04302nam 22007575 450 99669166720331620251010131536.03-032-07574-210.1007/978-3-032-07574-1(CKB)41603953100041(DE-He213)978-3-032-07574-1(MiAaPQ)EBC32373576(Au-PeEL)EBL32373576(EXLCZ)994160395310004120251010d2026 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierPrivacy Technologies and Policy 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings /edited by Narges Arastouei, Meiko Jensen, Kai Rannenberg1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (XII, 221 p. 27 illus., 24 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;161833-032-07573-4 -- Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems. -- “I will never pay for this” Perceptions of fairness and factors affecting behaviour on ‘pay-or-ok’ models. -- “Abort the login”: Understanding Phishing Susceptibility through Warning Design in the Context of 2FA. -- Expert Strategies to Assist Laypeople in Making Decisions and Adopting Privacy-Enhancing Technologies. -- Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation. -- Interfacing Human Brains: What could go wrong?. -- Anonymity-washing. -- Simple now, Complex later: The Questionable Efficacy of Diluting GDPR Article 30(5). -- Professional Methods & Tools for Analysis and Decision Making. -- Turning to Online Forums for Legal Information: A Case Study of GDPR’s Legitimate Interests. -- Illuminating the DPIA Blackbox – A Survey of Data Protection Impact Assessment Practices in Organisations. -- Information Inference Diagrams: Complementing Privacy and Security Analyses Beyond Data Flows.This open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am Main, Germany, during October 22-23, 2025. The 9 full papers were carefully reviewed and selected from 27 submissions.They were organized into following topical sections: Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems; Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation; Professional Methods & Tools for Analysis and Decision Making.Lecture Notes in Computer Science,1611-3349 ;16183Computers and civilizationApplication softwareComputer networksComputer systemsCryptographyData encryption (Computer science)Data protectionComputers and SocietyComputer and Information Systems ApplicationsComputer Communication NetworksComputer System ImplementationCryptologyData and Information SecurityComputers and civilization.Application software.Computer networks.Computer systems.Cryptography.Data encryption (Computer science)Data protection.Computers and Society.Computer and Information Systems Applications.Computer Communication Networks.Computer System Implementation.Cryptology.Data and Information Security.303.4834Arastouei Nargesedthttp://id.loc.gov/vocabulary/relators/edtJensen Meikoedthttp://id.loc.gov/vocabulary/relators/edtRannenberg Kaiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996691667203316Privacy Technologies and Policy1891838UNISA