LEADER 04302nam 22007575 450 001 996691667203316 005 20251010131536.0 010 $a3-032-07574-2 024 7 $a10.1007/978-3-032-07574-1 035 $a(CKB)41603953100041 035 $a(DE-He213)978-3-032-07574-1 035 $a(MiAaPQ)EBC32373576 035 $a(Au-PeEL)EBL32373576 035 $a(EXLCZ)9941603953100041 100 $a20251010d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrivacy Technologies and Policy $e13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22?23, 2025, Proceedings /$fedited by Narges Arastouei, Meiko Jensen, Kai Rannenberg 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (XII, 221 p. 27 illus., 24 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16183 311 08$a3-032-07573-4 327 $a -- Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems. -- ?I will never pay for this? Perceptions of fairness and factors affecting behaviour on ?pay-or-ok? models. -- ?Abort the login?: Understanding Phishing Susceptibility through Warning Design in the Context of 2FA. -- Expert Strategies to Assist Laypeople in Making Decisions and Adopting Privacy-Enhancing Technologies. -- Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation. -- Interfacing Human Brains: What could go wrong?. -- Anonymity-washing. -- Simple now, Complex later: The Questionable Efficacy of Diluting GDPR Article 30(5). -- Professional Methods & Tools for Analysis and Decision Making. -- Turning to Online Forums for Legal Information: A Case Study of GDPR?s Legitimate Interests. -- Illuminating the DPIA Blackbox ? A Survey of Data Protection Impact Assessment Practices in Organisations. -- Information Inference Diagrams: Complementing Privacy and Security Analyses Beyond Data Flows. 330 $aThis open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am Main, Germany, during October 22-23, 2025. The 9 full papers were carefully reviewed and selected from 27 submissions.They were organized into following topical sections: Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems; Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation; Professional Methods & Tools for Analysis and Decision Making. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16183 606 $aComputers and civilization 606 $aApplication software 606 $aComputer networks 606 $aComputer systems 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers and Society 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aCryptology 606 $aData and Information Security 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 14$aComputers and Society. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aCryptology. 615 24$aData and Information Security. 676 $a303.4834 702 $aArastouei$b Narges$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJensen$b Meiko$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRannenberg$b Kai$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996691667203316 996 $aPrivacy Technologies and Policy$91891838 997 $aUNISA