L. Piras, M. Al-Obeidallah, Andrea Praitano, A. Tsohou, H. Mouratidis, B. Gallego-Nicasio, Jean Baptiste Bernard, Marco Fiorani, E. Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, G. Zorzino
{"title":"DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance","authors":"L. Piras, M. Al-Obeidallah, Andrea Praitano, A. Tsohou, H. Mouratidis, B. Gallego-Nicasio, Jean Baptiste Bernard, Marco Fiorani, E. Magkos, Andrès Castillo Sanz, Michalis Pavlidis, Roberto D'Addario, G. Zorzino","doi":"10.1007/978-3-030-27813-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-27813-7_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115804261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance","authors":"Vasiliki Diamantopoulou, A. Tsohou, Maria Karyda","doi":"10.1007/978-3-030-27813-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-27813-7_7","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127743369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing","authors":"Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis","doi":"10.1007/978-3-030-27813-7_1","DOIUrl":"https://doi.org/10.1007/978-3-030-27813-7_1","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data","authors":"Vitor Jesus, Shweta Mustare","doi":"10.1007/978-3-030-27813-7_3","DOIUrl":"https://doi.org/10.1007/978-3-030-27813-7_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122789841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lena Reinfelder, Andrea Schankin, Sophie Russ, Z. Benenson
{"title":"An Inquiry into Perception and Usage of Smartphone Permission Models","authors":"Lena Reinfelder, Andrea Schankin, Sophie Russ, Z. Benenson","doi":"10.1007/978-3-319-98385-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, S. Gritzalis
{"title":"A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness","authors":"Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, S. Gritzalis","doi":"10.1007/978-3-319-98385-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_11","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification","authors":"N. Mohammadi, Nelufar Ulfat-Bunyadi, M. Heisel","doi":"10.1007/978-3-319-98385-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_17","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Volkamer, K. Renaud, B. Reinheimer, P. Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, N. Gerber
{"title":"Developing and Evaluating a Five Minute Phishing Awareness Video","authors":"M. Volkamer, K. Renaud, B. Reinheimer, P. Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, N. Gerber","doi":"10.1007/978-3-319-98385-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_9","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López
{"title":"A Comprehensive Methodology for Deploying IoT Honeypots","authors":"Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López","doi":"10.1007/978-3-319-98385-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_16","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Hardness of Separation of Duties Problems for Cloud Databases","authors":"Ferdinand Bollwein, L. Wiese","doi":"10.1007/978-3-319-98385-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}