LEADER 03927nam 22007935 450 001 9910616378203321 005 20251225203506.0 010 $a9783031179266 010 $a3031179269 024 7 $a10.1007/978-3-031-17926-6 035 $a(MiAaPQ)EBC7107448 035 $a(Au-PeEL)EBL7107448 035 $a(CKB)24996017400041 035 $a(PPN)265855462 035 $a(BIP)85922642 035 $a(BIP)85591721 035 $a(DE-He213)978-3-031-17926-6 035 $a(EXLCZ)9924996017400041 100 $a20221005d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrust, Privacy and Security in Digital Business $e19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings /$fedited by Sokratis Katsikas, Steven Furnell 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (106 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13582 311 08$aPrint version: Katsikas, Sokratis Trust, Privacy and Security in Digital Business Cham : Springer International Publishing AG,c2022 9783031179259 320 $aIncludes bibliographical references and index. 327 $aPriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies -- Closing the Gap between Privacy Policies and Privacy Preferences with Privacy Interfaces -- A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games -- Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies -- Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT -- Homomorphic encryption in manufacturing compliance checks. 330 $aThis volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection; Honeypots; Homomorphic encryption;, and Serious games. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13582 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData mining 606 $aApplication software 606 $aData and Information Security 606 $aMobile and Network Security 606 $aCryptology 606 $aSecurity Services 606 $aData Mining and Knowledge Discovery 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData mining. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer and Information Systems Applications. 676 $a260 676 $a658.470285 702 $aKatsikas$b Sokratis 702 $aFurnell$b Steven 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910616378203321 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNINA