Privacy Technologies and Policy 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers / [electronic resource] : edited by Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg. - 1st ed. 2017. - XIV, 231 p. 59 illus. online resource. - Security and Cryptology ; Lecture Notes in Computer Science 10518 10518 . - Security and Cryptology ; 10518 Lecture Notes in Computer Science ; 10518 .

The GDPR and Big Data: leading the way for Big Genetic Data? -- Towards a Privacy-preserving Reliable European Identity Ecosystem -- Forget Me, Forget Me Not - Redefining the Boundaries of the Right to be Forgotten to Address Current Problems and Areas of Criticism -- A Refinement Approach for the Reuse of Privacy Risk Analysis Results -- Neutralisation and Anonymization -- Gamified Approach to explore Techniques of Neutralization of Threat Actors in Cybercrime -- Design Data Exchange between CSIRTs -- Mr X vs. Mr Y: the Emergence of Externalities in Differential Privacy -- High-Utility Database Anonymization -- Privacy Policies in Practice -- Towards a Principled Approach for Engineering Privacy by Design -- PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites -- Privacy Data Management and Awareness for Public Administrations: a Case Study from the Healthcare Domain -- Better Data Protection by Design through Multicriteria Decision Making: On False Tradeoffs between Privacy and Utility.

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility. .

9783319672809

10.1007/978-3-319-67280-9 doi


Computers and civilization.
Computer security.
E-commerce.
Application software.
Algorithms.
Computers and Society.
Systems and Data Security.
e-Commerce/e-business.
Information Systems Applications (incl. Internet).
Algorithm Analysis and Problem Complexity.

QA76.9.C66

004
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha