10.1007/978-3-642-31668-5_6⟩
Conference papers hal-01517601v1
Image document

The Impact of Instant Messaging Tools on Knowledge Management and Team Performance

Carol Ou , Darren Leung , Robert M. Davison
1st Working Conference Researching the Future (Future-IS), Jun 2011, Turku, Finland. pp.131-148, ⟨10.1007/978-3-642-21364-9_9⟩
Conference papers hal-01567987v1

Privacy and Identity Management for Life

Simone Fischer-Hübner , Penny Duquenoy , Marit Hansen , Ronald Leenes , Ge Zhang
Springer, AICT-352, pp.365, 2011, 978-3-642-20768-6. ⟨10.1007/978-3-642-20769-3⟩
Books hal-01559639v1
Image document

On the Move to Business-Driven Alignment of Service Monitoring Requirements

Patrício De Alencar Silva , Hans Weigand
3rd IFIP Working Conference on Enterprise Interoperability (IWEI), Mar 2011, Stockholm, Sweden. pp.103-117, ⟨10.1007/978-3-642-19680-5_10⟩
Conference papers hal-01572099v1
Image document

Supporting Customs Controls by Means of Service-Oriented Auditing

Hans Weigand , Faiza Allah Bukhsh
11th Conference on e-Business, e-Services, and e-Society (I3E), Oct 2011, Kaunas, Lithuania. pp.28-43, ⟨10.1007/978-3-642-27260-8_3⟩
Conference papers hal-01560853v1

Privacy and Identity Management for Life

Jan Camenisch , Bruno Crispo , Simone Fischer-Hübner , Ronald Leenes , Giovanni Russello
Springer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books hal-01517673v1
Image document

A Deductive View on Process-Data Diagrams

Manfred A. Jeusfeld
4th Working Conference on Method Engineering (ME), Apr 2011, Lisbon, Portugal. pp.123-137, ⟨10.1007/978-3-642-19997-4_13⟩
Conference papers hal-01562877v1
Image document

Uncovering Document Fraud in Maritime Freight Transport Based on Probabilistic Classification

Ron Triepels , Ad Feelders , Hennie Daniels
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.282-293, ⟨10.1007/978-3-319-24369-6_23⟩
Conference papers hal-01444472v1
Image document

Risk Profiling by Law Enforcement Agencies in the Big Data Era: Is There a Need for Transparency?

Sascha Van Schendel
Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.275-289, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_18⟩
Book sections hal-02271665v1