Part 4: Privacy IInternational audienceIn the fight against tax evaders and other cheats, governments seek to gather more information about their citizens. In this paper we claim that this increased transparency, combined with ineptitude, or corruption, can lead to widespread violations of privacy, ultimately harming law-abiding individuals while helping those engaged in criminal activities such as stalking, identity theft and so on.In this paper we survey a number of data sources administrerd by the Greek state, offered as web services, to investigate whether they can lead to leakage of sensitive information. Our study shows that we were able to download significant portions of the data stored in some of these data sources (scraping). More...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
Data leak or data breach is a serious problem of global scale. at the moment it is of increased int...
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as a...
Part 4: Privacy IInternational audienceIn the fight against tax evaders and other cheats, government...
Part 1: Invited TalksInternational audienceGovernments around the world are opening their data vault...
Do data privacy laws impede microtargeted foreign disinformation campaigns on social media? This the...
Abstract—Many companies, non-profit organizations and governmental bodies collect personal informati...
Part I invites the reader to consider the problems of identity theft, the problems of having governm...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
In the world of Internet nothing can be done without identifying the user. Internet is borderless an...
The first few years of the 21st century were characterised by a progressive loss of privacy. Two phe...
The enormous data sharing and data availability on the Internet pro-vides opportunities for new serv...
Violations of privacy harm real people, and as nation-state actors grow their information warfare ca...
In people-centric applications, participants voluntarily report data to service providers for commun...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
Data leak or data breach is a serious problem of global scale. at the moment it is of increased int...
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as a...
Part 4: Privacy IInternational audienceIn the fight against tax evaders and other cheats, government...
Part 1: Invited TalksInternational audienceGovernments around the world are opening their data vault...
Do data privacy laws impede microtargeted foreign disinformation campaigns on social media? This the...
Abstract—Many companies, non-profit organizations and governmental bodies collect personal informati...
Part I invites the reader to consider the problems of identity theft, the problems of having governm...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
In the world of Internet nothing can be done without identifying the user. Internet is borderless an...
The first few years of the 21st century were characterised by a progressive loss of privacy. Two phe...
The enormous data sharing and data availability on the Internet pro-vides opportunities for new serv...
Violations of privacy harm real people, and as nation-state actors grow their information warfare ca...
In people-centric applications, participants voluntarily report data to service providers for commun...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
Data leak or data breach is a serious problem of global scale. at the moment it is of increased int...
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as a...