Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce (English)
- New search for: Choraś, Michał
- New search for: Pawlicka, Aleksandra
- New search for: Jaroszewska-Choraś, Dagmara
- New search for: Pawlicki, Marek
- New search for: Katsikas, Sokratis
- Further information on Katsikas, Sokratis:
- https://orcid.org/https://orcid.org/0000-0003-2966-9683
- New search for: Cuppens, Frédéric
- New search for: Cuppens-Boulahia, Nora
- Further information on Cuppens-Boulahia, Nora:
- https://orcid.org/https://orcid.org/0000-0001-8792-0413
- New search for: Lambrinoudakis, Costas
- New search for: Garcia-Alfaro, Joaquin
- Further information on Garcia-Alfaro, Joaquin:
- https://orcid.org/https://orcid.org/0000-0002-7453-4393
- New search for: Navarro-Arribas, Guillermo
- Further information on Navarro-Arribas, Guillermo:
- https://orcid.org/https://orcid.org/0000-0003-3535-942X
- New search for: Nespoli, Pantaleone
- Further information on Nespoli, Pantaleone:
- https://orcid.org/https://orcid.org/0000-0002-4041-1205
- New search for: Kalloniatis, Christos
- Further information on Kalloniatis, Christos:
- https://orcid.org/https://orcid.org/0000-0002-8844-2596
- New search for: Mylopoulos, John
- New search for: Antón, Annie
- New search for: Gritzalis, Stefanos
- New search for: Choraś, Michał
- New search for: Pawlicka, Aleksandra
- New search for: Jaroszewska-Choraś, Dagmara
- New search for: Pawlicki, Marek
In:
Computer Security. ESORICS 2023 International Workshops
: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I
;
Chapter: 9
;
167-181
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce
-
Additional title:Lect.Notes Computer
-
Contributors:Katsikas, Sokratis ( editor ) / Cuppens, Frédéric ( editor ) / Cuppens-Boulahia, Nora ( editor ) / Lambrinoudakis, Costas ( editor ) / Garcia-Alfaro, Joaquin ( editor ) / Navarro-Arribas, Guillermo ( editor ) / Nespoli, Pantaleone ( editor ) / Kalloniatis, Christos ( editor ) / Mylopoulos, John ( editor ) / Antón, Annie ( editor )
-
Conference:European Symposium on Research in Computer Security ; 2023 ; The Hague, The Netherlands
-
Published in:Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I ; Chapter: 9 ; 167-181Lecture Notes in Computer Science ; 14398 ; 167-181
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-03-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply ChainSandberg, Susanne Barkhald / Akbarzadeh, Aida / Gkioulos, Vasileios et al. | 2024
- 2
-
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to CyberattacksBader, Lennart / Wagner, Eric / Henze, Martin / Serror, Martin et al. | 2024
- 3
-
Threat Analysis in Dairy Farming 4.0Vatn, Karl Jonatan Due / Kavallieratos, Georgios / Katsikas, Sokratis et al. | 2024
- 4
-
Overview of Social Engineering Protection and Prevention MethodsKontogeorgopoulos, Konstantinos / Kritikos, Kyriakos et al. | 2024
- 5
-
Skade – A Challenge Management System for Cyber Threat HuntingSommestad, Teodor / Karlzén, Henrik / Kvist, Hanna / Gustafsson, Hanna et al. | 2024
- 6
-
On the Usage of NLP on CVE Descriptions for Calculating RiskGiannakopoulos, Thrasyvoulos / Maliatsos, Konstantinos et al. | 2024
- 7
-
Evaluation of an OPC UA-Based Access Control Enforcement ArchitectureLeander, Björn / Čaušević, Aida / Hansson, Hans / Lindström, Tomas et al. | 2024
- 8
-
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply EquipmentsBaldo, Massimiliano / Bianchi, Tommaso / Conti, Mauro / Trevisan, Alessio / Turrin, Federico et al. | 2024
- 9
-
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-CommerceChoraś, Michał / Pawlicka, Aleksandra / Jaroszewska-Choraś, Dagmara / Pawlicki, Marek et al. | 2024
- 10
-
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic DataGuépin, Florent / Meeus, Matthieu / Creţu, Ana-Maria / de Montjoye, Yves-Alexandre et al. | 2024
- 11
-
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-EncryptionRodrigues, Bruno / Amorim, Ivone / Silva, Ivan / Mendes, Alexandra et al. | 2024
- 12
-
PrivacySmart: Automatic and Transparent Management of Privacy PoliciesDaudén-Esmel, Cristòfol / Castellà-Roca, Jordi / Viejo, Alexandre / Bel-Ribes, Eduard Josep et al. | 2024
- 13
-
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android AppsRagab, Abdelrahman / Mannan, Mohammad / Youssef, Amr et al. | 2024
- 14
-
Integrally Private Model Selection for Support Vector MachineKwatra, Saloni / Varshney, Ayush K. / Torra, Vicenç et al. | 2024
- 15
-
Differentially Private Traffic Flow Prediction Using Transformers: A Federated ApproachGupta, Sargam / Torra, Vicenç et al. | 2024
- 16
-
Analyzing Continuous K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{s}$$\end{document}-Anonymization for Smart Meter DataBrunn, Carolin / von Voigt, Saskia Nuñez / Tschorsch, Florian et al. | 2024
- 17
-
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open ChallengesIezzi, Michela / Maple, Carsten / Leonetti, Andrea et al. | 2024
- 18
-
AddShare: A Privacy-Preserving Approach for Federated LearningAsare, Bernard Atiemo / Branco, Paula / Kiringa, Iluju / Yeap, Tet et al. | 2024
- 19
-
Secure Multiparty Sampling of a Biased Coin for Differential PrivacyZarei, Amir / Vinterbo, Staal A. et al. | 2024
- 20
-
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based ApplicationsNourbakhsh, Mohammad Sadegh / Hao, Feng / Jhumka, Arshad et al. | 2024
- 21
-
Comparison of Ethereum Smart Contract Analysis and Verification MethodsHappersberger, Vincent / Jäkel, Frank-Walter / Knothe, Thomas / Pignolet, Yvonne-Anne / Schmid, Stefan et al. | 2024
- 22
-
Chaussette: A Symbolic Verification of Bitcoin ScriptsJacquot, Vincent / Donnet, Benoit et al. | 2024
- 23
-
A Simple Single Slot Finality Protocol for EthereumD’Amato, Francesco / Zanolini, Luca et al. | 2024
- 24
-
Timely Identification of Victim Addresses in DeFi AttacksParhizkari, Bahareh / Iannillo, Antonio Ken / Ferreira Torres, Christof / Banescu, Sebastian / Xu, Joseph / State, Radu et al. | 2024
- 25
-
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning NetworkNdolo, Charmaine / Tschorsch, Florian et al. | 2024
- 26
-
Creating Privacy Policies from Data-Flow DiagramsLeicht, Jens / Wagner, Marvin / Heisel, Maritta et al. | 2024
- 27
-
Up-to-Date Threat Modelling for Soft Privacy on Smart CarsRaciti, Mario / Bella, Giampaolo et al. | 2024
- 28
-
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and PrivacyEryonucu, Cihan / Papadimitratos, Panos et al. | 2024
- 29
-
Review on Privacy and Trust Methodologies in Cloud ComputingSimou, Stavros / Mavroeidi, Aikaterini-Georgia / Kalloniatis, Christos et al. | 2024