Rezultaty
ESR 2, 5, 10, and 11 will submit a report with privacy principles and protection targets relevant in their respective application domain (by M16). Building on this input, ESRs 6 and 9 submit a report that reflects on whether legal concerns further influence the privacy threats (by M20).
Results of the Fifth Training EventReport on results of the organized training event at GUF.
Requirements AnalysisEach ESR will contribute to this deliverable with a requirements analysis report for the respective technological artifact to be developed.
Researcher Declarations and Career DevelopmentAll ESRs will submit a PhD research proposal and Career Development Plan (devised with their supervisors and co-supervisors) to the Supervisory Board to be approved and to be discussed at the Network-wide Event 3.
The Initial ModelsEach ESR will submit a report with a review of the relevant and a detailed specification of the modeling approach that will be taken.
Risk Awareness CreationESR 1 takes one or more of the major risks identified and visualizes them for the user. It creates risk awareness through transparency (by M30). ESR 3 submits a report with experimental results of how ownership and risk perceptions change as a result of risk transparency and risk awareness.
Fourth Public Engagement and Dissemination ReportPeriodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.
Refined User Interfaces and User StudiesEach ESR will submit a report presenting the final designs for the user interaction components. In addition, the reports will contain the final evaluation data.
Results of the Fourth Training EventReport on results of the organized training event at UCL.
Model-based RecommendationsEach ESR will submit a report with additional empirical results and recommendations for system design based on the empirical studies and the model predictions.
Third Public Engagement and Dissemination ReportPeriodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.
The Detailed ModelsEach ESR will submit a report presenting the empirical method for validating the model (such as a platform for conducting experiments) and a sufficiently developed model to provide specific predictions. A report will present the model and the method for validation.
Results of the Third Training EventReport on results of the organized training event at TAU.
Risk AssessmentDuring a summer school all ESRs jointly engage in risk assessment for the four application domains of ESRs 2, 5, 10 and 11. Major risks are communicated in relevant press and policy channels.
Results of the First Training EventReport on results of the organized training event at KAU.
Description of Technological ArtifactsThis report will present the final descriptions of the technological artifacts to be developed by the ESRs. All WP2 ESRs will contribute to this deliverable.
Ethicsethic authorisations
First Public Engagement and Dissemination ReportPeriodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.
Technological ArtifactsThis final report of WP2 is about the results of the PRIVACY.US technology evaluations, which will provide details about the validity and utility of the individual technological artifacts. Contributions will be made by all WP2 ESRs.
Results of the Sixth Training EventReport on results of the organized training event at EWT.
Validation Experiments and ResultsEach ESR will submit a report presenting the results of the validation experiment and conclusions regarding the model.
Risk MitigationESR 11 reports on how the risks identified for genomic data handling can actually be addressed through appropriate system controls.
User Interface RequirementsEach ESR will submit a report with the user interface requirements for their specific part.
Results of the Second Training EventReport on results of the organized training event at WU.
RecruitmentA report on the recruitment results from all partners.
Validation Experiment and ResultsEach ESR will submit a report presenting the results of the validation experiment and updated user interfaces.
Second Public Engagement and Dissemination ReportPeriodic report summarizing and monitoring the effectiveness of the public engagement activities and the dissemination of the research outputs of all partners.
User Interface Designs and PrototypesEach ESR will submit a report presenting the current user interface concepts and prototypes (mainly low-fidelity) as well as detailed concepts for their evaluation (including study plans).
List of members of the supervisory and management boards and the meeting minutes and of the supervisory board.
Progress ReportAnnual reports for the consortium management, performance monitoring, and administrative and financial coordination.
Draft Periodic ReportAnnual reports for the consortium management, performance monitoring, and administrative and financial coordination.
Publikacje
Autorzy:
Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund
Opublikowane w:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21–23, 2020, Proceedings, Numer 580, 2020, Strona(/y) 109-123, ISBN 978-3-030-58200-5
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-58201-2_8
Autorzy:
G. Anthony Giannoumis; Molly K. Land; Agnieszka Kitkowska; Maria Mikhaylova
Opublikowane w:
The UN Convention on the Rights of Persons with Disabilities – A Commentary, Numer 2018, 2018
Wydawca:
Oxford Commentaries on International Law
DOI:
10.5281/zenodo.1418451
Autorzy:
Yefim Shulman
Opublikowane w:
Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Numer 526, 2018, Strona(/y) 187-204, ISBN 978-3-319-92924-8
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-92925-5_12
Autorzy:
Alexandr Railean, Delphine Reinhardt
Opublikowane w:
Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, Numer 526, 2018, Strona(/y) 132-149, ISBN 978-3-319-92924-8
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-92925-5_9
Autorzy:
Poornigha Santhana Kumar, Michael Bechinie, Manfred Tscheligi
Opublikowane w:
Human-Computer Interaction – INTERACT 2019 - 17th IFIP TC 13 International Conference, Paphos, Cyprus, September 2–6, 2019, Proceedings, Part II, Numer 11747, 2019, Strona(/y) 55-68, ISBN 978-3-030-29383-3
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-29384-0_4
Autorzy:
Yefim Shulman, Joachim Meyer
Opublikowane w:
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, Numer 547, 2019, Strona(/y) 222-238, ISBN 978-3-030-16743-1
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-16744-8_15
Autorzy:
Majid Hatamian, Nurul Momen, Lothar Fritsch, Kai Rannenberg
Opublikowane w:
Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Numer 11498, 2019, Strona(/y) 87-106, ISBN 978-3-030-21751-8
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-21752-5_7
Autorzy:
Majid Hatamian, Sebastian Pape, Kai Rannenberg
Opublikowane w:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Numer 562, 2019, Strona(/y) 165-179, ISBN 978-3-030-22311-3
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-22312-0_12
Autorzy:
Andreas Gutmann, Mark Warner
Opublikowane w:
Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Numer 11498, 2019, Strona(/y) 45-58, ISBN 978-3-030-21751-8
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-21752-5_4
Autorzy:
Lamya Abdullah, Felix Freiling, Juan Quintero, Zinaida Benenson
Opublikowane w:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Numer 11387, 2019, Strona(/y) 137-152, ISBN 978-3-030-12785-5
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-12786-2_9
Autorzy:
Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner
Opublikowane w:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, Numer 562, 2019, Strona(/y) 209-222, ISBN 978-3-030-22311-3
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-22312-0_15
Autorzy:
Yefim Shulman, Thao Ngo, Joachim Meyer
Opublikowane w:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Numer 576, 2020, Strona(/y) 359-375, ISBN 978-3-030-42503-6
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-42504-3_23
Autorzy:
Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wastlund
Opublikowane w:
IEEE Access, Numer 8, 2020, Strona(/y) 21236-21260, ISSN 2169-3536
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2020.2969562
Autorzy:
Patrick Murmann, Simone Fischer-Hubner
Opublikowane w:
IEEE Access, Numer 5, 2017, Strona(/y) 22965-22991, ISSN 2169-3536
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2017.2765539
Autorzy:
Hubert A. Jäger, Lamya Abdullah, Juan Quintero
Opublikowane w:
Datenschutz und Datensicherheit - DuD, Numer 41/12, 2017, Strona(/y) 729-734, ISSN 1614-0702
Wydawca:
Springer
DOI:
10.1007/s11623-017-0868-y
Autorzy:
Majid Hatamian, Jetzabel Serna, Kai Rannenberg
Opublikowane w:
Computers & Security, Numer 83, 2019, Strona(/y) 332-353, ISSN 0167-4048
Wydawca:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2019.02.010
Autorzy:
Dilisha Patel, Ann Blandford, Mark Warner, Jill Shawe, Judith Stephenson
Opublikowane w:
Proceedings of the ACM on Human-Computer Interaction, Numer 3/CSCW, 2019, Strona(/y) 1-20, ISSN 2573-0142
Wydawca:
ACM
DOI:
10.1145/3359184
Autorzy:
Alexandros Mittos, Bradley Malin, Emiliano De Cristofaro
Opublikowane w:
Proceedings on Privacy Enhancing Technologies, Numer 2019/1, 2019, Strona(/y) 87-107, ISSN 2299-0984
Wydawca:
Sciendo
DOI:
10.2478/popets-2019-0006
Autorzy:
L. Jarovsky
Opublikowane w:
European Data Protection Law Review, Numer 4/4, 2018, Strona(/y) 447-458, ISSN 2364-2831
Wydawca:
EDPL
DOI:
10.21552/edpl/2018/4/7
Autorzy:
Nurul Momen, Majid Hatamian, Lothar Fritsch
Opublikowane w:
IEEE Security & Privacy, Numer 17/6, 2019, Strona(/y) 10-20, ISSN 1540-7993
Wydawca:
IEEE Computer Society
DOI:
10.1109/msec.2019.2938445
Autorzy:
Majid Hatamian
Opublikowane w:
IEEE Access, Numer 8, 2020, Strona(/y) 35429-35445, ISSN 2169-3536
Wydawca:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2020.2974911
Autorzy:
Patrick Murmann
Opublikowane w:
International Journal of Mobile Human Computer Interaction, Numer 11
10.4018/IJMHCI.2019
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMHCI.2019/4, 2019, Strona(/y) 66-83, ISSN 1942-390X
Wydawca:
The Information Resources Management Association (IRMA)
DOI:
10.4018/ijmhci.2019100106
Autorzy:
Lamya Abdullah, Juan Quintero
Opublikowane w:
Information & Computer Security, Numer 27/5, 2019, Strona(/y) 601-620, ISSN 2056-4961
Wydawca:
Emerald
DOI:
10.1108/ics-11-2018-0133
Autorzy:
Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro
Opublikowane w:
ACM Transactions on the Web, Numer 14/4, 2020, Strona(/y) 1-38, ISSN 1559-1131
Wydawca:
Association for Computing Machinary, Inc.
DOI:
10.1145/3404994
Autorzy:
Juan Quintero and Zinaida Benenson
Opublikowane w:
2nd International Conference on Machine Learning and Machine Intelligence (MLMI 2019), 2019
Wydawca:
ACM
Autorzy:
Majid Hatamian, Jetzabel Serna-Olvera
Opublikowane w:
2017 IEEE International Conference on Consumer Electronics (ICCE), 2017, Strona(/y) 468-471, ISBN 978-1-5090-5544-9
Wydawca:
IEEE
DOI:
10.1109/ICCE.2017.7889399
Autorzy:
Majid Hatamian, Jetzabel Serna, Kai Rannenberg, Bodo Igler
Opublikowane w:
International Conference On Trust, Privacy & Security In Digital Business (TrustBus 2017), 2017, Strona(/y) 3-18
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-319-64483-7_1
Autorzy:
Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo
Opublikowane w:
Posters -- 13th Symposium on Usable Privacy and Security (SOUPS 2017), 2017
Wydawca:
Usenix
DOI:
10.5281/zenodo.1117769
Autorzy:
Majid Hatamian, Jetzabel Serna
Opublikowane w:
2017 International Carnahan Conference on Security Technology (ICCST), 2017, Strona(/y) 1-6, ISBN 978-1-5386-1585-0
Wydawca:
IEEE
DOI:
10.1109/CCST.2017.8167854
Autorzy:
Warner, M.; Gutmann, A.; Sasse, M. A.; Blandford, A.
Opublikowane w:
ACM Conference on Computer-Supported Cooperative Work and Social Computing, Numer 2018, 2018
Wydawca:
ACM
Autorzy:
Harborth, David; Hatamian, Majid; Tesfay, Welderufael B.; Rannenberg, Kai
Opublikowane w:
52nd Hawaii International Conference on System Sciences, Numer HICSS, 2019
Wydawca:
AIS Electronic Library (AISeL)
DOI:
10.5281/zenodo.1484307
Autorzy:
Alexandr Railean, Delphine Reinhardt
Opublikowane w:
Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Strona(/y) 103-110, ISBN 9781-450359412
Wydawca:
ACM Press
DOI:
10.1145/3236112.3236126
Autorzy:
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
Opublikowane w:
Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Numer 2018, 2018
Wydawca:
USENIX Association
Autorzy:
Kitkowska, Agnieszka; Meyer, Joachim; Wästlund, Erik; Martucci, Leonardo A.
Opublikowane w:
IFIP Summer School on Privacy and Identity Management, Numer 2017, 2018
Wydawca:
Springer
DOI:
10.5281/zenodo.1297340
Autorzy:
Hatamian, Majid; Serna, Jetzabel
Opublikowane w:
IEEE International Carnahan Conference on Security Technology (ICCST 2017), Numer 2017, 2017
Wydawca:
IEEE
DOI:
10.5281/zenodo.1484336
Autorzy:
Mittos, Alexandros; Blackburn, Jeremy; De Cristofaro, Emiliano
Opublikowane w:
5th International Workshop on Genome Privacy and Security (GenoPri’18), Numer 2018, 2018
Wydawca:
GenoPri
Autorzy:
Warner, M.; Blandford, A.
Opublikowane w:
CHI ’18 Workshop: Moving beyond a “one-size fits all” approach: Exploring Individual Differences in Privacy, Montreal, Canada. (2018), Numer 2018, 2018
Wydawca:
ACM
Autorzy:
Agnieszka Kitkowska
Opublikowane w:
CHI Workshop “Moving Beyond a One-Size Fits All Approach: Exploring Individual Differences in Privacy, Numer 2018, 2018
Wydawca:
ACM
DOI:
10.5281/zenodo.1265726
Autorzy:
Hatamian, Majid; Kitkowska, Agnieszka; Korunovska, Jana; Kirrane, Sabrina
Opublikowane w:
32nd Annual Conference on Data and Applications Security and Privacy (DBSec 2018)., Numer 2018, 2018
Wydawca:
Springer
DOI:
10.5281/zenodo.1261200
Autorzy:
Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, Ann Blandford
Opublikowane w:
ACM CHI Conference on Human Factors in Computing Systems (CHI 2019), Numer 2019, 2019
Wydawca:
ACM
DOI:
10.1145/3290605.3300922
Autorzy:
Patrick Murmann
Opublikowane w:
Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct - MobileHCI '18, 2018, Strona(/y) 440-442, ISBN 9781-450359412
Wydawca:
ACM Press
DOI:
10.1145/3236112.3236184
Autorzy:
Gutmann, A.; Murdoch, S. J.
Opublikowane w:
In: Proceedings of Who Are You?! Adventures in Authentication Workshop (WAY 2019). USENIX: Santa Clara, CA, USA. (2019) (In press)., Numer 1, 2019
Wydawca:
Usenix
Autorzy:
Agnieszka Kitkowska, Erik Wästlund, Leonardo A. Martucci
Opublikowane w:
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020, ISBN 978-0-9981331-3-3
Wydawca:
Hawaii International Conference on System Sciences
DOI:
10.24251/hicss.2020.503
Autorzy:
Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, Ann Blandford
Opublikowane w:
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, Strona(/y) 1-13, ISBN 9781-450367080
Wydawca:
ACM
DOI:
10.1145/3313831.3376150
Autorzy:
Majid Hatamian
Opublikowane w:
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, Strona(/y) 1979-1982, ISBN 9781-450359337
Wydawca:
ACM
DOI:
10.1145/3297280.3297660
Autorzy:
Lamya Abdullah, Sebastian Hahn, Felix Freiling
Opublikowane w:
Proceedings of the Third Central European Cybersecurity Conference on - CECC 2019, 2019, Strona(/y) 1-6, ISBN 9781-450372961
Wydawca:
ACM Press
DOI:
10.1145/3360664.3360670
Autorzy:
Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro
Opublikowane w:
Proceedings of the International AAAI Conference on Web and Social Media, Numer 14, 2020, Strona(/y) 452-463
Wydawca:
AAAI
Autorzy:
Esther Görnemann and Sarah Spiekermann-Hoff
Opublikowane w:
European Conference on Information Systems (ECIS2020), 2020, ISBN 978-1-7336325-1-5
Wydawca:
AIS Association for Information Systems
Autorzy:
Kitkowska, Agnieszka; Warner, Mark; Shulman, Yefim; Wästlund, Erik; Martucci, Leonardo
Opublikowane w:
SOUPS'20: Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security August 2020, Numer 1, 2020
Wydawca:
Usenix
DOI:
10.5281/zenodo.3980478
Autorzy:
Santhana Kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Opublikowane w:
FIP Summer School on Privacy and Identity Management, Numer 2017, 2018
Wydawca:
Springer
DOI:
10.5281/zenodo.1485742
Autorzy:
Santhana kumar, Poornigha; Bechinie, Michael; Tscheligi, Manfred
Opublikowane w:
20th International Conference on Human-Computer Interaction (HCI International 2018), Numer 2018, 2018
Wydawca:
Springer
DOI:
10.5281/zenodo.1485951
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników