TY - BOOK ID - 36762332 TI - Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers AU - Hansen, Marit. AU - Hoepman, Jaap-Henk. AU - Leenes, Ronald. AU - Whitehouse, Diane. PY - 2014 SN - 364255136X 3642551378 PB - Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, DB - UniCat KW - Computer security KW - Computer security. KW - Information Systems. KW - Computer science. KW - Systems and Data Security. KW - Management of Computing and Information Systems. KW - Computers and Society. KW - Informatics KW - Science KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Management information systems. KW - Computers and civilization. KW - Civilization and computers KW - Civilization KW - Computer-based information systems KW - EIS (Information systems) KW - Executive information systems KW - MIS (Information systems) KW - Sociotechnical systems KW - Information resources management KW - Management KW - Communication systems KW - Data protection. KW - Electronic data processing—Management. KW - Data and Information Security. KW - IT Operations. KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Electronic data processing KW - Management. UR - https://www.unicat.be/uniCat?func=search&query=sysid:36762332 AB - This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media. ER -