Accepted papers

List of invited speakers

More details on the invited talks can be found here.

List of accepted papers

  • Luiza Jarovsky
    Improving Consent in Information Privacy Through Autonomy Preserving Protective Measures (APPMs)
  • Laurens Naudts
    Towards Accountability: The Articulation and Formalization of Fairness in Machine Learning.
  • Jane Henriksen-Bulmer, Shamal Faily and Sheridan Jeary
    DPIAs for Charities: a Charity Sector Specific DPIA Framework
  • Fortune Nwaiwu, Ladislav Buřita and Felicita Chromjaková
    Assessing the Impact of Security and Trust as Factors that influence the Adoption and Usage of Digital Technologies that Generate, Collect and Transmit User Data
  • Md Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger and N. Asokan
    chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change
  • Yefim Shulman and Joachim Meyer
    Is Privacy Controllable?
  • Katerina Demetzou
    Contextualizing the Notion of (High) Risk in Data Protection
  • Niko Tsakalakis, Sophie Stalla-Bourdillon and Kieron O’Hara
    Data Protection by Design for cross-border electronic identification: does the eIDAS Interoperability Framework need to be modernised?
  • Anette Siebenkäs and Dirk Stelzer
    Assessing Theories for Research on Personal Data Transparency
  • Ruben De Smet, Ann Dooms and Jo Pierson
    An extensible, peer-to-peer, private online social network
  • Sascha van Schendel
    Risk profiling by law enforcement agencies in the Big Data era: Why we need transparency and where we could find it
  • Navoda Senavirathne and Vicenc Torra
    Membership inference in machine learning: An empirical study and some mitigation strategies
  • Iris van Ooijen and Bernadette Kamleitner
    May we Collect your Digital Self? How Framing User Data as part of the Digital Self affects Perceived Ownership and Data Disclosure Behaviors
  • Georg Wagner
    Delegations in the LIGHTest Project
  • Jacob-Oliver Carey and Kovila P.L Coopamootoo
    An Investigation on the Impact of Integral Fear on Privacy Intention
  • Alexander Gabel and Ina Schiering
    Privacy Patterns for Pseudonymity
  • Tanja Heuer, Ina Schiering and Reinhard Gerndt
    Is it assisting or watching me? – User Attitudes towards Social Robots in their Home Environment
  • Matthias Marx, Anne Kunstmann and Hannes Federrath
    Stream-oriented MIXing for low-latency anonymous communication networks
  • David Derler, Daniel Kales, Olamide Omolola and Sebastian Ramacher
    Revisiting User Privacy for Certificate Transparency
  • Dominik Koehle
    Implementing Attribute-Based Credentials over OAuth 2.0
  • Mariam Kauser
    The ‘You’ in YouTube: Colonial entanglements in promotional habits

List of accepted workshops/tutorials

  • Kovila P.L. Coopamootoo
    Towards Empowering the Human for Privacy Online
  • Eva Schlehahn, Rigo Wenning and Harald Zwingelberg
    Interactive Workshop on GDPR transparency requirements and data privacy vocabularies
  • Miha Stopar, Tilen Marc and Jolanda Modic
    Functional encryption – decrypting statistical functions over encrypted messages
  • Samuel Fricker
    Workshop on Data-Driven Engineering
  • Arianna Schuler Scott, Michael Goldsmith and Harriet Teare
    An exploration of attitudes to dynamic consent in research
  • Felix Bieker and Susan Gonscherowski
    Interactive Workshop on Data Breaches: Who you gonna Call when there’s Something Wrong in your Processing?
  • Roberto Carbone, Silvio Ranise and Giada Sciarretta
    Secure and Usable Mobile Identity Management Solutions: a Methodology for their Design and Assessment
  • Stefan Rass
    Trust and Distrust: On Sense and Nonsense in Big Data
  • Vadym Fedyukovych
    Private verification from ancient caves to sigma protocols to SNARKs

Leave a Comment