Curelariu, Teodora Lodie, Alexandre
Data re-identification methods are becoming increasingly sophisticated and can lead to disastrous data breaches. Re-identification is a key research topic for computer scientists as it can be used to reveal vulnerabilities of de-identification methods such as anonymisation or pseudonymisation. However, re-identification, even for research purposes,...
Gomez Ortega, A. (author) Noortman, Renee (author) Bourgeois, Jacky (author) Kortuem, G.W. (author)
Most people are entangled with an ever-growing trail of data that results from their daily interactions with products and services. Yet, they are hardly aware of the nature and characteristics of the data within this trail. We design dataslip, a provocative artifact that materializes the personal data trail into a receipt and aims to elicit creepin...
Gomez Ortega, A. (author) Bourgeois, Jacky (author) Kortuem, G.W. (author)
Most people interact with digital technologies that collect personal data about their behavior and experiences, leaving behind a data trail. The data within this trail is abstract and difficult to interpret; still, people often need to decide about its collection and distribution. Hence, it is paramount to support personal data literacy, for which ...
Cameron, Harriet R
UK museums are contradictory sites of education and community outreach, and emblems of colonial legacy and elitism. Physical and socioeconomic barriers prevent meaningful engagement for audiences, but particularly marginalised peoples. To identify and overcome these barriers, museums and cultural institutions are seeking technological solutions tha...
Gomez Ortega, A. (author) Bourgeois, J. (author) Kortuem, G.W. (author)
Digital technologies have increasingly integrated into people's lives, continuously capturing their behavior through potentially sensitive data. In the context of voice assistants, there is a misalignment between experts, regulators, and users on whether and what data is `sensitive', partly due to how data is presented to users; as single interacti...
Gomez Ortega, A. (author) Bourgeois, Jacky (author) Kortuem, G.W. (author)
Digital technologies have increasingly integrated into people's lives, continuously capturing their behavior through potentially sensitive data. In the context of voice assistants, there is a misalignment between experts, regulators, and users on whether and what data is 'sensitive', partly due to how data is presented to users; as single interacti...
Weschenfelder, Lucas Reckziegel Adolfo, Luiz Gonzaga Silva
The protection of personal data in socio-labor relations is studied, with a jusfundamental approach. In the first section, the topic is approached from a philosophy of technology perspective. A traditional and contemporary view on the subject is advanced, outlining the legal-normative aspects of a cooperative-integrated protection of personal data....
Gomez Ortega, A. (author) Milias, V. (author) Broadhead, J.S. (author) van der Valk, C.P. (author) Bourgeois, Jacky (author)
As we navigate the physical and digital world, we unknowingly leave behind an immense trail of data. We are informed about this via lengthy documents (e.g., privacy policies) or short statements (e.g., cookie popups). However, even when we know that data is collected, we remain largely unaware of its nature; what information it contains and how it ...
Lissens, Sylvia; 147716;
status: published
Biasin, Elisabetta; 121994; Siapka, Anastasia; 135527;
SAFECARE D3.10 aims at providing legal and ethical guidance to the SAFECARE Consortium Partners, in the development and testing of technologies as well in the implementation phases of the research project. The document takes into consideration three dimensions and the related crucial legal requirements for SAFECARE, i.e. 1) privacy and data protect...