دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Michael Friedewald (editor), Melek Önen (editor), Eva Lievens (editor), Stephan Krenn (editor), Samuel Fricker (editor) سری: ISBN (شابک) : 3030425037, 9783030425036 ناشر: Springer سال نشر: 2020 تعداد صفحات: 480 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 25 مگابایت
در صورت تبدیل فایل کتاب Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, ... and Communication Technology, 576) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدیریت حریم خصوصی و هویت داده ها برای زندگی بهتر: هوش مصنوعی و حریم خصوصی: چهاردهمین دوره IFIP WG 9.2، 9.6/11.7، 11.6/SIG 9.2.2 مدرسه تابستانی بین المللی، ... و فناوری ارتباطات، 576) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب ارائه شده در چهاردهمین دوره مدرسه تابستانی بین المللی IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 در مدیریت حریم خصوصی و هویت است که در ویندیش، سوئیس برگزار شد. ، در آگوست 2019.
22 مقاله کامل موجود در این جلد به دقت بررسی و از بین 31 مقاله ارسالی انتخاب شدند. همچنین شامل مقالات بررسی شده است که نتایج کارگاه ها و آموزش هایی را که در مدرسه تابستانی برگزار شد و همچنین مقالات ارائه شده توسط چند نفر از سخنرانان مدعو ارائه شده است. این مقالات رویکردهای بین رشتهای را برای گرد هم آوردن مجموعهای از دیدگاهها که در بخشهای موضوعی منعکس میشوند ترکیب میکنند: زبان و حریم خصوصی. قانون، اخلاق و هوش مصنوعی؛ بیومتریک و حریم خصوصی؛ ابزارهایی که از انطباق حفاظت از داده ها پشتیبانی می کنند. طبقه بندی حریم خصوصی و ارزیابی امنیتی؛ فنآوریهای افزایش حریم خصوصی در زمینههای خاص.
فصلهای \"نگاه شما چه چیزی درباره شما آشکار میکند؟ در مورد پیامدهای حریم خصوصی ردیابی چشم\" و \"پیامهای حریم خصوصی صدا و تجزیه و تحلیل گفتار - افشای اطلاعات توسط استنتاج\" تحت مجوز CC BY 4.0 در link.springer.com دسترسی آزاد دارند.
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019.
The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts.
The chapters \"What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking\" and \"Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference\" are open access under a CC BY 4.0 license at link.springer.com.
Preface Organization Contents Invited Papers Privacy as Enabler of Innovation 1 The Role of Privacy in Innovation Processes 2 Privacy and Data Protection – Two Sides of the Coin 2.1 From Privacy to Data Protection 2.2 Companies Active in Data Protection 3 Two Takes on Privacy Markets 3.1 Tools Focusing on Privacy Protection 3.2 Privacy-Friendly Products and Services 4 Challenges and Ways Forward 5 Conclusions References Fair Enough? On (Avoiding) Bias in Data, Algorithms and Decisions 1 Introduction 2 Abstract Objectivity and Human Construction 3 How Is Bias Relevant in Computational Technologies? 4 Biases in Natural Language 5 Should We Do Something About Bias? 6 Formal Methods as Tools for Understanding 7 Concluding Remarks References Workshop and Tutorial Papers Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics 1 Introduction 2 Background and Motivation 2.1 The Concept of Dynamic Consent 2.2 Imaginary Scenario 3 Methodology 3.1 Designing the Prototype 3.2 Evaluating the Prototype 4 Results 4.1 Implementing Dynamic Consent 4.2 Perception of Dynamic Consent 5 Discussion 5.1 Reflecting on Dynamic Consent 5.2 Limits 6 Related Work 7 Conclusion References Identity Management: State of the Art, Challenges and Perspectives-8pt 1 Introduction 2 Identity Management and Existing Solutions 2.1 The Problem with Online Identity 2.2 Current Identity Management Solutions 3 Privacy-Enhancing Attribute-Based Credentials 4 Single Sign-On with Distributed Trust 4.1 The OLYMPUS Approach 4.2 Open Questions 4.3 Discussions at the Workshop References SoK: Cryptography for Neural Networks 1 Introduction 2 Neural Networks 2.1 Definition 2.2 Architecture 2.3 Approximation of NN Layers 2.4 Security Requirements 3 Cryptographic Techniques 3.1 Multi-party Computation 3.2 Fully Homomorphic Encryption 4 Existing Solutions 4.1 MPC-Based Privacy Preserving NN Solutions 4.2 FHE-Based Privacy Preserving NN Solutions 4.3 Hybrid Solution 5 Performance Study 5.1 Arrhythmia Case Study 5.2 Image Classification Case Study 5.3 Performance Evaluation of Cryptographic Techniques on Arrhythmia Classification 6 Summary References Workshop on Privacy Challenges in Public and Private Organizations 1 Introduction 2 Motivation and Objectives 3 Workshop Format 4 Lessons Learned from the PoSeID-on Project Perspective 4.1 Use Cases 4.2 Dashboard and Data Analysis Modules 5 Lessons Learned from the PAPAYA Project Perspective 6 Conclusion References News Diversity and Recommendation Systems: Setting the Interdisciplinary Scene 1 Introduction 2 News Recommendations Systems Today 3 A Fundamental Right to Diverse Information 4 Unravelling News Diversity 4.1 Normative Assumptions 4.2 Conceptual Assumptions 5 Automated Extraction of Content Dimensions in Written News 5.1 Topics 5.2 Events 6 Towards a Diversity-Promoting News Recommender References Language and Privacy Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing 1 Introduction 2 Related Work 2.1 Protection Methods 2.2 Data Transformation 2.3 Ontologies and Taxonomies 2.4 Summary 3 Analysis of Domain Cases 4 Ontology-Based Modeling 5 Models of Domain Cases 6 Modeling an Open Dataset 7 Discussion 8 Conclusion References On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces 1 Introduction 1.1 Data Flow Diagrams 1.2 IoT Entities, Processes, and Data Flows 1.3 Organization of the Paper 2 Background and Related Work 3 IoT Privacy Goals and Threats 4 Privacy-Centered Smart Living Data Lifecycle 5 Application of the Privacy-Centered Smart Living Data Lifecycle 6 Discussion 7 Conclusions and Future Work References Language-Based Mechanisms for Privacy-by-Design 1 Introduction 2 Language Constructs for Policy Specification 2.1 Policy Compliance Definition 3 Embedding Policy with Program Constructs 4 An Effect System for Privacy 5 Case Study 6 Related Work 7 Conclusion References Law, Ethics and AI Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data Protection 1 Introduction 1.1 Terminology 2 The Evolution of Humanitarian Action 3 AI and Biometrics in Humanitarian Action 3.1 General Trends in AI-Based Facial Recognition 3.2 The Prospective Use of Facial Recognition to Identify Missing Persons in the Humanitarian Sector 4 Privacy and Data Protection Concerns 4.1 Purpose Limitation 4.2 Data Security 4.3 Fairness and Bias 5 Application of Humanitarian Principles 5.1 ‘Do No Harm’ 5.2 Participation by Beneficiaries and Building on Local Capacity 5.3 Accountability: Value for Money or Humanitarian Effectiveness 6 Outlook for Future Engagement References Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software 1 Introduction 2 Related Work 3 Research Agenda 3.1 Model Assumptions 3.2 Data Collection 3.3 Engineer the Game: Mechanism Design 4 Conclusion References Recommended for You: “You Don’t Need No Thought Control”. An Analysis of News Personalisation in Light of Article 22 GDPR 1 Introduction 2 News Personalisation at News Websites 3 A Prohibition Based on Article 22 GDPR and Freedom to Form Thoughts and Opinions Concerning Matters of General Interest 3.1 Generating News Recommendations by Solely Automated Means 3.2 Limitations on the Basis of the Freedom to Form Thoughts and Opinions Concerning Matters of General Interest 3.3 Explicit Consent as an Exception 4 Conclusion References Biometrics and Privacy Data Privatizer for Biometric Applications and Online Identity Management 1 Introduction 2 Related Work 3 Private Feature Extraction Framework 3.1 High-Level Framework and Threat Model 3.2 Privacy-Preserving Training Objective 3.3 Neural Networks Architecture 3.4 Optimization of the Networks 4 Evaluation 4.1 Experimental Setup 4.2 Experimental Results 5 Conclusion References What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking 1 Introduction 2 Inference of Personal Information from Eye Tracking Data 2.1 Biometric Identification 2.2 Monitoring of Mental Workload and Cognitive Processes 2.3 Inference of Personality Traits 2.4 Inference of Cultural Affiliation and Ethnicity 2.5 Skill Assessment 2.6 Age and Gender Recognition 2.7 Inference of Preferences and Aversions 2.8 Detection of Short- and Medium-Term User States 2.9 Health Assessment 3 Discussion and Implications 4 Conclusion References Privacy Implications of Voice and Speech Analysis – Information Disclosure by Inference 1 Introduction 2 Inference of Personal Information from Voice Recordings 2.1 Speaker Recognition 2.2 Inference of Body Measures 2.3 Mood and Emotion Recognition 2.4 Inference of Age and Gender 2.5 Inference of Personality Traits 2.6 Deception Detection 2.7 Detection of Sleepiness and Intoxication 2.8 Accent Recognition 2.9 Speaker Pathology 2.10 Mental Health Assessment 2.11 Prediction of Interpersonal Perception 2.12 Inference of Socioeconomic Status 2.13 Classification of Acoustic Scenes and Events 3 Discussion and Implications 4 Conclusion References Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute 1 Introduction 2 Background 2.1 The Use of Biometrics for Border Control 2.2 Right to Privacy 3 Viewpoints of Privacy: Why It Can Not Be Absolute 3.1 Privacy versus National Security 3.2 Privacy Properties Conflicting with Border Risk Analysis 3.3 Privacy by Design (PbD) and Engineering Design 4 Conclusions References Tools Supporting Data Protection Compliance Making GDPR Usable: A Model to Support Usability Evaluations of Privacy 1 Introduction 2 Putting the Work into Context 3 The Usable Privacy Cube Model 4 EuroPriSe 5 Usable Privacy Goals 6 Usable Privacy Criteria 6.1 List of up Criteria 7 Interactions Between the Three Axes 8 Conclusion and Further Work References Decision Support for Mobile App Selection via Automated Privacy Assessment 1 Introduction 2 Related Work 3 Approach Overview and Design Goals 3.1 Overview 3.2 Requirements 4 System Design 4.1 App Isolation Module 4.2 Metadata Downloader 4.3 Parameters Inspection Modules 4.4 Personalized Privacy Assessment 4.5 Visualization Engine (VE) and Graphical User Interface (GUI) 5 Evaluation and Discussion 6 Conclusion and Future Work References Tool-Assisted Risk Analysis for Data Protection Impact Assessment 1 Introduction 2 Background 3 Our Methodology 3.1 First Step: Processing Analysis 3.2 Second Step: Risk Analysis 4 Related Work 5 Conclusion and Future Work References Privacy Classification and Security Assessment How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors 1 Introduction 2 Related Work on End-User Privacy Protection Classification and Modeling 2.1 High-Level Classifications 2.2 Active and Passive 2.3 Chronological Classifications 2.4 Classification from a Technological Perspective 2.5 Fine-Grained Approaches 2.6 Taxonomies and Models 3 Methodology 3.1 Literature Review 3.2 Classification of Behaviors and Model Generation 4 Results and Explanation of the Model 5 Discussion 5.1 Implications 5.2 Limitations 6 Conclusion and Future Work References Annotation-Based Static Analysis for Personal Data Protection 1 Introduction 2 Background and Related Work 2.1 Categorisation by Problem Characteristics 2.2 Categorisation by Solution Characteristics 2.3 Related Work 3 Tool 3.1 Design of the Tool 3.2 Implementation 4 Discussion 4.1 Metrics for Personal Data Prevalence 4.2 Finding LPL Purposes 4.3 Regarding the GDPR and Static Analysis 5 Conclusion References Order of Control and Perceived Control over Personal Information 1 Introduction 2 Order of Control for Personal Information 3 Analysis of Literature on Perceptions of Control 4 Preliminary Study on the Order of Control and Perceptions of Control 4.1 Method 4.2 Procedure 4.3 Results 4.4 Discussion 5 General Discussion and Conclusion References Aggregating Corporate Information Security Maturity Levels of Different Assets 1 Introduction 2 Background and Related Work 2.1 Aggregation Types 2.2 Aggregation of Security Metrics 3 Research Methodology 3.1 Different Aggregation Functions 3.2 Data Collection 3.3 Algorithm Method Selection 4 Discussion of Different Aggregations 4.1 General Aggregation Functions 4.2 Derived Optimization Strategies 4.3 Example with Real World Data 4.4 More Complex Aggregations 4.5 Priorization of Asset Classes 5 Results of the Holistic Approach Considering Different Aggregation Types 5.1 Results of Aggregated Maturity Levels 5.2 Results of Priorization the Asset 6 Discussion 6.1 Limitations 7 Conclusion and Future Work References Privacy Enhancing Technologies in Specific Contexts Differential Privacy in Online Dating Recommendation Systems 1 Introduction 2 Preliminiaries 2.1 Differential Privacy 2.2 Online Dating Recommendation Systems 3 Results 3.1 Social Collab 3.2 RECON 3.3 Stochastic Matching 4 Conclusion and Open Problems References Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets 1 Introduction 2 Related Work 2.1 Provenance Tracing for Data in AI Development 2.2 Provenance Tracing Using Blockchain 2.3 Limitations of State of the Art 3 Provenance Model for AI Assets on a Public Permission-Less Blockchain 4 Implementation 4.1 System Overview 4.2 Smart Contract 4.3 Protocol Specification 5 Validation 5.1 Medical Use Case 5.2 Smart Contract Interactions and Costs for TUM Use Case 5.3 Smart Contract Limitations 6 Discussion References A Survey-Based Exploration of Users\' Awareness and Their Willingness to Protect Their Data with Smart Objects 1 Introduction 2 Related Work 3 Methodology 4 Results 4.1 Demographics 4.2 Knowledge and Experience 4.3 Collection, Disclosure, and Privacy 4.4 Information and Control Willingness 5 Derived Requirements for User-Centric-Privacy-Preserving Solutions 6 Discussion 7 Conclusions and Outlook A Appendix - Survey questions References Self-Sovereign Identity Systems 1 Introduction 2 Self-Sovereign Identity 3 Evaluation Framework 4 State-of-the-Art Developments in Practice 4.1 Sovrin 4.2 uPort 4.3 ShoCard 4.4 Civic 4.5 Blockstack 5 Discussion 6 Conclusion References Privacy in Location-Based Services and Their Criticality Based on Usage Context 1 Introduction 2 Background 2.1 Indoor and Outdoor Localization 2.2 Privacy Patterns for Localization Information 3 Related Work 4 Methodology 5 Analysis 5.1 Use Cases of Location-Based Services 5.2 Analysis of Typical Realizations of Use Cases 5.3 Privacy Patterns in Location Based Services 6 Discussion and Conclusion References Author Index