Abstract is missing.
- Privacy-Preserving Authentication: Theory vs. PracticeDaniel Slamanig. 3-28 [doi]
- A Bottom-Up Movement to Develop Ethical Foundations for Generative AI in South Korea: Will It Simply Follow the West or Forge Its Own Path?Saebyoul Yun. 31-58 [doi]
- Manipulative Phantoms in the Machine: A Legal Examination of Large Language Model Hallucinations on Human Opinion FormationAimen Taimur. 59-77 [doi]
- TWIG: Two-Step Image Generation Using Segmentation Masks as an Intermediary in Diffusion Models to Prevent Copyright InfringementMazharul Islam Rakib, Showrin Rahman, Joyanta Jyoti Mondal, Xi Xiao, David Lewis, Alessandra Mileo, Meem Arafat Manab. 78-93 [doi]
- Shadows of Selfies: How Generative AI Fuels GBV-An Analysis of Non-consensual Sexualised Deepfakes Through Abolitionism and IntersectionalityAnastasia Karagianni. 94-111 [doi]
- Data Processing Diagrams - A Modeling Technique for Privacy in Complex Data Processing SystemsJob Doesburg, Pascal van Gastel, Bernard van Gastel, Erik Poll. 115-131 [doi]
- Generic Process Reference Model for Management SystemsKnut Haufe. 132-146 [doi]
- Protecting the Right to Private and Family Life Under the European Artificial Intelligence Act: Is a Risk Based Approach Enough?Juliusz Mrozinski. 147-165 [doi]
- Exploring Cultural Values and Online Privacy Concerns: A Model for Immigrant Consumers in Online MarketsAtiyeh Sadeghi. 166-175 [doi]
- Workshop: DAM - A Digital Adaptation Model to Jointly Shape a Post-AI WorldBenjamin Burde, Anna Czeschik. 176-184 [doi]