Abstract is missing.
- Towards Real-Time Web Tracking Detection with T.EX - The Transparency EXtensionPhilip Raschke, Sebastian Zickau, Jacob Leon Kröger, Axel Küpper. 3-17 [doi]
- Towards Transparency in Email TrackingMax Maass, Stephan Schwär, Matthias Hollick. 18-27 [doi]
- Sharing Cyber Threat Intelligence Under the General Data Protection RegulationAdham Albakri, Eerke A. Boiten, Rogério de Lemos. 28-41 [doi]
- Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating SystemsAndreas Gutmann, Mark Warner. 45-58 [doi]
- Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights DiscourseBettina Berendt. 59-71 [doi]
- Making Machine Learning ForgetSaurabh Shintre, Kevin A. Roundy, Jasjeet Dhaliwal. 72-83 [doi]
- A Multilateral Privacy Impact Analysis Method for Android AppsMajid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg. 87-106 [doi]
- Re-using Personal Data for Statistical and Research Purposes in the Context of Big Data and Artificial IntelligenceYordanka Ivanova. 107-135 [doi]
- IoT Security and Privacy LabelsYun Shen, Pierre-Antoine Vervier. 136-147 [doi]
- Digital Forensics and Privacy-by-Design: Example in a Blockchain-Based Dynamic Navigation SystemDavid Billard, Baptiste Bartolomei. 151-160 [doi]
- A Data Protection by Design Model for Privacy Management in Electronic Health RecordsGiorgia Bincoletto. 161-181 [doi]
- Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their DataColine Boniface, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, Cristiana Santos. 182-209 [doi]