Privacy and Identity Management. The Smart Revolution


Book Description

This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.




Privacy and Identity Management. Time for a Revolution?


Book Description

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.




Gendered Configurations of Humans and Machines


Book Description

In numerous fields of science, work, and everyday life, humans and machines have been increasingly entangled, developing an ever-growing toolbox of interactions. These entanglements affect our daily lives and pose possibilities as well as restrictions, chances as well as challenges. The contributions of this volume tackle related issues by adopting a highly interdisciplinary perspective. How do digitalization and artificial intelligence affect gender relations? How can intersectionality be newly understood in an increasingly internationally networked world? This volume is a collection of contributions deriving from the “Interdisciplinary Conference on the Relations of Humans, Machines and Gender” which took place in Braunschweig (October 16–19, 2019). It also includes the keynotes given by Cecile Crutzen, Galit Wellner and Helen Verran.




Vulnerability and Data Protection Law


Book Description

Vulnerability and Data Protection Law offers a rich analysis of the meaning of 'data subjects' and 'vulnerability' within the context of the General Data Protection Regulation. It seeks to reconceptualise data subjects' vulnerability in the digital age and to promote a 'vulnerability-aware' interpretation of the GDPR.




Innovations in Cyber Physical Systems


Book Description

The book presents a collection of peer-reviewed articles from the International Conference on Innovations in Cyber Physical Systems (ICICPS 2020). The conference provided opportunities for the presentation of new research results and discussion about them. It was also an opportunity to generation of new ideas in all CPS aspects, including theory, tools, applications, systems, test-beds and field deployments. The range of topics explored is wide, and covers security, control, optimization, machine learning, game theory, mechanism design, mobile and cloud computing, model-based design, verification, data mining/analytics, signal processing, and human-in-the-loop shared or supervisory control. This book will be useful to researchers, students, industrialist, developers, and practitioners alike.




Data Protection without Data Protectionism


Book Description

This open access book offers a new account on the legal conflict between privacy and trade in the digital sphere. It develops a fundamental rights theory with a new right to continuous protection of personal data and explores the room for the application of this new right in trade law. Replicable legal analysis and practical solutions show the way to deal with cross-border data flows without violating fundamental rights and trade law principles. The interplay of privacy and trade became a topic of worldwide attention in the wake of Edward Snowden’s revelations concerning US mass surveillance. Based on claims brought forward by the activist Maximilian Schrems, the ECJ passed down two high-profile rulings restricting EU-US data flows. Personal data is relevant for a wide range of services that are supplied across borders and restrictions on data flows therefore have an impact on the trade with such services. After the two rulings by the ECJ, it is less clear then ever how privacy protection and trade can be brought together on an international scale. Although it was widely understood that the legal dispute over EU-US data flows concerns the broad application of EU data protection law, it has never been fully explored just how far the EU’s requirements for the protection of digital rights go and what this means beyond EU-US data flows. This book shows how the international effects of EU data protection law are rooted in the EU Charter of Fundamental Rights and that the architecture of EU law demands that the Charter as primary EU law takes precedence over international law. The book sets out to solve the problem of how the EU legal data transfer regime must be designed to implement the EU’s extraterritorial fundamental rights requirements without violating the principles of the WTO’s law on services. It also addresses current developments in international trade law – the conclusion of comprehensive trade agreements – and offers suggestion for the design of data flow clauses that accommodate privacy and trade.




Data Protection and Privacy, Volume 15


Book Description

This book offers conceptual analyses, highlights issues, proposes solutions, and discusses practices regarding privacy and data protection in transitional times. It is one of the results of the 15th annual International Conference on Computers, Privacy and Data Protection (CPDP), which was held in Brussels in May 2022. We are in a time of transition. Artificial Intelligence is making significant breakthroughs in how humans use data and information, and is changing our lives in virtually all aspects. The pandemic has pushed society to adopt changes in how, when, why, and the media through which, we interact. A new generation of European digital regulations - such as the AI Act, Digital Services Act, Digital Markets Act, Data Governance Act, and Data Act - is on the horizon. This raises difficult questions as to which rights we should have, the degree to which these rights should be balanced against other poignant social interests, and how these rights should be enforced in light of the fluidity and uncertainty of circumstances. The book covers a range of topics, including: data protection risks in European retail banks; data protection, privacy legislation, and litigation in China; synthetic data generation as a privacy-preserving technique for the training of machine learning models; effectiveness of privacy consent dialogues; legal analysis of the role of individuals in data protection law; and the role of data subject rights in the platform economy. This interdisciplinary book has been written at a time when the scale and impact of data processing on society – on individuals as well as on social systems – is becoming ever more important. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.




Further with Knowledge Graphs


Book Description

The field of semantic computing is highly diverse, linking areas such as artificial intelligence, data science, knowledge discovery and management, big data analytics, e-commerce, enterprise search, technical documentation, document management, business intelligence, and enterprise vocabulary management. As such it forms an essential part of the computing technology that underpins all our lives today. This volume presents the proceedings of SEMANTiCS 2021, the 17th International Conference on Semantic Systems. As a result of the continuing Coronavirus restrictions, SEMANTiCS 2021 was held in a hybrid form in Amsterdam, the Netherlands, from 6 to 9 September 2021. The annual SEMANTiCS conference provides an important platform for semantic computing professionals and researchers, and attracts information managers, IT­architects, software engineers, and researchers from a wide range of organizations, such as research facilities, NPOs, public administrations and the largest companies in the world. The subtitle of the 2021 conference’s was “In the Era of Knowledge Graphs”, and 66 submissions were received, from which the 19 papers included here were selected following a rigorous single-blind reviewing process; an acceptance rate of 29%. Topics covered include data science, machine learning, logic programming, content engineering, social computing, and the Semantic Web, as well as the additional sub-topics of digital humanities and cultural heritage, legal tech, and distributed and decentralized knowledge graphs. Providing an overview of current research and development, the book will be of interest to all those working in the field of semantic systems.




Nudging Public Policy


Book Description

This book asks several critical questions relevant to those interested in public policy: What is a nudge? What are the ethical implications of and justifications for nudges? Are we able to have nudges without affecting one’s freedom to choose? In what institutional context are nudges likely to work well and in what context are they likely to fail? The text explores several real-world instances of government attempts at successful choice architecture across a wide range of policy topics: internet privacy laws, environmental policy, education policy, the sharing economy, and creating a national culture. This approach also highlights the spontaneous and evolutionary nature of social institutions like culture and trust. Attempts from policymakers to generate these social institutions where they did not exist previously are unlikely to succeed unless they are aligned with the unique characteristics of the society in question. This raises the question of whether the seemingly successful policy interventions were even necessary. A few of the chapters in this book directly examine these issues through case studies of both Latin America and Singapore. Each chapter in this volume explores the ways in which individuals in society respond to attempts by policymakers to “nudge” them towards a specific outcome. Some chapters explore the theoretical arguments in favor of utilizing this behavioral policy approach. Others explore the feasibility and potential limitations of this approach to public policy. Several of the chapters apply market process theory to understand a particular case study where nudge policies have been put into practice. The chapters, authored by an interdisciplinary group of policy scholars, include discussions of internet privacy laws, the sharing economy, education policy, environmental policy, as well as social issues such as trust and culture.




Deep Diving into Data Protection


Book Description

This book celebrates the 40th anniversary of the creation of the CRID and the 10th anniversary of its successor, the CRIDS. It gathers twenty-one very high quality contributions on extremely interesting and topical aspects of data protection. The authors come from Europe as well as from the United States of America and Canada. Their contributions have been grouped as follows: 1° ICT Governance; 2° Commodification & Competition; 3° Secret surveillance; 4° Whistleblowing; 5° Social Medias, Web Archiving & Journalism; 6° Automated individual decision-making; 7° Data Security; 8° Privacy by design; 9° Health, AI, Scientific Research & Post-Mortem Privacy. This book is intended for all academics, researchers, students and practitioners who have an interest in privacy and data protection.