TY - BOOK AU - Naldi,Maurizio AU - Italiano,Giuseppe F. AU - Rannenberg,Kai AU - Medina,Manel AU - Bourka,Athena ED - Annual Privacy Forum TI - Privacy technologies and policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings T2 - Lecture notes in computer science SN - 9783030217525 AV - QA76.9.A25 U1 - 005.8 23 PY - 2019/// CY - Cham, Switzerland PB - Springer KW - Computer security KW - Congresses KW - Data encryption (Computer science) KW - Data protection KW - Sécurité informatique KW - Congrès KW - Chiffrement (Informatique) KW - Protection de l'information (Informatique) KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; Intro; Preface; Organization; Contents; Transparency; Towards Real-Time Web Tracking Detection with T. EX -- The Transparency EXtension; 1 Introduction; 2 Objectives and Requirements; 3 Limitations; 4 Related Work; 5 Implementation; 5.1 HTTP and HTTPS Traffic Logging and Recording; 5.2 Persistent Storage of Records; 5.3 Encryption and Decryption of Chunks; 5.4 Data Visualization; 6 Evaluation; 7 Conclusion and Outlook; References; Towards Transparency in Email Tracking; 1 Introduction; 2 Related Work; 3 System Overview; 3.1 Adding a Service; 3.2 Analyzing Emails; 3.3 Providing Transparency; 3.4 Challenges4 Preliminary Results; 4.1 Case Study 1: Individual Service Analysis; 4.2 Case Study 2: A/B Testing; 4.3 Case Study 3: Link Personalization; 5 Future Work; 6 Conclusion; References; Sharing Cyber Threat Intelligence Under the General Data Protection Regulation; Abstract; 1 Introduction; 2 Methodology; 2.1 Defining DataTags Related to Cybersecurity Information Sharing; 2.2 Policy Space; 2.3 Decision Graph; 3 Use Cases; 4 Related Work; 5 Conclusion and Future Work; Acknowledgment; References; Users' Rights; Fight to Be Forgotten: Exploring the Efficacy of Data Erasure in Popular Operating Systems1 Introduction; 2 Background; 2.1 Personal Data Hygiene; 2.2 Delete and Erase Functions; 3 Methodology; 3.1 Forensic Analysis; 4 Results; 4.1 macOS 10.14; 4.2 Windows 10; 4.3 Results of Forensic Analysis; 5 Discussion; 5.1 Default Options; 5.2 Incorrect Terminology; 5.3 Insufficient Guidance and Cues; 5.4 OS-Independent Implications; 6 Limitations; 7 Conclusion; References; Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse1 Introduction; 2 Case Study 1: New York City Tax Rides Dataset; 3 Case Study 2: AIS Data for Describing Migrant Rescue Operations; 4 Towards a Comparative Analysis; 5 Conclusion; References; Making Machine Learning Forget; 1 Introduction; 2 The ``Right-to-be-Forgotten; 3 Privacy Leakage in Machine Learning Systems; 4 Implementing ``Right-to-be-Forgotten'' in Machine Learning Models; 4.1 Influence Functions; 4.2 Differential Privacy; 4.3 Machine Unlearning5 Discussion and Conclusions; References; Risk Assessment; A Multilateral Privacy Impact Analysis Method for Android Apps; 1 Introduction; 2 Data Acquisition Methodology; 2.1 Permission Manifest Analysis (A1); 2.2 Privacy Policy Analysis (A2); 2.3 Permission Usage Analysis (A3); 2.4 User Reviews Analysis (A4); 3 Multilateral Analysis; 3.1 Step A1: Permission Manifest Analysis; 3.2 Step A2: Privacy Policy Analysis; 3.3 Step A3: Permission Usage Analysis; 3.4 Step A4: User Reviews Analysis; 3.5 Synthesis of Analysis; 4 Related Work; 5 Conclusions and Future Work N2 - This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications UR - https://link.springer.com/10.1007/978-3-030-21752-5 ER -