LEADER 05438nam 22007335 450 001 9910337860503321 005 20201103192138.0 010 $a3-030-16744-5 024 7 $a10.1007/978-3-030-16744-8 035 $a(CKB)4100000007938133 035 $a(DE-He213)978-3-030-16744-8 035 $a(MiAaPQ)EBC5921546 035 $a(PPN)235668907 035 $a(EXLCZ)994100000007938133 100 $a20190415d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data $e13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers /$fedited by Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 291 p. 175 illus., 29 illus. in color.) 225 1 $aIFIP AICT Tutorials ;$v547 311 $a3-030-16743-7 327 $aA Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency? 330 $aThis book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. . 410 0$aIFIP AICT Tutorials ;$v547 606 $aComputer security 606 $aComputers 606 $aApplication software 606 $aUser interfaces (Computer systems) 606 $aArtificial intelligence 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aComputer Appl. in Social and Behavioral Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/I23028 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputer security. 615 0$aComputers. 615 0$aApplication software. 615 0$aUser interfaces (Computer systems). 615 0$aArtificial intelligence. 615 14$aSystems and Data Security. 615 24$aComputing Milieux. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputer Appl. in Social and Behavioral Sciences. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aKosta$b Eleni$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPierson$b Jo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSlamanig$b Daniel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFischer-Hübner$b Simone$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKrenn$b Stephan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337860503321 996 $aPrivacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data$92520059 997 $aUNINA