語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy and Identity Management. Dat...
~
Fricker, Samuel.
Privacy and Identity Management. Data for Better Living: AI and Privacy = 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Privacy and Identity Management. Data for Better Living: AI and Privacy/ edited by Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker.
其他題名:
14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
其他作者:
Fricker, Samuel.
面頁冊數:
XI, 480 p. 196 illus., 46 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Cryptology. -
電子資源:
https://doi.org/10.1007/978-3-030-42504-3
ISBN:
9783030425043
Privacy and Identity Management. Data for Better Living: AI and Privacy = 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
Privacy and Identity Management. Data for Better Living: AI and Privacy
14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /[electronic resource] :edited by Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker. - 1st ed. 2020. - XI, 480 p. 196 illus., 46 illus. in color.online resource. - IFIP AICT Tutorials ;576. - IFIP AICT Tutorials ;476.
Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software -- Recommended for you: "You don't need no thought control" – An analysis of news personalisation in light of Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection -- Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
ISBN: 9783030425043
Standard No.: 10.1007/978-3-030-42504-3doiSubjects--Topical Terms:
1211076
Cryptology.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Privacy and Identity Management. Data for Better Living: AI and Privacy = 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
LDR
:05192nam a22004215i 4500
001
1020508
003
DE-He213
005
20200703152214.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030425043
$9
978-3-030-42504-3
024
7
$a
10.1007/978-3-030-42504-3
$2
doi
035
$a
978-3-030-42504-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Privacy and Identity Management. Data for Better Living: AI and Privacy
$h
[electronic resource] :
$b
14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers /
$c
edited by Michael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XI, 480 p. 196 illus., 46 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
IFIP AICT Tutorials ;
$v
576
505
0
$a
Invited Papers -- Privacy as Enabler of Innovation -- Fair Enough? On Avoiding Bias in Data, Algorithms and Decisions -- Workshop and Tutorial Papers -- Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics -- Identity Management: State of the Art, Challenges and Perspectives -- SoK: Cryptography for Neural Networks -- Workshop on Privacy Challenges in Public and Private Organizations -- News diversity and recommendation systems: Setting the interdisciplinary scene -- Language and Privacy -- Ontology-based Modeling of Privacy Vulnerabilities for Data Sharing -- On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces -- Language-Based Mechanisms for Privacy by Design -- Law, Ethics and AI -- Get to Know Your Geek: Towards a Sociological Understanding of Incentives to Develop Privacy-Friendly Free and Open Source Software -- Recommended for you: "You don't need no thought control" – An analysis of news personalisation in light of Article 22 GDPR -- Biometrics and Privacy -- Data privatizer for biometric applications and online identity management -- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking -- Privacy Implications of Voice and Speech Analysis { Information Disclosure by Inference -- Border Control and Use of Biometrics: Reasons Why Right to Privacy can not be Absolute -- Tools Supporting Data Protection Compliance -- Making GDPR Usable: A Model to Support Usability Evaluations of Privacy -- Decision Support for Mobile App Selection via Automated Privacy Assessment -- A Tool-Assisted Risk Analysis for Data Protection Impact Assessment -- Privacy Classification and Security Assessment -- How to Protect my Privacy? - Classifying End-User Information Privacy Protection Behaviors -- Annotation-based Static Analysis for Personal Data Protection -- Order of Control and Perceived Control over Personal Information -- Aggregating Corporate Information Security Maturity Levels of Different Assets -- Privacy Enhancing Technologies in Specific Contexts -- Differential Privacy in Online Dating Recommendation Systems -- Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets -- A Survey-based Exploration of Users' Awareness and their Willingness to Protect their Data with Smart Objects -- Self-Sovereign Identity Systems: Evaluation Framework -- Privacy in Location-Based Services and their Criticality based on Usage Context.
520
$a
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Data mining.
$3
528622
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
700
1
$a
Fricker, Samuel.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1315994
700
1
$a
Krenn, Stephan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309865
700
1
$a
Lievens, Eva.
$e
editor.
$1
https://orcid.org/0000-0001-5993-923X
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1315993
700
1
$a
Önen, Melek.
$e
editor.
$1
https://orcid.org/0000-0003-0269-9495
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1315992
700
1
$a
Friedewald, Michael.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1280419
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030425036
776
0 8
$i
Printed edition:
$z
9783030425050
776
0 8
$i
Printed edition:
$z
9783030425067
830
0
$a
IFIP AICT Tutorials ;
$v
476
$3
1267781
856
4 0
$u
https://doi.org/10.1007/978-3-030-42504-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入