Programme
09:00 | Opening |
09:15 | Keynote: Kai Kimppa Ethical social engineering penetration testing – can it be done? |
10:15 | Break |
10:30 | Session: Informational self determination |
Violeta Vasileva Consistent Approach of Research for User’s Cyber Awareness, Identity Management and Proposal for Solution in Order to Enhance User’s Competencies in Public Cyberspace |
|
Rosalie Waelen A loss of informational control due to facial recognition technology: ethical and societal implications |
|
Alexander Richter and Delphine Reinhardt Exploration of Factors that can Impact the Willingness of Employees to Share Smart Watch Data with their Employers |
|
12:00 | Beak |
12:30 | Session: Knowledge imbalances |
Mario Filipe Cavalcanti and Eneus Trindade
Algorithms and data protection in Brazilian television advertising. |
|
Joakim Kävrestad, Allex Hagberg, Robert Roos, Jana Rambusch and Marcus Nohlberg Including users with cognitive challenges in the design of usable privacy and security |
|
Marco Houben Weaponizing data processing agreements for addressing power asymmetry through digital platforms in education |
|
14:00 | Break |
14:15 | Tutorial |
End 15:15 | Michael Friedewald and Ina Schiering Implementing Data Protection Impact Assessments in Practice |
09:00 | Keynote: Sebastian Pape Serious Games for Security and Privacy Awareness |
10:00 | Break |
10:15 | Tutorial |
Felix Bieker The State of Surveillance |
|
11:15 | Break |
11:30 | Session: Finance and taxes |
Mylana Pfeiffer Cybersecurity, Data Protection and Taxpayers’ Rights in the EU |
|
Ine van Zeeland and Jo Pierson From a remedy to an ecosystem: a review of the concept of Open Banking |
|
12:30 | Break |
13:00 | Session: Privacy modeling |
Niklas Sommerer, Martin Latzenhofer and Stefan Schauer
Measuring Privacy within the KRAKEN Database |
|
Myriam Clouet Towards a Generic Approach for Modeling and Verifying Properties for Preserving Privacy |
|
Elias Grünewald Cloud Native Privacy Engineering through DevPrivOps |
|
14:30 | Break |
14:45 | Workshop |
Harry Halpin and Iness Ben Guirat Usability for Mixnets |
|
End 15:45 |
09:00 | Keynote: François Thill (Ministère de l’Économie, Directeur Cyber Sécurité) TBA |
10:00 | Break |
10:15 | Tutorial |
Sandra Schmitz Are we all on the same page? On establishing a common understanding of the state of the art |
|
11:15 | Break |
11:30 | Session: Location privacy |
Tamara Stefanović and Silvia Ghilezan
Privacy Challenges of Digital Contact Tracing |
|
Rémy Scholler, Jean-François Couchot, Oumaïma Alaoui-Ismaïli, Eric Ballot and Denis Renaud Observing road freight traffic from mobile network signalling data while respecting privacy and business confidentiality |
|
Amirhossein Adavoudi Jolfaei, Stefan Schiffner, Andy Rupp and Thomas Engel Systematic Literature Review on Privacy-Preserving Electronic Toll Collection |
|
13:00 | Break |
13:30 | Session: IoT and smart things |
Nathanaël Denis, Sophie Chabridon and Maryline Laurent Bringing Privacy, Security and Performance to the Internet of Things through Usage Control and Blockchains |
|
Jorge Pereira Campos The Dynamics of Data Donation: Smart City, e-Participation, and [Privacy] Risk |
|
Break | |
15:00 | Workshop |
End 16:00 |
Jorge Bernal Bernabe, Jesus Garcia, Stephan Krenn, Vasia Liagkou, Antonio Skarmeta and Rafael Torres Privacy-Preserving Identity Management |
09:00 | Workshop |
Felix Schaber Practical Privacy-by-Design Where It Matters Most: Analyzing the Whistleblower Submission System SecureDrop Using Systems Theory |
|
10:00 | Break |
10:15 | Session: e-Health |
Claudio Pighini, Alessio Vezzoni, Simone Mainini Andrea G., Migliavacca, Alessandro Montanari, Maria R. Guarneri, Enrico G. Caiani and Ambra Cesareo
SynCare: an Innovative Remote Patient Monitoring System secured by Cryptography and Blockchain |
|
Aiste Gerybaite What do medical devices, data protection and cybersecurity all have in common? Exploring regulatory interplay in health IoE |
|
Yakini Tchouka, Jean-Francois Couchot, Christophe Guyeux and David Laiymani
De-Identification of Medical Records for ICD-10 Codes Association |
|
Ramona Schmidt and Ina Schiering
Gamification in mHealth – Opportunities and Privacy Risks |
|
12:15 | Break |
12:30 | Closing key note: Jakub Čegan, Masaryk University Training Development in KYPO Cyber Range Platform |
13:30 13:45 |
End of Event remarks and food for thoughts for the next year |