Vai al contenuto principale della pagina

Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others] Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (213 pages)
Disciplina: 005.8
Soggetto topico: Computer networks - Security measures
Persona (resp. second.): FriedewaldMichael <1965->
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Keynote Papers -- Challenges for Designing Serious Games on Security and Privacy Awareness -- 1 Introduction -- 2 Sample Serious Games to Prevent Social Engineering and Raise Privacy Awareness -- 2.1 HATCH -- 2.2 PROTECT -- 2.3 CyberSecurity Awareness Quiz -- 2.4 Leech -- 3 Game Content Creation and Adaption -- 3.1 Addressing Target Groups -- 3.2 Addressing Recent Attacks -- 4 Evaluation of Serious Games -- 4.1 Effectiveness -- 4.2 Legal and Ethical Assessment -- 5 Summary and Conclusion -- References -- Information Security Risk Management -- 1 Introduction -- 2 Technical Cybersecurity -- 3 Technical Cybersecurity is a Data Economy -- 4 Organisational Security -- 5 Organisational Cybersecurity Needs to Become a Data Economy -- 6 Creating the Data for Organisational Situational Awareness -- 7 Towards an Informed Governance -- References -- Workshop and Tutorial Papers -- Conceptualising the Legal Notion of 'State of the Art' in the Context of IT Security -- 1 State of the Art in Legal Interventions -- 1.1 'State of the Art' as Protection Goal -- 1.2 State of the Art vs. Best Available Techniques -- 1.3 The Deployment of State of the Art in the Context of IT/Data Security Regulation -- 2 A Three-Step-Test to Determine State of the Art Technology -- 2.1 The Development of the Three-Step-Test -- 2.2 The Dynamic Function of Technical Measures -- 2.3 The Objective Nature of the State of the Art Criterion and the Principle of Proportionality -- 3 Conclusion -- References -- Privacy-Preserving Identity Management and Applications to Academic Degree Verification -- 1 Introduction -- 2 Concepts and Technologies -- 2.1 Entities and Processes -- 2.2 Security and Privacy Goals -- 2.3 Cryptographic Building Blocks -- 3 Demonstration Case and Piloting Results -- 3.1 Demonstrator Background and Specification.
3.2 The CyberSec4Europe Demonstrator -- 3.3 Evaluation Phase -- 4 The OLYMPUS Framework -- 4.1 OLYMPUS Architecture and Roles -- 4.2 Application to the Use Case -- 5 Conclusion and Future Work -- References -- The State of Surveillance - An Overall Account of Surveillance? -- 1 Introduction -- 2 Rights, Courts and Surveillance -- 3 An Overall Account of Surveillance? -- 4 Outlook: A Way Forward -- References -- Selected Student Papers -- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain -- 2.2 Usage Control -- 2.3 Transaction Privacy -- 3 System Model -- 3.1 Scenario -- 3.2 Privacy and Security Threat Model -- 4 Proposed Framework -- 5 Privacy and Security Analysis -- 5.1 Privacy Threats and Mitigations -- 5.2 UCS Neutralisation -- 6 Conclusion -- References -- SynCare: An Innovative Remote Patient Monitoring System Secured by Cryptography and Blockchain -- 1 Introduction -- 2 Related Work -- 3 System Design -- 4 Implementation -- 4.1 Overall Flow -- 4.2 The Mobile App -- 4.3 The Encrypted Cloud DB -- 4.4 The Blockchain Consent Validation and Synchronization -- 4.5 The Clinical Dashboard -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxpayers' Rights, the Right to Data Protection and Cybersecurity in the EU -- 1 Introduction -- 2 EU Tax Law, Poor Soil for Taxpayers' Rights? -- 3 The Taxpayers' Right to Data Protection -- 3.1 EU Data Protection -- 3.2 The Application of the Data Protection Right to Taxpayers -- 4 Cybersecurity for All, Except for Taxpayers? -- 4.1 The Narrow Scope of Application of the EU Cybersecurity Law -- 4.2 Can a Taxpayers' Right to Cybersecurity Be Deducted from Data Protection Law? -- 5 Conclusion -- References -- Usable Privacy and Security from the Perspective of Cognitive Abilities.
1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 4.1 Expert Interviews -- 4.2 Target Group Workshops -- 4.3 Combined Results and Proposed Guidelines -- 5 Discussion -- 6 Conclusions -- References -- Cloud Native Privacy Engineering through DevPrivOps -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cloud Native and Agile Software Development -- 2.2 Privacy -- 2.3 Privacy Engineering -- 3 Dimensions of Cloud Native Privacy Engineering -- 4 DevPrivOps: Privacy Engineering in Practice -- 5 Discussion and Conclusion -- References -- Gamification in mHealth - Opportunities and Privacy Risks -- 1 Introduction -- 2 Gamification -- 3 Related Work -- 4 Methodology -- 5 Analysis -- 5.1 Selection of Examples -- 5.2 Investigation of the Examples -- 6 Addressing Privacy Risks of Gamification Elements -- 6.1 Elements with Social Focus -- 6.2 Elements for Continuous Monitoring -- 6.3 Elements for Specific Goals -- 6.4 Leaderboard as Complementary Element -- 7 Conclusion -- References -- Exploration of Factors that Can Impact the Willingness of Employees to Share Smart Watch Data with Their Employers -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Survey Design -- 4.2 Survey Distribution -- 4.3 Survey Limitations -- 5 Results -- 5.1 Demographics -- 5.2 Ownership and Usage -- 5.3 Technical Knowledge About Smart Watch Capabilities -- 5.4 Legislation Knowledge -- 5.5 Technical Affinity -- 5.6 Intention to Disclose -- 6 Testing the Hypotheses -- 7 Discussion -- 8 Conclusions -- References -- A Questions -- Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands -- 1 Introduction -- 1.1 Platformization of Public Education -- 1.2 Impact of Platformization on Public Education -- 1.3 Remedying the Power Imbalance -- 1.4 Cooperative Responsibility.
1.5 The Case of the Privacy Covenant -- 2 Methodology -- 3 Results -- 3.1 Defining Public Values for Public Education -- 3.2 Allocating Responsibility in Data Protection -- 3.3 Public Deliberation and the Translation of Data Protection into an Agreement: The Privacy Covenant in Practice -- 4 Discussion -- 5 Conclusion -- References -- Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Areas of Interest -- 3.2 Phases and Technical Steps -- 3.3 Short-Term Anonymization Considerations -- 4 Summary and Future Research -- References -- Author Index.
Titolo autorizzato: Privacy and identity management : between data protection and security  Visualizza cluster
ISBN: 3-030-99100-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910558497303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: IFIP Advances in Information and Communication Technology