Abstract
With ICT increasingly becoming the main basis for community communication and cooperation, security, trust, and privacy protection are commonly accepted as core aspects of system design and operations. Starting with a representative example illustrating the resulting challenges, this talk will then give an overview of major legal requirements with the focus on privacy protection. Against this background the feasibility of security and trust mechanisms will be discussed in the context of communities that need to share information and have to cooperate in multiple ways to reach their common goals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Koch, M.: CSCW and enterprise 2.0 - towards an integrated perspective. In: BLED 2008 Proceedings, p. 15 (2008). http://aisel.aisnet.org/bled2008/15
Azencott, C.-A.: Machine learning and genomics: precision medicine versus patient privacy. Phil. Trans. R. Soc. A. 376(2128) (2018). http://dx.doi.org/10.1098/rsta.2017.0350. 3762017035020170350
Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. CCN, pp. 3–42. Springer, London (2013). https://doi.org/10.1007/978-1-4471-4189-1_1
Labs, J., Terry, S.: Privacy in the coronavirus era. Genet. Testing Mol. Biomarkers 24(9), 535–536 (2020). https://doi.org/10.1089/gtmb.2020.29055.sjt
Dragoni, N.: A survey on trust-based web service provision approaches. In: 2010 Third International Conference on Dependability, Venice, Italy, pp. 83–91 (2010). https://doi.org/10.1109/depend.2010.21
Pietikäinen, P., Röning, J. (eds.): Handbook of the Secure Agile Software Development Life Cycle. University of Oulu, Finland (2014). ISBN number: 978-952-62-0341-6, Juvenes Print Oulu
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance), pp. 1–88. OJ L 119 (2016)
CNIL Privacy Impact Assessment (PIA) Guides and Tools. https://www.cnil.fr/en/PIA-privacy-impact-assessment-en. Accessed 14 March 2021
Guide to undertaking privacy impact assessments. https://www.oaic.gov.au/privacy/guidance-and-advice/guide-to-undertaking-privacy-impact-assessments/. Accessed 14 March 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Quirchmayr, G. (2021). Security, Trust and Privacy: Challenges for Community-Oriented ICT Support. In: Krieger, U.R., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2021. Communications in Computer and Information Science, vol 1404. Springer, Cham. https://doi.org/10.1007/978-3-030-75004-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-75004-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75003-9
Online ISBN: 978-3-030-75004-6
eBook Packages: Computer ScienceComputer Science (R0)