top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.)
Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.)
Pubbl/distr/stampa Baden-Baden : , : Nomos, , 2023
Descrizione fisica 1 Online Ressource
Disciplina 005.8
Collana Privatheit und Selbstbestimmung in der digitalen Welt | Privacy and Self-Determination in the Digital World
Soggetto topico Data protection
Electronic commerce
Fairness
ISBN 9783748938743
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNISA-996545353603316
Baden-Baden : , : Nomos, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.)
Daten-Fairness in einer globalisierten Welt / / Michael Friedewald [and four others] (Hrsg.)
Pubbl/distr/stampa Baden-Baden : , : Nomos, , 2023
Descrizione fisica 1 Online Ressource
Disciplina 005.8
Collana Privatheit und Selbstbestimmung in der digitalen Welt | Privacy and Self-Determination in the Digital World
Soggetto topico Data protection
Electronic commerce
Fairness
ISBN 9783748938743
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910737286703321
Baden-Baden : , : Nomos, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (273 pages) : illustrations
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Application software
ISBN 3-030-72465-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464416803316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn
Privacy and identity management : 15th IFIP WG 9. 2, 9. 6/11. 7, 11. 6/SIG 9. 2. 2 International Summer School, Maribor, Slovenia, September 21-23, 2020, revised selected papers / / Edited by Michael Friedewald, Stefan Schiffner and Stephan Krenn
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (273 pages) : illustrations
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Application software
ISBN 3-030-72465-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483058703321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others]
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (213 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer networks - Security measures
ISBN 3-030-99100-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Keynote Papers -- Challenges for Designing Serious Games on Security and Privacy Awareness -- 1 Introduction -- 2 Sample Serious Games to Prevent Social Engineering and Raise Privacy Awareness -- 2.1 HATCH -- 2.2 PROTECT -- 2.3 CyberSecurity Awareness Quiz -- 2.4 Leech -- 3 Game Content Creation and Adaption -- 3.1 Addressing Target Groups -- 3.2 Addressing Recent Attacks -- 4 Evaluation of Serious Games -- 4.1 Effectiveness -- 4.2 Legal and Ethical Assessment -- 5 Summary and Conclusion -- References -- Information Security Risk Management -- 1 Introduction -- 2 Technical Cybersecurity -- 3 Technical Cybersecurity is a Data Economy -- 4 Organisational Security -- 5 Organisational Cybersecurity Needs to Become a Data Economy -- 6 Creating the Data for Organisational Situational Awareness -- 7 Towards an Informed Governance -- References -- Workshop and Tutorial Papers -- Conceptualising the Legal Notion of 'State of the Art' in the Context of IT Security -- 1 State of the Art in Legal Interventions -- 1.1 'State of the Art' as Protection Goal -- 1.2 State of the Art vs. Best Available Techniques -- 1.3 The Deployment of State of the Art in the Context of IT/Data Security Regulation -- 2 A Three-Step-Test to Determine State of the Art Technology -- 2.1 The Development of the Three-Step-Test -- 2.2 The Dynamic Function of Technical Measures -- 2.3 The Objective Nature of the State of the Art Criterion and the Principle of Proportionality -- 3 Conclusion -- References -- Privacy-Preserving Identity Management and Applications to Academic Degree Verification -- 1 Introduction -- 2 Concepts and Technologies -- 2.1 Entities and Processes -- 2.2 Security and Privacy Goals -- 2.3 Cryptographic Building Blocks -- 3 Demonstration Case and Piloting Results -- 3.1 Demonstrator Background and Specification.
3.2 The CyberSec4Europe Demonstrator -- 3.3 Evaluation Phase -- 4 The OLYMPUS Framework -- 4.1 OLYMPUS Architecture and Roles -- 4.2 Application to the Use Case -- 5 Conclusion and Future Work -- References -- The State of Surveillance - An Overall Account of Surveillance? -- 1 Introduction -- 2 Rights, Courts and Surveillance -- 3 An Overall Account of Surveillance? -- 4 Outlook: A Way Forward -- References -- Selected Student Papers -- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain -- 2.2 Usage Control -- 2.3 Transaction Privacy -- 3 System Model -- 3.1 Scenario -- 3.2 Privacy and Security Threat Model -- 4 Proposed Framework -- 5 Privacy and Security Analysis -- 5.1 Privacy Threats and Mitigations -- 5.2 UCS Neutralisation -- 6 Conclusion -- References -- SynCare: An Innovative Remote Patient Monitoring System Secured by Cryptography and Blockchain -- 1 Introduction -- 2 Related Work -- 3 System Design -- 4 Implementation -- 4.1 Overall Flow -- 4.2 The Mobile App -- 4.3 The Encrypted Cloud DB -- 4.4 The Blockchain Consent Validation and Synchronization -- 4.5 The Clinical Dashboard -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxpayers' Rights, the Right to Data Protection and Cybersecurity in the EU -- 1 Introduction -- 2 EU Tax Law, Poor Soil for Taxpayers' Rights? -- 3 The Taxpayers' Right to Data Protection -- 3.1 EU Data Protection -- 3.2 The Application of the Data Protection Right to Taxpayers -- 4 Cybersecurity for All, Except for Taxpayers? -- 4.1 The Narrow Scope of Application of the EU Cybersecurity Law -- 4.2 Can a Taxpayers' Right to Cybersecurity Be Deducted from Data Protection Law? -- 5 Conclusion -- References -- Usable Privacy and Security from the Perspective of Cognitive Abilities.
1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 4.1 Expert Interviews -- 4.2 Target Group Workshops -- 4.3 Combined Results and Proposed Guidelines -- 5 Discussion -- 6 Conclusions -- References -- Cloud Native Privacy Engineering through DevPrivOps -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cloud Native and Agile Software Development -- 2.2 Privacy -- 2.3 Privacy Engineering -- 3 Dimensions of Cloud Native Privacy Engineering -- 4 DevPrivOps: Privacy Engineering in Practice -- 5 Discussion and Conclusion -- References -- Gamification in mHealth - Opportunities and Privacy Risks -- 1 Introduction -- 2 Gamification -- 3 Related Work -- 4 Methodology -- 5 Analysis -- 5.1 Selection of Examples -- 5.2 Investigation of the Examples -- 6 Addressing Privacy Risks of Gamification Elements -- 6.1 Elements with Social Focus -- 6.2 Elements for Continuous Monitoring -- 6.3 Elements for Specific Goals -- 6.4 Leaderboard as Complementary Element -- 7 Conclusion -- References -- Exploration of Factors that Can Impact the Willingness of Employees to Share Smart Watch Data with Their Employers -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Survey Design -- 4.2 Survey Distribution -- 4.3 Survey Limitations -- 5 Results -- 5.1 Demographics -- 5.2 Ownership and Usage -- 5.3 Technical Knowledge About Smart Watch Capabilities -- 5.4 Legislation Knowledge -- 5.5 Technical Affinity -- 5.6 Intention to Disclose -- 6 Testing the Hypotheses -- 7 Discussion -- 8 Conclusions -- References -- A Questions -- Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands -- 1 Introduction -- 1.1 Platformization of Public Education -- 1.2 Impact of Platformization on Public Education -- 1.3 Remedying the Power Imbalance -- 1.4 Cooperative Responsibility.
1.5 The Case of the Privacy Covenant -- 2 Methodology -- 3 Results -- 3.1 Defining Public Values for Public Education -- 3.2 Allocating Responsibility in Data Protection -- 3.3 Public Deliberation and the Translation of Data Protection into an Agreement: The Privacy Covenant in Practice -- 4 Discussion -- 5 Conclusion -- References -- Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Areas of Interest -- 3.2 Phases and Technical Steps -- 3.3 Short-Term Anonymization Considerations -- 4 Summary and Future Research -- References -- Author Index.
Record Nr. UNISA-996464543803316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others]
Privacy and identity management : between data protection and security : 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, virtual event, August 16-20, 2021, revised selected papers / / edited by Michael Friedewald [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (213 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer networks - Security measures
ISBN 3-030-99100-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Keynote Papers -- Challenges for Designing Serious Games on Security and Privacy Awareness -- 1 Introduction -- 2 Sample Serious Games to Prevent Social Engineering and Raise Privacy Awareness -- 2.1 HATCH -- 2.2 PROTECT -- 2.3 CyberSecurity Awareness Quiz -- 2.4 Leech -- 3 Game Content Creation and Adaption -- 3.1 Addressing Target Groups -- 3.2 Addressing Recent Attacks -- 4 Evaluation of Serious Games -- 4.1 Effectiveness -- 4.2 Legal and Ethical Assessment -- 5 Summary and Conclusion -- References -- Information Security Risk Management -- 1 Introduction -- 2 Technical Cybersecurity -- 3 Technical Cybersecurity is a Data Economy -- 4 Organisational Security -- 5 Organisational Cybersecurity Needs to Become a Data Economy -- 6 Creating the Data for Organisational Situational Awareness -- 7 Towards an Informed Governance -- References -- Workshop and Tutorial Papers -- Conceptualising the Legal Notion of 'State of the Art' in the Context of IT Security -- 1 State of the Art in Legal Interventions -- 1.1 'State of the Art' as Protection Goal -- 1.2 State of the Art vs. Best Available Techniques -- 1.3 The Deployment of State of the Art in the Context of IT/Data Security Regulation -- 2 A Three-Step-Test to Determine State of the Art Technology -- 2.1 The Development of the Three-Step-Test -- 2.2 The Dynamic Function of Technical Measures -- 2.3 The Objective Nature of the State of the Art Criterion and the Principle of Proportionality -- 3 Conclusion -- References -- Privacy-Preserving Identity Management and Applications to Academic Degree Verification -- 1 Introduction -- 2 Concepts and Technologies -- 2.1 Entities and Processes -- 2.2 Security and Privacy Goals -- 2.3 Cryptographic Building Blocks -- 3 Demonstration Case and Piloting Results -- 3.1 Demonstrator Background and Specification.
3.2 The CyberSec4Europe Demonstrator -- 3.3 Evaluation Phase -- 4 The OLYMPUS Framework -- 4.1 OLYMPUS Architecture and Roles -- 4.2 Application to the Use Case -- 5 Conclusion and Future Work -- References -- The State of Surveillance - An Overall Account of Surveillance? -- 1 Introduction -- 2 Rights, Courts and Surveillance -- 3 An Overall Account of Surveillance? -- 4 Outlook: A Way Forward -- References -- Selected Student Papers -- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain -- 2.2 Usage Control -- 2.3 Transaction Privacy -- 3 System Model -- 3.1 Scenario -- 3.2 Privacy and Security Threat Model -- 4 Proposed Framework -- 5 Privacy and Security Analysis -- 5.1 Privacy Threats and Mitigations -- 5.2 UCS Neutralisation -- 6 Conclusion -- References -- SynCare: An Innovative Remote Patient Monitoring System Secured by Cryptography and Blockchain -- 1 Introduction -- 2 Related Work -- 3 System Design -- 4 Implementation -- 4.1 Overall Flow -- 4.2 The Mobile App -- 4.3 The Encrypted Cloud DB -- 4.4 The Blockchain Consent Validation and Synchronization -- 4.5 The Clinical Dashboard -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Taxpayers' Rights, the Right to Data Protection and Cybersecurity in the EU -- 1 Introduction -- 2 EU Tax Law, Poor Soil for Taxpayers' Rights? -- 3 The Taxpayers' Right to Data Protection -- 3.1 EU Data Protection -- 3.2 The Application of the Data Protection Right to Taxpayers -- 4 Cybersecurity for All, Except for Taxpayers? -- 4.1 The Narrow Scope of Application of the EU Cybersecurity Law -- 4.2 Can a Taxpayers' Right to Cybersecurity Be Deducted from Data Protection Law? -- 5 Conclusion -- References -- Usable Privacy and Security from the Perspective of Cognitive Abilities.
1 Introduction -- 2 Background -- 3 Methodology -- 4 Results -- 4.1 Expert Interviews -- 4.2 Target Group Workshops -- 4.3 Combined Results and Proposed Guidelines -- 5 Discussion -- 6 Conclusions -- References -- Cloud Native Privacy Engineering through DevPrivOps -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cloud Native and Agile Software Development -- 2.2 Privacy -- 2.3 Privacy Engineering -- 3 Dimensions of Cloud Native Privacy Engineering -- 4 DevPrivOps: Privacy Engineering in Practice -- 5 Discussion and Conclusion -- References -- Gamification in mHealth - Opportunities and Privacy Risks -- 1 Introduction -- 2 Gamification -- 3 Related Work -- 4 Methodology -- 5 Analysis -- 5.1 Selection of Examples -- 5.2 Investigation of the Examples -- 6 Addressing Privacy Risks of Gamification Elements -- 6.1 Elements with Social Focus -- 6.2 Elements for Continuous Monitoring -- 6.3 Elements for Specific Goals -- 6.4 Leaderboard as Complementary Element -- 7 Conclusion -- References -- Exploration of Factors that Can Impact the Willingness of Employees to Share Smart Watch Data with Their Employers -- 1 Introduction -- 2 Related Work -- 3 Research Goals -- 4 Methodology -- 4.1 Survey Design -- 4.2 Survey Distribution -- 4.3 Survey Limitations -- 5 Results -- 5.1 Demographics -- 5.2 Ownership and Usage -- 5.3 Technical Knowledge About Smart Watch Capabilities -- 5.4 Legislation Knowledge -- 5.5 Technical Affinity -- 5.6 Intention to Disclose -- 6 Testing the Hypotheses -- 7 Discussion -- 8 Conclusions -- References -- A Questions -- Public Education, Platformization and Cooperative Responsibility: The Case of the Privacy Covenant in the Netherlands -- 1 Introduction -- 1.1 Platformization of Public Education -- 1.2 Impact of Platformization on Public Education -- 1.3 Remedying the Power Imbalance -- 1.4 Cooperative Responsibility.
1.5 The Case of the Privacy Covenant -- 2 Methodology -- 3 Results -- 3.1 Defining Public Values for Public Education -- 3.2 Allocating Responsibility in Data Protection -- 3.3 Public Deliberation and the Translation of Data Protection into an Agreement: The Privacy Covenant in Practice -- 4 Discussion -- 5 Conclusion -- References -- Observing Road Freight Traffic from Mobile Network Signalling Data While Respecting Privacy and Business Confidentiality -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 3.1 Areas of Interest -- 3.2 Phases and Technical Steps -- 3.3 Short-Term Anonymization Considerations -- 4 Summary and Future Research -- References -- Author Index.
Record Nr. UNINA-9910558497303321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.]
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.]
Autore Friedewald Michael
Pubbl/distr/stampa Taylor & Francis, 2017
Descrizione fisica 1 online resource (311 pages)
Disciplina 323.44/82
Altri autori (Persone) FriedewaldMichael <1965->
Collana PRIO New Security Studies
Soggetto topico Electronic surveillance - Social aspects
Electronic surveillance - Government policy
Privacy, Right of - Social aspects
National security - Social aspects
Soggetto non controllato mass surveillance
privacy
security
Ed Snowden
citizens
Johann Čas
Rocco Bellanova
J. Peter Burgess
Walter Peissl
Tijs van den Broek
Merel Ooms
Marc van Lieshout
Sven Rung
Jelena Budak
Edo Rajh
Vedran Recher
Hans Vermeersch
Evelien De Pauw
Sara Degli Esposti
Vincenzo Pavone
Elvira Santiago-Gmez
Francesca Menichelli
Luisa Marin
Lilian Mitrou
Prokopios Drogkaris
George Leventakis
Matthias Leese
Peter Bescherer
Bernadette Somody
M Del Szab
IvSzékely
Gloria Gonzz Fuster
Serge Gutwirth
Maria Grazia Porcedda
Dimitris Tsapogas
Georgios Kolliarakis
Stefan Strauß
ISBN 1-317-21353-X
1-315-61930-X
1-317-21354-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. I. Citizens' perceptions on security and privacy : empirical findings -- pt. II. Emergent security and surveillance systems -- pt. III. Governance of security and surveillance systems.
Record Nr. UNINA-9910765859003321
Friedewald Michael  
Taylor & Francis, 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.]
Surveillance, privacy and security : citizens' perspectives / / edited by Michael Friedewald. [et al.]
Pubbl/distr/stampa London ; ; New York, N.Y. : , : Routlede, , 2017
Descrizione fisica 1 online resource (311 pages)
Disciplina 323.44/82
Altri autori (Persone) FriedewaldMichael <1965->
Collana PRIO New Security Studies
Soggetto topico Electronic surveillance - Social aspects
Electronic surveillance - Government policy
Privacy, Right of - Social aspects
National security - Social aspects
Soggetto genere / forma Electronic books.
ISBN 1-317-21353-X
1-315-61930-X
1-317-21354-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. I. Citizens' perceptions on security and privacy : empirical findings -- pt. II. Emergent security and surveillance systems -- pt. III. Governance of security and surveillance systems.
Record Nr. UNINA-9910348217903321
London ; ; New York, N.Y. : , : Routlede, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui