| 000 | 05773nam a22008175i 4500 | ||
|---|---|---|---|
| 001 | 978-3-032-07574-1 | ||
| 003 | DE-He213 | ||
| 005 | 20260304124503.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 251010s2026 sz | s |||| 0|eng d | ||
| 020 |
_a9783032075741 _9978-3-032-07574-1 |
||
| 024 | 7 |
_a10.1007/978-3-032-07574-1 _2doi |
|
| 050 | 4 | _aQA76.9.C66 | |
| 072 | 7 |
_aUBJ _2bicssc |
|
| 072 | 7 |
_aCOM079000 _2bisacsh |
|
| 072 | 7 |
_aUBJ _2thema |
|
| 082 | 0 | 4 |
_a303.4834 _223 |
| 245 | 1 | 0 |
_aPrivacy Technologies and Policy _h[electronic resource] : _b13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings / _cedited by Narges Arastouei, Meiko Jensen, Kai Rannenberg. |
| 250 | _a1st ed. 2026. | ||
| 264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2026. |
|
| 300 |
_aXII, 221 p. 27 illus., 24 illus. in color. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 341 | 0 |
_bPDF/UA-1 _2onix |
|
| 341 | 0 |
_bTable of contents navigation _2onix |
|
| 341 | 0 |
_bSingle logical reading order _2onix |
|
| 341 | 0 |
_bShort alternative textual descriptions _2onix |
|
| 341 | 0 |
_bUse of color is not sole means of conveying information _2onix |
|
| 341 | 0 |
_bUse of high contrast between text and background color _2onix |
|
| 341 | 0 |
_bNext / Previous structural navigation _2onix |
|
| 341 | 0 |
_bAll non-decorative content supports reading without sight _2onix |
|
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v16183 |
|
| 505 | 0 | _a -- Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems. -- “I will never pay for this” Perceptions of fairness and factors affecting behaviour on ‘pay-or-ok’ models. -- “Abort the login”: Understanding Phishing Susceptibility through Warning Design in the Context of 2FA. -- Expert Strategies to Assist Laypeople in Making Decisions and Adopting Privacy-Enhancing Technologies. -- Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation. -- Interfacing Human Brains: What could go wrong?. -- Anonymity-washing. -- Simple now, Complex later: The Questionable Efficacy of Diluting GDPR Article 30(5). -- Professional Methods & Tools for Analysis and Decision Making. -- Turning to Online Forums for Legal Information: A Case Study of GDPR’s Legitimate Interests. -- Illuminating the DPIA Blackbox – A Survey of Data Protection Impact Assessment Practices in Organisations. -- Information Inference Diagrams: Complementing Privacy and Security Analyses Beyond Data Flows. | |
| 506 | 0 | _aOpen Access | |
| 520 | _aThis open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am Main, Germany, during October 22-23, 2025. The 9 full papers were carefully reviewed and selected from 27 submissions.They were organized into following topical sections: Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems; Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation; Professional Methods & Tools for Analysis and Decision Making. | ||
| 532 | 8 | _aAccessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub. | |
| 532 | 8 | _aNo reading system accessibility options actively disabled | |
| 532 | 8 | _aPublisher contact for further accessibility information: accessibilitysupport@springernature.com | |
| 650 | 0 | _aComputers and civilization. | |
| 650 | 0 |
_aApplication software. _999 |
|
| 650 | 0 | _aComputer networks . | |
| 650 | 0 | _aComputer systems. | |
| 650 | 0 | _aCryptography. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aData protection. | |
| 650 | 1 | 4 | _aComputers and Society. |
| 650 | 2 | 4 |
_aComputer and Information Systems Applications. _9101 |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aComputer System Implementation. |
| 650 | 2 | 4 | _aCryptology. |
| 650 | 2 | 4 | _aData and Information Security. |
| 700 | 1 |
_aArastouei, Narges. _eeditor. _0(orcid)0000-0001-6445-2645 _1https://orcid.org/0000-0001-6445-2645 _4edt _4http://id.loc.gov/vocabulary/relators/edt _923780 |
|
| 700 | 1 |
_aJensen, Meiko. _eeditor. _0(orcid)0009-0003-2397-9813 _1https://orcid.org/0009-0003-2397-9813 _4edt _4http://id.loc.gov/vocabulary/relators/edt _923781 |
|
| 700 | 1 |
_aRannenberg, Kai. _eeditor. _0(orcid)0009-0000-6142-7161 _1https://orcid.org/0009-0000-6142-7161 _4edt _4http://id.loc.gov/vocabulary/relators/edt _923782 |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer Nature eBook | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783032075734 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783032075758 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v16183 |
|
| 856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-032-07574-1 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-SXCS | ||
| 912 | _aZDB-2-SXPS | ||
| 912 | _aZDB-2-LNC | ||
| 912 | _aZDB-2-SOB | ||
| 999 |
_c579867 _d579867 |
||