LEADER 04025nam 22007815 450 001 996466018203316 005 20200630154819.0 010 $a3-319-31456-4 024 7 $a10.1007/978-3-319-31456-3 035 $a(CKB)3710000000627362 035 $a(SSID)ssj0001660244 035 $a(PQKBManifestationID)16438958 035 $a(PQKBTitleCode)TC0001660244 035 $a(PQKBWorkID)14987399 035 $a(PQKB)11419144 035 $a(DE-He213)978-3-319-31456-3 035 $a(MiAaPQ)EBC5594343 035 $a(PPN)192771957 035 $a(EXLCZ)993710000000627362 100 $a20160309d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy Technologies and Policy$b[electronic resource] $eThird Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers /$fedited by Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Daniel Le Métayer, Stefan Schiffner 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 213 p. 35 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9484 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-31455-6 327 $aPrivacy by design (PbD) -- Attempt to combine technical and organizational measures to ensure the basic rights of the individual -- Measuring privacy -- Rules and principles -- Legal and economic perspectives on privacy. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy. 410 0$aSecurity and Cryptology ;$v9484 606 $aComputers and civilization 606 $aComputer security 606 $aE-commerce 606 $aApplication software 606 $aAlgorithms 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aE-commerce. 615 0$aApplication software. 615 0$aAlgorithms. 615 14$aComputers and Society. 615 24$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a303.4833 702 $aBerendt$b Bettina$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aEngel$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIkonomou$b Demosthenes$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLe Métayer$b Daniel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchiffner$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466018203316 996 $aPrivacy Technologies and Policy$91891838 997 $aUNISA