Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.) |
Pubbl/distr/stampa | Baden-Baden : , : Nomos, , 2023 |
Descrizione fisica | 1 Online Ressource |
Disciplina | 005.8 |
Collana | Privatheit und Selbstbestimmung in der digitalen Welt | Privacy and Self-Determination in the Digital World |
Soggetto topico |
Data protection
Electronic commerce Fairness |
ISBN | 9783748938743 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNISA-996545353603316 |
Baden-Baden : , : Nomos, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.) |
Pubbl/distr/stampa | Baden-Baden : , : Nomos, , 2023 |
Descrizione fisica | 1 Online Ressource |
Disciplina | 005.8 |
Collana | Privatheit und Selbstbestimmung in der digitalen Welt | Privacy and Self-Determination in the Digital World |
Soggetto topico |
Data protection
Electronic commerce Fairness |
ISBN | 9783748938743 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910737286703321 |
Baden-Baden : , : Nomos, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (273 pages) : illustrations |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Application software |
ISBN | 3-030-72465-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464416803316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (273 pages) : illustrations |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Application software |
ISBN | 3-030-72465-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483058703321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (213 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-99100-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Keynote Papers -- Challenges for Designing Serious Games on Security and Privacy Awareness -- 1 Introduction -- 2 Sample Serious Games to Prevent Social Engineering and Raise Privacy Awareness -- 2.1 HATCH -- 2.2 PROTECT -- 2.3 CyberSecurity Awareness Quiz -- 2.4 Leech -- 3 Game Content Creation and Adaption -- 3.1 Addressing Target Groups -- 3.2 Addressing Recent Attacks -- 4 Evaluation of Serious Games -- 4.1 Effectiveness -- 4.2 Legal and Ethical Assessment -- 5 Summary and Conclusion -- References -- Information Security Risk Management -- 1 Introduction -- 2 Technical Cybersecurity -- 3 Technical Cybersecurity is a Data Economy -- 4 Organisational Security -- 5 Organisational Cybersecurity Needs to Become a Data Economy -- 6 Creating the Data for Organisational Situational Awareness -- 7 Towards an Informed Governance -- References -- Workshop and Tutorial Papers -- Conceptualising the Legal Notion of 'State of the Art' in the Context of IT Security -- 1 State of the Art in Legal Interventions -- 1.1 'State of the Art' as Protection Goal -- 1.2 State of the Art vs. Best Available Techniques -- 1.3 The Deployment of State of the Art in the Context of IT/Data Security Regulation -- 2 A Three-Step-Test to Determine State of the Art Technology -- 2.1 The Development of the Three-Step-Test -- 2.2 The Dynamic Function of Technical Measures -- 2.3 The Objective Nature of the State of the Art Criterion and the Principle of Proportionality -- 3 Conclusion -- References -- Privacy-Preserving Identity Management and Applications to Academic Degree Verification -- 1 Introduction -- 2 Concepts and Technologies -- 2.1 Entities and Processes -- 2.2 Security and Privacy Goals -- 2.3 Cryptographic Building Blocks -- 3 Demonstration Case and Piloting Results -- 3.1 Demonstrator Background and Specification.
3.2 The CyberSec4Europe Demonstrator -- 3.3 Evaluation Phase -- 4 The OLYMPUS Framework -- 4.1 OLYMPUS Architecture and Roles -- 4.2 Application to the Use Case -- 5 Conclusion and Future Work -- References -- The State of Surveillance - An Overall Account of Surveillance? -- 1 Introduction -- 2 Rights, Courts and Surveillance -- 3 An Overall Account of Surveillance? -- 4 Outlook: A Way Forward -- References -- Selected Student Papers -- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain -- 2.2 Usage Control -- 2.3 Transaction Privacy -- 3 System Model -- 3.1 Scenario -- 3.2 Privacy and Security Threat Model -- 4 Proposed Framework -- 5 Privacy and Security Analysis -- 5.1 Privacy Threats and Mitigations -- 5.2 UCS Neutralisation -- 6 Conclusion -- References -- SynCare: An Innovative Remote Patient Monitoring System Secured by Cryptography and Blockchain -- 1 Introduction -- 2 Related Work -- 3 System Design -- 4 Implementation -- 4.1 Overall Flow -- 4.2 The Mobile App -- 4.3 The Encrypted Cloud DB -- 4.4 The Blockchain Consent Validation and Synchronization -- 4.5 The Clinical Dashboard -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxpayers' Rights, the Right to Data Protection and Cybersecurity in the EU -- 1 Introduction -- 2 EU Tax Law, Poor Soil for Taxpayers' Rights? -- 3 The Taxpayers' Right to Data Protection -- 3.1 EU Data Protection -- 3.2 The Application of the Data Protection Right to Taxpayers -- 4 Cybersecurity for All, Except for Taxpayers? -- 4.1 The Narrow Scope of Application of the EU Cybersecurity Law -- 4.2 Can a Taxpayers' Right to Cybersecurity Be Deducted from Data Protection Law? -- 5 Conclusion -- References -- Usable Privacy and Security from the Perspective of Cognitive Abilities. 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 4.1 Expert Interviews -- 4.2 Target Group Workshops -- 4.3 Combined Results and Proposed Guidelines -- 5 Discussion -- 6 Conclusions -- References -- Cloud Native Privacy Engineering through DevPrivOps -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cloud Native and Agile Software Development -- 2.2 Privacy -- 2.3 Privacy Engineering -- 3 Dimensions of Cloud Native Privacy Engineering -- 4 DevPrivOps: Privacy Engineering in Practice -- 5 Discussion and Conclusion -- References -- Gamification in mHealth - Opportunities and Privacy Risks -- 1 Introduction -- 2 Gamification -- 3 Related Work -- 4 Methodology -- 5 Analysis -- 5.1 Selection of Examples -- 5.2 Investigation of the Examples -- 6 Addressing Privacy Risks of Gamification Elements -- 6.1 Elements with Social Focus -- 6.2 Elements for Continuous Monitoring -- 6.3 Elements for Specific Goals -- 6.4 Leaderboard as Complementary Element -- 7 Conclusion -- References -- Exploration of Factors that Can Impact the Willingness of Employees to Share Smart Watch Data with Their Employers -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Survey Design -- 4.2 Survey Distribution -- 4.3 Survey Limitations -- 5 Results -- 5.1 Demographics -- 5.2 Ownership and Usage -- 5.3 Technical Knowledge About Smart Watch Capabilities -- 5.4 Legislation Knowledge -- 5.5 Technical Affinity -- 5.6 Intention to Disclose -- 6 Testing the Hypotheses -- 7 Discussion -- 8 Conclusions -- References -- A Questions -- Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands -- 1 Introduction -- 1.1 Platformization of Public Education -- 1.2 Impact of Platformization on Public Education -- 1.3 Remedying the Power Imbalance -- 1.4 Cooperative Responsibility. 1.5 The Case of the Privacy Covenant -- 2 Methodology -- 3 Results -- 3.1 Defining Public Values for Public Education -- 3.2 Allocating Responsibility in Data Protection -- 3.3 Public Deliberation and the Translation of Data Protection into an Agreement: The Privacy Covenant in Practice -- 4 Discussion -- 5 Conclusion -- References -- Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Areas of Interest -- 3.2 Phases and Technical Steps -- 3.3 Short-Term Anonymization Considerations -- 4 Summary and Future Research -- References -- Author Index. |
Record Nr. | UNISA-996464543803316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (213 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico | Computer networks - Security measures |
ISBN | 3-030-99100-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Keynote Papers -- Challenges for Designing Serious Games on Security and Privacy Awareness -- 1 Introduction -- 2 Sample Serious Games to Prevent Social Engineering and Raise Privacy Awareness -- 2.1 HATCH -- 2.2 PROTECT -- 2.3 CyberSecurity Awareness Quiz -- 2.4 Leech -- 3 Game Content Creation and Adaption -- 3.1 Addressing Target Groups -- 3.2 Addressing Recent Attacks -- 4 Evaluation of Serious Games -- 4.1 Effectiveness -- 4.2 Legal and Ethical Assessment -- 5 Summary and Conclusion -- References -- Information Security Risk Management -- 1 Introduction -- 2 Technical Cybersecurity -- 3 Technical Cybersecurity is a Data Economy -- 4 Organisational Security -- 5 Organisational Cybersecurity Needs to Become a Data Economy -- 6 Creating the Data for Organisational Situational Awareness -- 7 Towards an Informed Governance -- References -- Workshop and Tutorial Papers -- Conceptualising the Legal Notion of 'State of the Art' in the Context of IT Security -- 1 State of the Art in Legal Interventions -- 1.1 'State of the Art' as Protection Goal -- 1.2 State of the Art vs. Best Available Techniques -- 1.3 The Deployment of State of the Art in the Context of IT/Data Security Regulation -- 2 A Three-Step-Test to Determine State of the Art Technology -- 2.1 The Development of the Three-Step-Test -- 2.2 The Dynamic Function of Technical Measures -- 2.3 The Objective Nature of the State of the Art Criterion and the Principle of Proportionality -- 3 Conclusion -- References -- Privacy-Preserving Identity Management and Applications to Academic Degree Verification -- 1 Introduction -- 2 Concepts and Technologies -- 2.1 Entities and Processes -- 2.2 Security and Privacy Goals -- 2.3 Cryptographic Building Blocks -- 3 Demonstration Case and Piloting Results -- 3.1 Demonstrator Background and Specification.
3.2 The CyberSec4Europe Demonstrator -- 3.3 Evaluation Phase -- 4 The OLYMPUS Framework -- 4.1 OLYMPUS Architecture and Roles -- 4.2 Application to the Use Case -- 5 Conclusion and Future Work -- References -- The State of Surveillance - An Overall Account of Surveillance? -- 1 Introduction -- 2 Rights, Courts and Surveillance -- 3 An Overall Account of Surveillance? -- 4 Outlook: A Way Forward -- References -- Selected Student Papers -- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain -- 2.2 Usage Control -- 2.3 Transaction Privacy -- 3 System Model -- 3.1 Scenario -- 3.2 Privacy and Security Threat Model -- 4 Proposed Framework -- 5 Privacy and Security Analysis -- 5.1 Privacy Threats and Mitigations -- 5.2 UCS Neutralisation -- 6 Conclusion -- References -- SynCare: An Innovative Remote Patient Monitoring System Secured by Cryptography and Blockchain -- 1 Introduction -- 2 Related Work -- 3 System Design -- 4 Implementation -- 4.1 Overall Flow -- 4.2 The Mobile App -- 4.3 The Encrypted Cloud DB -- 4.4 The Blockchain Consent Validation and Synchronization -- 4.5 The Clinical Dashboard -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxpayers' Rights, the Right to Data Protection and Cybersecurity in the EU -- 1 Introduction -- 2 EU Tax Law, Poor Soil for Taxpayers' Rights? -- 3 The Taxpayers' Right to Data Protection -- 3.1 EU Data Protection -- 3.2 The Application of the Data Protection Right to Taxpayers -- 4 Cybersecurity for All, Except for Taxpayers? -- 4.1 The Narrow Scope of Application of the EU Cybersecurity Law -- 4.2 Can a Taxpayers' Right to Cybersecurity Be Deducted from Data Protection Law? -- 5 Conclusion -- References -- Usable Privacy and Security from the Perspective of Cognitive Abilities. 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 4.1 Expert Interviews -- 4.2 Target Group Workshops -- 4.3 Combined Results and Proposed Guidelines -- 5 Discussion -- 6 Conclusions -- References -- Cloud Native Privacy Engineering through DevPrivOps -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cloud Native and Agile Software Development -- 2.2 Privacy -- 2.3 Privacy Engineering -- 3 Dimensions of Cloud Native Privacy Engineering -- 4 DevPrivOps: Privacy Engineering in Practice -- 5 Discussion and Conclusion -- References -- Gamification in mHealth - Opportunities and Privacy Risks -- 1 Introduction -- 2 Gamification -- 3 Related Work -- 4 Methodology -- 5 Analysis -- 5.1 Selection of Examples -- 5.2 Investigation of the Examples -- 6 Addressing Privacy Risks of Gamification Elements -- 6.1 Elements with Social Focus -- 6.2 Elements for Continuous Monitoring -- 6.3 Elements for Specific Goals -- 6.4 Leaderboard as Complementary Element -- 7 Conclusion -- References -- Exploration of Factors that Can Impact the Willingness of Employees to Share Smart Watch Data with Their Employers -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Survey Design -- 4.2 Survey Distribution -- 4.3 Survey Limitations -- 5 Results -- 5.1 Demographics -- 5.2 Ownership and Usage -- 5.3 Technical Knowledge About Smart Watch Capabilities -- 5.4 Legislation Knowledge -- 5.5 Technical Affinity -- 5.6 Intention to Disclose -- 6 Testing the Hypotheses -- 7 Discussion -- 8 Conclusions -- References -- A Questions -- Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands -- 1 Introduction -- 1.1 Platformization of Public Education -- 1.2 Impact of Platformization on Public Education -- 1.3 Remedying the Power Imbalance -- 1.4 Cooperative Responsibility. 1.5 The Case of the Privacy Covenant -- 2 Methodology -- 3 Results -- 3.1 Defining Public Values for Public Education -- 3.2 Allocating Responsibility in Data Protection -- 3.3 Public Deliberation and the Translation of Data Protection into an Agreement: The Privacy Covenant in Practice -- 4 Discussion -- 5 Conclusion -- References -- Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Areas of Interest -- 3.2 Phases and Technical Steps -- 3.3 Short-Term Anonymization Considerations -- 4 Summary and Future Research -- References -- Author Index. |
Record Nr. | UNINA-9910558497303321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.] |
Autore | Friedewald Michael |
Pubbl/distr/stampa | Taylor & Francis, 2017 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 323.44/82 |
Altri autori (Persone) | FriedewaldMichael <1965-> |
Collana | PRIO New Security Studies |
Soggetto topico |
Electronic surveillance - Social aspects
Electronic surveillance - Government policy Privacy, Right of - Social aspects National security - Social aspects |
Soggetto non controllato |
mass surveillance
privacy security Ed Snowden citizens Johann Čas Rocco Bellanova J. Peter Burgess Walter Peissl Tijs van den Broek Merel Ooms Marc van Lieshout Sven Rung Jelena Budak Edo Rajh Vedran Recher Hans Vermeersch Evelien De Pauw Sara Degli Esposti Vincenzo Pavone Elvira Santiago-Gmez Francesca Menichelli Luisa Marin Lilian Mitrou Prokopios Drogkaris George Leventakis Matthias Leese Peter Bescherer Bernadette Somody M Del Szab IvSzékely Gloria Gonzz Fuster Serge Gutwirth Maria Grazia Porcedda Dimitris Tsapogas Georgios Kolliarakis Stefan Strauß |
ISBN |
1-317-21353-X
1-315-61930-X 1-317-21354-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. I. Citizens' perceptions on security and privacy : empirical findings -- pt. II. Emergent security and surveillance systems -- pt. III. Governance of security and surveillance systems. |
Record Nr. | UNINA-9910765859003321 |
Friedewald Michael | ||
Taylor & Francis, 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.] |
Pubbl/distr/stampa | London ; ; New York, N.Y. : , : Routlede, , 2017 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 323.44/82 |
Altri autori (Persone) | FriedewaldMichael <1965-> |
Collana | PRIO New Security Studies |
Soggetto topico |
Electronic surveillance - Social aspects
Electronic surveillance - Government policy Privacy, Right of - Social aspects National security - Social aspects |
Soggetto genere / forma | Electronic books. |
ISBN |
1-317-21353-X
1-315-61930-X 1-317-21354-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. I. Citizens' perceptions on security and privacy : empirical findings -- pt. II. Emergent security and surveillance systems -- pt. III. Governance of security and surveillance systems. |
Record Nr. | UNINA-9910348217903321 |
London ; ; New York, N.Y. : , : Routlede, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|