Abstract is missing.
- Blueprints for Deploying Privacy Enhancing Technologies in E-GovernmentLiina Kamm, Dan Bogdanov, Eduardo Brito, Andre Ostrak. 3-19 [doi]
- The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU's Regulatory ArchitectureMaria Grazia Porcedda. 20-28 [doi]
- Towards an Affordance-Based Typology of Personal Data StoresAugust Bourgeus, Tim Theys, Nanouk Verhulst, Laurens Vandercruysse, Peter Mechant. 31-45 [doi]
- Assuring GDPR Conformance Through Language-Based ComplianceChinmayi Prabhu Baramashetru, Silvia Lizeth Tapia Tarifa, Olaf Owe. 46-63 [doi]
- User Interaction Data in Apps: Comparing Policy Claims to ImplementationsFeiyang Tang, Bjarte M. Østvold. 64-80 [doi]
- Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software DevelopmentBjørn Aslak Juliussen, Jon Petter Rui, Dag Johansen. 81-96 [doi]
- Digital Security Controversy Analysis: A Case Study of the Debate over GCHQ Exceptional Access ProposalCynthia Ng. 97-113 [doi]
- Educating Parents in Managing Online Privacy Risks: Media Educators' PerspectivesAnn-Kristin Lieberknecht. 114-126 [doi]
- A Walk in the Labyrinth. Evolving EU Regulatory Framework for Secondary Use of Electronic Personal Health Data for Scientific ResearchPawel Hajduk. 127-142 [doi]
- Who Is the Attacker - Analyzing Data Protection Violations in Health CareRamona Schmidt, Ina Schiering. 143-157 [doi]
- Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and ChallengesMehdi Akbari Gurabi, Felix Hermsen, Avikarsha Mandal, Stefan Decker. 158-174 [doi]
- Secure and Privacy-Preserving Authentication for Data Subject Rights EnforcementMalte Hansen, Andre Büttner. 175-191 [doi]
- A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETsMahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman. 192-210 [doi]
- Entangled: A Case Study of Data Exchange and Actor Relationships in a Mobility EcosystemDaniel Richter, Jürgen Anke. 211-226 [doi]
- Enhancing Transparency Through Personal Information Management Systems: Current State of Service Offerings and Considerations for Further AdvancementsJanina Rochon. 227-243 [doi]
- User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoTPiero Romare. 244-264 [doi]
- Privacy and Utility Evaluation of Synthetic Tabular Data for Machine LearningFelix Hermsen, Avikarsha Mandal. 265-281 [doi]
- Empirical Evaluation of Synthetic Data Created by Generative Models via Attribute Inference AttackSaloni Kwatra, Vicenç Torra. 282-291 [doi]
- How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media ContextVera Schmitt, Paul Michel dit Ferrer, Arooj Anwar Khan, Ina Kern, Sebastian Möller 0001. 292-308 [doi]
- Private Training Approaches - A PrimerJenni Reuben, Ala Sarah Alaqra. 311-324 [doi]
- Workshop on Cybersecurity of Critical InfrastructuresAida Akbarzadeh, Sabarathinam Chockalingam, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo Palacios, László Erdodi, Nathan Lau, Siv Hilde Houmb. 325-339 [doi]