01375nam0 22003011i 450 UON0028374120231205103849.14520061114d1965 |0itac50 bagerDE||||e |||||Hoch- und niederdeutsches Wörterbuch der mittleren und neueren Zeitzur Ergänzung der vorhandenen Wörterbücher insbesondere des der Brüder GrimmLorenz Diefenbach, Ernst WülckerHildesheim : G. Olms1965X col.930 col. ; 27 cmRist. anast. dell'ed.: Basel, 1885.DizionariUONC025592FIDizionari tedeschiUONC035392FILingua tedesca1050-1650DizionariUONC060866FIDEHildesheimUONL000317437Lingua tedesca. Descriz., analisi, uso, diz. dei dialetti, delle forme antiche21DIEFENBACHLorenzUONV164014198475WÜLCKERErnstUONV164015693006ITSOL20251003RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00283741SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI S.C VI DIZ 088 SI FG 426 7 088 Hoch- und niederdeutsches Wörterbuch der mittleren und neueren Zeit1245831UNIOR04693nam 22007335 450 991072893360332120251225203733.09783031319716303131971010.1007/978-3-031-31971-6(MiAaPQ)EBC30558401(Au-PeEL)EBL30558401(OCoLC)1381095545(DE-He213)978-3-031-31971-6(BIP)090182113(PPN)270612777(CKB)26816407400041(EXLCZ)992681640740004120230531d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPrivacy and Identity Management 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30–September 2, 2022, Proceedings /edited by Felix Bieker, Joachim Meyer, Sebastian Pape, Ina Schiering, Andreas Weich1st ed. 2023.Cham :Springer Nature Switzerland :Imprint: Springer,2023.1 online resource (220 pages)IFIP Advances in Information and Communication Technology,1868-422X ;671Print version: Bieker, Felix Privacy and Identity Management Cham : Springer International Publishing AG,c2023 9783031319709 Keynote Paper -- How to Build Organisations for Privacy-Friendly Solutions -- Workshop and Tutorial Papers. -Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning -- From Research to Privacy-Preserving Industry Applications -- What is there to criticize about voice, speech and face recognition and how to structure the critique -- Raising awareness for privacy risks and supporting protection in the light of digital inequalities -- The Hitchhiker’s Guide to the Social Media Data Research Galaxy – a Primer -- Selected Student Papers. -Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis -- Promises and Problems in the Adoption of Self-Sovereign Identity Management from a Consumer Perspective -- Usability Evaluation of SSI Digital Wallets -- Influence of Privacy Knowledge on Privacy Attitudes in the Domain of Location-Based Services -- Privacy and data protection in the era of recommendation systems: a postphenomenological approach -- The DMA and the GDPR: Making Sense of Data Accumulation, Cross-Use and Data Sharing Provisions -- Towards Assessing Features of Dark Patterns in Cookie Consent Processes -- Accessibility statements and data protection notices: what can data protection law learn from the concept of accessibility -- SeCCA: Towards Privacy-preserving Biclustering Algorithm with Homomorphic Encryptions.This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.IFIP Advances in Information and Communication Technology,1868-422X ;671Data protectionComputer networksComputersCryptographyData encryption (Computer science)Data and Information SecurityComputer Communication NetworksComputing MilieuxCryptologyData protection.Computer networks.Computers.Cryptography.Data encryption (Computer science)Data and Information Security.Computer Communication Networks.Computing Milieux.Cryptology.005.8Bieker Felix1227755Meyer Joachim1365672Pape Sebastian904553Schiering Ina1365673Weich Andreas1365674MiAaPQMiAaPQMiAaPQBOOK9910728933603321Privacy and Identity Management3387835UNINA