000 05773nam a22008175i 4500
001 978-3-032-07574-1
003 DE-He213
005 20260304124503.0
007 cr nn 008mamaa
008 251010s2026 sz | s |||| 0|eng d
020 _a9783032075741
_9978-3-032-07574-1
024 7 _a10.1007/978-3-032-07574-1
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
072 7 _aUBJ
_2thema
082 0 4 _a303.4834
_223
245 1 0 _aPrivacy Technologies and Policy
_h[electronic resource] :
_b13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings /
_cedited by Narges Arastouei, Meiko Jensen, Kai Rannenberg.
250 _a1st ed. 2026.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2026.
300 _aXII, 221 p. 27 illus., 24 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
341 0 _bPDF/UA-1
_2onix
341 0 _bTable of contents navigation
_2onix
341 0 _bSingle logical reading order
_2onix
341 0 _bShort alternative textual descriptions
_2onix
341 0 _bUse of color is not sole means of conveying information
_2onix
341 0 _bUse of high contrast between text and background color
_2onix
341 0 _bNext / Previous structural navigation
_2onix
341 0 _bAll non-decorative content supports reading without sight
_2onix
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v16183
505 0 _a -- Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems. -- “I will never pay for this” Perceptions of fairness and factors affecting behaviour on ‘pay-or-ok’ models. -- “Abort the login”: Understanding Phishing Susceptibility through Warning Design in the Context of 2FA. -- Expert Strategies to Assist Laypeople in Making Decisions and Adopting Privacy-Enhancing Technologies. -- Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation. -- Interfacing Human Brains: What could go wrong?. -- Anonymity-washing. -- Simple now, Complex later: The Questionable Efficacy of Diluting GDPR Article 30(5). -- Professional Methods & Tools for Analysis and Decision Making. -- Turning to Online Forums for Legal Information: A Case Study of GDPR’s Legitimate Interests. -- Illuminating the DPIA Blackbox – A Survey of Data Protection Impact Assessment Practices in Organisations. -- Information Inference Diagrams: Complementing Privacy and Security Analyses Beyond Data Flows.
506 0 _aOpen Access
520 _aThis open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am Main, Germany, during October 22-23, 2025. The 9 full papers were carefully reviewed and selected from 27 submissions.They were organized into following topical sections: Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems; Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation; Professional Methods & Tools for Analysis and Decision Making.
532 8 _aAccessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.
532 8 _aNo reading system accessibility options actively disabled
532 8 _aPublisher contact for further accessibility information: accessibilitysupport@springernature.com
650 0 _aComputers and civilization.
650 0 _aApplication software.
_999
650 0 _aComputer networks .
650 0 _aComputer systems.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 1 4 _aComputers and Society.
650 2 4 _aComputer and Information Systems Applications.
_9101
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer System Implementation.
650 2 4 _aCryptology.
650 2 4 _aData and Information Security.
700 1 _aArastouei, Narges.
_eeditor.
_0(orcid)0000-0001-6445-2645
_1https://orcid.org/0000-0001-6445-2645
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923780
700 1 _aJensen, Meiko.
_eeditor.
_0(orcid)0009-0003-2397-9813
_1https://orcid.org/0009-0003-2397-9813
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923781
700 1 _aRannenberg, Kai.
_eeditor.
_0(orcid)0009-0000-6142-7161
_1https://orcid.org/0009-0000-6142-7161
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923782
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783032075734
776 0 8 _iPrinted edition:
_z9783032075758
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v16183
856 4 0 _uhttps://doi.org/10.1007/978-3-032-07574-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SXPS
912 _aZDB-2-LNC
912 _aZDB-2-SOB
999 _c579867
_d579867