Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
29
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,004
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute
other
Author(s):
Mohamed Abomhara
,
Sule Yildirim Yayilgan
,
Marina Shalaginova
,
Zoltán Székely
Publication date
(Online):
March 06 2020
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
29
Record
: found
Abstract
: not found
Book
: not found
The EU General Data Protection Regulation (GDPR)
Paul Voigt
,
Axel von dem Bussche
(2017)
0
comments
Cited
78
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics
Petros Elia
,
Antitza Dantcheva
,
Arun Ross
(2016)
0
comments
Cited
49
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Engineering Privacy
S Spiekermann
,
L.F. Cranor
(2009)
0
comments
Cited
46
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2020
Publication date (Online):
March 06 2020
Pages
: 259-271
DOI:
10.1007/978-3-030-42504-3_17
SO-VID:
2637bc7d-b47e-42d3-8887-0cd2b54a2573
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Privacy as Enabler of Innovation
pp. 17
Fair Enough? On (Avoiding) Bias in Data, Algorithms and Decisions
pp. 29
Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics
pp. 45
Identity Management: State of the Art, Challenges and Perspectives
pp. 63
SoK: Cryptography for Neural Networks
pp. 82
Workshop on Privacy Challenges in Public and Private Organizations
pp. 90
News Diversity and Recommendation Systems: Setting the Interdisciplinary Scene
pp. 109
Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing
pp. 126
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces
pp. 142
Language-Based Mechanisms for Privacy-by-Design
pp. 161
Aid and AI: The Challenge of Reconciling Humanitarian Principles and Data Protection
pp. 177
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software
pp. 190
Recommended for You: “You Don’t Need No Thought Control”. An Analysis of News Personalisation in Light of Article 22 GDPR
pp. 209
Data Privatizer for Biometric Applications and Online Identity Management
pp. 226
What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking
pp. 242
Privacy Implications of Voice and Speech Analysis – Information Disclosure by Inference
pp. 259
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute
pp. 275
Making GDPR Usable: A Model to Support Usability Evaluations of Privacy
pp. 292
Decision Support for Mobile App Selection via Automated Privacy Assessment
pp. 308
Tool-Assisted Risk Analysis for Data Protection Impact Assessment
pp. 327
How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors
pp. 343
Annotation-Based Static Analysis for Personal Data Protection
pp. 359
Order of Control and Perceived Control over Personal Information
pp. 376
Aggregating Corporate Information Security Maturity Levels of Different Assets
pp. 395
Differential Privacy in Online Dating Recommendation Systems
pp. 411
Distributed Ledger for Provenance Tracking of Artificial Intelligence Assets
pp. 427
A Survey-Based Exploration of Users’ Awareness and Their Willingness to Protect Their Data with Smart Objects
pp. 447
Self-Sovereign Identity Systems
pp. 462
Privacy in Location-Based Services and Their Criticality Based on Usage Context
Similar content
5,004
A longitudinal investigation of adult-onset and adult-progression of myopia in an occupational group. Refractive and biometric findings.
Authors:
Kerry A McBrien
,
T. Adams
Autoencoder Neural Networks for Outlier Correction in ECG- Based Biometric Identification
Authors:
Mikolai Karpinski
,
Volodvmvr Khoma
,
Valerii Dudvkevych
…
Personal Authentication Using Relevance Vector Machine (RVM) for Biometric Match Score Fusion
Authors:
Scott B. Tran
,
T. Le
See all similar