Privacy Symposium 2022


Book Description

This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services. Chapter 8 and 10 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com







Privacy Symposium 2023


Book Description

This book presents the proceedings of the Privacy Symposium 2023. the book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expertise, it provides cutting-edge perspective on international data protection regulations convergence, as well as data protection compliance of emerging technologies, such as artificial intelligence, e-health, blockchain, edge computing, Internet of Things, V2X and smart grid. Papers encompass various topics, including international law and comparative law in data protection and compliance, cross-border data transfer, emerging technologies and data protection compliance, data protection by design, technology for compliance and data protection, data protection good practices across industries and verticals, cybersecurity and data protection, assessment and certification of data protection compliance, and data subject rights implementation.




Privacy and Identity Management


Book Description

This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.




Computer Security -- ESORICS 2012


Book Description

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.




Seek and Hide


Book Description

“Gajda’s chronicle reveals an enduring tension between principles of free speech and respect for individuals’ private lives. …just the sort of road map we could use right now.”—The Atlantic “Wry and fascinating…Gajda is a nimble storyteller [and] an insightful guide to a rich and textured history that gets easily caricatured, especially when a culture war is raging.”—The New York Times An urgent book for today's privacy wars, and essential reading on how the courts have--for centuries--often protected privileged men's rights at the cost of everyone else's. Should everyone have privacy in their personal lives? Can privacy exist in a public place? Is there a right to be left alone even in the United States? You may be startled to realize that the original framers were sensitive to the importance of privacy interests relating to sexuality and intimate life, but mostly just for powerful and privileged (and usually white) men. The battle between an individual’s right to privacy and the public’s right to know has been fought for centuries. The founders demanded privacy for all the wrong press-quashing reasons. Supreme Court jus­tice Louis Brandeis famously promoted First Amend­ment freedoms but argued strongly for privacy too; and presidents from Thomas Jefferson through Don­ald Trump confidently hid behind privacy despite intense public interest in their lives. Today privacy seems simultaneously under siege and surging. And that’s doubly dangerous, as legal expert Amy Gajda argues. Too little privacy leaves ordinary people vulnerable to those who deal in and publish soul-crushing secrets. Too much means the famous and infamous can cloak themselves in secrecy and dodge accountability. Seek and Hide carries us from the very start, when privacy concepts first entered American law and society, to now, when the law al­lows a Silicon Valley titan to destroy a media site like Gawker out of spite. Muckraker Upton Sinclair, like Nellie Bly before him, pushed the envelope of privacy and propriety and then became a privacy advocate when journalists used the same techniques against him. By the early 2000s we were on our way to today’s full-blown crisis in the digital age, worrying that smartphones, webcams, basement publishers, and the forever internet had erased the right to privacy completely.







Baltic Polymer Symposium


Book Description

Selected, peer reviewed papers from the 12th international conference Baltic Polymer Symposium 2012, September 19-22, 2012, Liepaja, Latvia







Information Security and Privacy


Book Description

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021. The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.