Abstract is missing.
- Privacy as Enabler of InnovationDaniel Bachlechner, Marc van Lieshout, Tjerk Timan. 3-16 [doi]
- Fair Enough? On (Avoiding) Bias in Data, Algorithms and DecisionsFrancien Dechesne. 17-26 [doi]
- Opportunities and Challenges of Dynamic Consent in Commercial Big Data AnalyticsEva Schlehahn, Patrick Murmann, Farzaneh Karegar, Simone Fischer-Hübner. 29-44 [doi]
- Identity Management: State of the Art, Challenges and PerspectivesTore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno. 45-62 [doi]
- SoK: Cryptography for Neural NetworksMonir Azraoui, Muhammad Barham, Beyza Bozdemir, Sébastien Canard, Eleonora Ciceri, Orhan Ermis, Ramy Masalha, Marco Mosconi, Melek Önen, Marie Paindavoine, Boris Rozenberg, Bastien Vialla, Sauro Vicini. 63-81 [doi]
- Workshop on Privacy Challenges in Public and Private OrganizationsAlessandra Bagnato, Paulo Silva, Ala Sarah Alaqra, Orhan Ermis. 82-89 [doi]
- News Diversity and Recommendation Systems: Setting the Interdisciplinary SceneGlen Joris, Camiel Colruyt, Judith Vermeulen, Stefaan Vercoutere, Frederik De Grove, Kristin Van Damme, Orphée De Clercq, Cynthia Van Hee, Lieven De Marez, Véronique Hoste, Eva Lievens, Toon De Pessemier, Luc Martens. 90-105 [doi]
- Ontology-Based Modeling of Privacy Vulnerabilities for Data SharingJens Hjort Schwee, Fisayo Caleb Sangogboye, Aslak Johansen, Mikkel Baun Kjærgaard. 109-125 [doi]
- On the Design of a Privacy-Centered Data Lifecycle for Smart Living SpacesJoseph Bugeja, Andreas Jacobsson. 126-141 [doi]
- Language-Based Mechanisms for Privacy-by-DesignShukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. 142-158 [doi]
- Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data ProtectionJúlia Zomignani Barboza, Lina Jasmontaite-Zaniewicz, Laurence Diver. 161-176 [doi]
- Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source SoftwareOguz Özgür Karadeniz, Stefan Schiffner. 177-189 [doi]
- Recommended for You: "You Don't Need No Thought Control". An Analysis of News Personalisation in Light of Article 22 GDPRJudith Vermeulen. 190-205 [doi]
- Data Privatizer for Biometric Applications and Online Identity ManagementGiuseppe Garofalo, Davy Preuveneers, Wouter Joosen. 209-225 [doi]
- What Does Your Gaze Reveal About You? On the Privacy Implications of Eye TrackingJacob Leon Kröger, Otto Hans-Martin Lutz, Florian Müller. 226-241 [doi]
- Privacy Implications of Voice and Speech Analysis - Information Disclosure by InferenceJacob Leon Kröger, Otto Hans-Martin Lutz, Philip Raschke. 242-258 [doi]
- Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be AbsoluteMohamed Abomhara, Sule Yildirim Yayilgan, Marina Shalaginova, Zoltán Székely. 259-271 [doi]
- Making GDPR Usable: A Model to Support Usability Evaluations of PrivacyJohanna Johansen, Simone Fischer-Hübner. 275-291 [doi]
- Decision Support for Mobile App Selection via Automated Privacy AssessmentJens Wettlaufer, Hervais Simo. 292-307 [doi]
- Tool-Assisted Risk Analysis for Data Protection Impact AssessmentSalimeh Dashti, Silvio Ranise. 308-324 [doi]
- How to Protect My Privacy? - Classifying End-User Information Privacy Protection BehaviorsFrank Ebbers. 327-342 [doi]
- Annotation-Based Static Analysis for Personal Data ProtectionKalle Hjerppe, Jukka Ruohonen, Ville Leppänen. 343-358 [doi]
- Order of Control and Perceived Control over Personal InformationYefim Shulman, Thao Ngo, Joachim Meyer. 359-375 [doi]
- Aggregating Corporate Information Security Maturity Levels of Different AssetsMichael Schmid, Sebastian Pape 0001. 376-392 [doi]
- Differential Privacy in Online Dating Recommendation SystemsTeresa Anna Steiner. 395-410 [doi]
- Distributed Ledger for Provenance Tracking of Artificial Intelligence AssetsPhilipp Lüthi, Thibault Gagnaux, Marcel Gygli. 411-426 [doi]
- A Survey-Based Exploration of Users' Awareness and Their Willingness to Protect Their Data with Smart ObjectsChathurangi Ishara Wickramasinghe, Delphine Reinhardt. 427-446 [doi]
- Privacy in Location-Based Services and Their Criticality Based on Usage ContextTom Lorenz, Ina Schiering. 462-478 [doi]