LEADER 04938nam 22006375 450 001 9910298567203321 005 20230926195447.0 010 $a3-642-55137-8 024 7 $a10.1007/978-3-642-55137-6 035 $a(CKB)3710000000119208 035 $a(DE-He213)978-3-642-55137-6 035 $a(SSID)ssj0001237556 035 $a(PQKBManifestationID)11708369 035 $a(PQKBTitleCode)TC0001237556 035 $a(PQKBWorkID)11258163 035 $a(PQKB)10742805 035 $a(MiAaPQ)EBC3093440 035 $a(PPN)178783870 035 $a(EXLCZ)993710000000119208 100 $a20140502d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy and Identity Management for Emerging Services and Technologies $e8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers /$fedited by Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 249 p. 41 illus.) 225 1 $a ;$v421 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-55136-X 327 $aTwo of the Grand Changes through Computer and Network Technology -- The Draft Data Protection Regulation and the Development of Data Processing Applications -- Privacy Management and Accountability in Global Organisations -- Concepts Around Privacy-Preserving Attribute-Based Credentials: Making Authentication with Anonymous Credentials Practical -- Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond -- How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? -- Privacy Versus Collective Security: Drivers and Barriers Behind a Trade-off -- Privacy in the Life-Cycle of IT Services ? An Investigation of Process Reference Models -- Forgetting Bits and Pieces: An Exploration of the ?Right to Be Forgotten? as Implementation of ?Forgetting? in Online Memory Processes -- An Advanced, Privacy-Friendly Loyalty System -- Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions -- Problem-Based Consideration of Privacy-Relevant Domain Knowledge -- Extending Signatures of Reputation -- Preserving Privacy in Production -- User Search with Knowledge Thresholds in Decentralized Online Social Networks -- An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information -- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case -- Constructing Security: Reflections on the Margins of a Case Study of the Use of Electronic Identification in ICT Platforms in Schools -- Mobile Devices to the Identity Rescue. 330 $aThis book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media. 410 0$a ;$v421 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 702 $aHansen$b Marit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLeenes$b Ronald$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWhitehouse$b Diane$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910298567203321 996 $aPrivacy and Identity Management for Emerging Services and Technologies$92215721 997 $aUNINA