16th IFIP Summer School in Esch-sur-Alzette

Call for Papers

“It’s complicated”: Exploring the relationship between cybersecurity and privacy, and improving training and awareness

The 16th IFIP Summer School on Privacy and Identity Management takes a holistic approach to society and technology, supporting interdisciplinary research exchange through keynote lectures, tutorials, workshops, and paper presentations.

In particular, we welcome contributions combining any of the following perspectives: anthropological, economic, ethical, historical, legal, media & communication, regulatory, sociological, surveillance, technical, philosophical, political, and psychological studies.

The IFIP Summer School encourages not only interdisciplinary but also broader diversity. It particularly welcomes submissions on how to foster gender and cultural balance in privacy research and policy, and notably tutorials and workshops about how to raise awareness in these matters.

Theme

Contributions dealing with the complex relations between cybersecurity and privacy are most welcome. Digital media and information technology became everyday commodities, peculating every aspect of society. Consequentially, privacy breaches might impair individual freedoms, democratic processes, and even information security. The latter becomes manifest as an increasing number of attacks on IT security are based on privacy breaches. Examples include CEO fraud, spear fishing, and leakage of consumer information like credit card details. Although there is a general consensus that security, privacy, and data protection are interrelated, the complexity of their relations has not yet been fully explored. Key questions include: What are the intersections, i.e., conflicts, overlaps or compliance challenges, between the different regulatory frameworks (e.g., GDPR, NIS Directive, PSD2, and forthcoming ePrivacy Regulation) affecting these three fields? How do they relate to technologies that protect ICT and its users (e.g., cryptography that can provide confidentiality and anonymity)? How can privacy and security be co-engineered, satisfying all by-design paradigms? What side-effects occur during such co-design? What are the possible societal consequences regarding citizen (dis)empowerment, surveillance, and human rights? A special focus of this School is placed on how to train and educate staff at all levels in industries dependent on ICT, e.g., cyber ranges and other training methods, as well as how to train the trainers (including the role of Data Protection Officers) in these efforts. Lastly, we encourage submissions dealing with outreach and awareness campaigns for the general public.

Four-phase review process

The research paper presentations and the workshops focus on involving students, and on encouraging the publication of high-quality, thorough research papers by students and young researchers. To this end, the School offers a four-phase review process for submitted papers.

  1. Extended abstracts: at least 2 and at most 4 pages; from these submissions, the PC chairs select papers in the scope of the call for presentation.
  2. A full length draft (up to 16 pages), in Springer LNCS format, is required to be submitted for accepted submissions before the Summer School. It will appear in the pre-proceedings.
  3. Every Author will peer review up to two papers that are presented in the same session as their paper before the conference.
  4. Before the second review phase, students have time to revise their papers taking into account the peer review of phase 3 and the discussion that took place at the Summer School. These revised, full papers are reviewed soon after the Summer School by Programme Committee members.

Based on these reviews, papers might be accepted, conditionally accepted, or rejected. Accepted and (after satisfactory revision) conditionally accepted papers will be included in the Summer School’s proceedings, which will be published by Springer.

Workshops are expected to last one or two hours and must generate short papers that recapitulate the outcome and the kinds of discussion raised in the School, for inclusion in the post-proceedings. Proposals should contain a 2-page statement summarising the topic(s) to be discussed and the expected contributions from the audience members, e.g. responding to a questionnaire or conducting a small experiment. Proposers should indicate whether any special equipment is needed for the workshop, such as audio-visual systems or computational equipment and support.

Tutorials are expected to last one or two hours. Proposals should contain a 2-page summary and state the level and background required for audience members to follow the tutorial.

Topics

Technical and Organisational Measures for Privacy and Security

  • ‘by-design and default’ mechanisms for: privacy, value-sensitivity, ethics, human rights, impact and risk assessments, data protection on the ground
  • data breach notification and its side effects
  • integration of privacy and security into agile development
  • privacy-enhancing technologies (PETs) and transparency-enhancing technologies (TETs)
  • privacy and identity management (services, technologies, infrastructures, usability aspects, legal and socio-economic aspects)
  • privacy and security in citizens’ digital communications, online platforms platforms, e-mail and instant messaging
  • usable privacy & security

Metrics, Standards, Ethics and Norms

  • complementarity and friction between data subject rights, security, and privacy-by-design
  • interactions, i.e. compliance, overlaps and conflicts in challenges of cybersecurity and data protection norms (e.g., NIS directive, GDPR, PSD2, upcoming ePrivacy regulation)
  • privacy and security evaluation, metrics, certifications, certification mechanisms, auditing experiences, standards, and seals
  • privacy protection and, in particular, confidentiality of communications by both traditional players/incumbents and over the top media services
  • regulatory regimes and instruments, including ethical frameworks

Training and Education for Privacy and Security

  • awareness-raising, digital literacy and data (infrastructure) literacy – research ethics and approvals
  • social accountability
  • training and education methodologies, cyber ranges

Socio-technical perspectives on privacy and data protection

  • awareness, attitudes, skills and behaviour of citizens and organisations (including SMEs) regarding data privacy, surveillance, and (cyber)security
  • integrative approaches for diversity (gender, accessibility, economics)
  • relation between privacy, public values and AI-based systems, and (global) consequences for policy and society
  • socio-cultural practices, perspectives and (dis)trust by users/employees regarding data-driven technologies and data capture and processing, in various spheres of life (health, smart cities, banking, media, education)
  • data economy and ecosystems, new business models.

Why should I submit?

Accepted papers will receive thorough discussions during the School and provide students with an opportunity to be published in the IFIP AICT series by Springer. Students who present a paper can receive a course certificate awarding 3 ECTS points at the PhD level. Students whose papers were accepted as full papers for the proceedings, can receive a course certificate awarding 6 ECTS points at the PhD level. The certificate can state the topic of the paper so as to demonstrate its relationship (or otherwise) to the student’s master or PhD thesis. We encourage submissions from students from emerging economies: support is innovation history of being applied to from the IFIP Digital Equity Fund to ease student travel.

Last but not least, our modern campus embraces its rich history of innovation; monumental industrial sculptures remind visitors and residents alike that the place once gave home to the most modern steel works of the beginning twentieth century, later the first blast furnace of the Montanunion and now is turned into a modern city quarter that gives home to our young university.

Programme

Tue, 17.08.2021

Time Track
9:00 Opening
9:15 Keynote: Kai Kimppa
Ethical social engineering penetration testing – can it be done?
10:15 Break
10:30 Session: Informational self determination
Violeta Vasileva
Consistent Approach of Research for User’s Cyber Awareness, Identity Management and Proposal for Solution in Order to Enhance User’s Competencies in Public Cyberspace

Rosalie Waelen
A loss of informational control due to facial recognition technology: ethical and societal implications

Alexander Richter and Delphine Reinhardt
Exploration of Factors that can Impact the Willingness of Employees to Share Smart Watch Data with their Employers
12:00 Break
12:00 Session: Knowledge imbalances
Mario Filipe Cavalcanti and Eneus Trindade
Algorithms and data protection in Brazilian television advertising.

Joakim Kävrestad, Allex Hagberg, Robert Roos, Jana Rambusch and Marcus Nohlberg
Including users with cognitive challenges in the design of usable privacy and security

Marco Houben
Weaponizing data processing agreements for addressing power asymmetry through digital platforms in education
14:00 Break
14:15 Tutorial: Michael Friedewald and Ina Schiering
Implementing Data Protection Impact Assessments in Practice
15:15 End

Wed, 18.08.2021

Time Track
9:00 Keynote: Sebastian Pape
Serious Games for Security and Privacy Awareness
10:00 Break
10:15 Tutorial Felix Bieker The State of Surveillance
11:15 Break
10:15 Session: Finance and taxes
Niklas Sommerer, Martin Latzenhofer and Stefan Schauer
Measuring Privacy within the KRAKEN Database

Myriam Clouet
Towards a Generic Approach for Modeling and Verifying Properties for Preserving Privacy

Elias Grünewald Cloud Native Privacy Engineering through DevPrivOps
14:30 Break
14:45 Workshop: Harry Halpin and Iness Ben Guirat
Usability for Mixnets
15:45 End

Thu, 19.08.2021

Time Track
9:00 Keynote: François Thill (Ministère de l’Économie, Directeur Cyber Sécurité)
TBA
10:00 Break
10:15 Tutorial: Sandra Schmitz
Are we all on the same page? On establishing a common understanding of the state of the art
11:15 Break
12:00 Session: Location privacy
Tamara Stefanović and Silvia Ghilezan
Privacy Challenges of Digital Contact Tracing

Rémy Scholler, Jean-François Couchot, Oumaïma Alaoui-Ismaïli, Eric Ballot and Denis Renaud
Observing road freight traffic from mobile network signalling data while respecting privacy and business confidentiality

Amirhossein Adavoudi Jolfaei, Stefan Schiffner, Andy Rupp and Thomas Engel
Systematic Literature Review on Privacy-Preserving Electronic Toll Collection
13:00 Break
13:30 Session: IoT and smart things
Nathanaël Denis, Sophie Chabridon and Maryline Laurent
Bringing Privacy, Security and Performance to the Internet of Things through Usage Control and Blockchains

Jorge Pereira Campos
The Dynamics of Data Donation: Smart City, e-Participation, and [Privacy] Risk
14:30 Break
15:00 Workshop: Jorge Bernal Bernabe, Jesus Garcia, Stephan Krenn, Vasia Liagkou, Antonio Skarmeta and Rafael Torres
Privacy-Preserving Identity Management
16:00 End

Fri, 20.08.2021

Time Track
9:00 Workshop: Felix Schaber
Practical Privacy-by-Design Where It Matters Most: Analyzing the Whistleblower Submission System SecureDrop Using Systems Theory
10:00 Break
10:15 Session: e-Health
Claudio Pighini, Alessio Vezzoni, Simone Mainini Andrea G., Migliavacca, Alessandro Montanari, Maria R. Guarneri, Enrico G. Caiani and Ambra Cesareo
SynCare: an Innovative Remote Patient Monitoring System secured by Cryptography and Blockchain

Aiste Gerybaite
What do medical devices, data protection and cybersecurity all have in common? Exploring regulatory interplay in health IoE

Yakini Tchouka, Jean-Francois Couchot, Christophe Guyeux and David Laiymani
De-Identification of Medical Records for ICD-10 Codes Association

Ramona Schmidt and Ina Schiering
Gamification in mHealth – Opportunities and Privacy Risks
12:15 Break
12:30 Closing Keynote: Jakub Čegan (Masaryk University)
Training Development in KYPO Cyber Range Platform
13:30 End of Event remarks and food for thoughts for the next year
13:45 End

Committee

Programme Chairs

  • Ina Schiering (Ostfalia University of Applied Sciences)
  • Michael Friedewald (Fraunhofer ISI)
  • Stephan Krenn (AIT Austrian Institute of Technology)

Steering Committee

  • Jan Camenisch (Dfinity, Switzerland)
  • Marit Hansen (ULD)
  • Anja Lehmann (Hasso Plattner Institute
  • Digital Engineering Faculty, University of Potsdam)
  • Ronald Leenes (Tilburg University)
  • Simone Fischer-Hübner (Karlstad University, Sweden)
  • Diane Whitehouse (The Castlegate Consultancy)
  • Charles Raab (University of Edinburgh)
  • Kai Rannenberg (Goethe University Frankfurt)

General Chair

  • Stefan Schiffner (University of Luxembourg)

Programme Committee

  • Kjetil Rommetveit (University of Bergen)
  • Jana Dittmann (Uni Magdeburg)
  • Florian Adamsky (Hof University of Applied Sciences)
  • Joachim Meyer (Tel Aviv University)
  • Henrich C. Pöhls (University of Passau)
  • Stefan Strauss (Austrian Academy of Sciences, Institute of Technology Assessment (ITA)
  • Diane Whitehouse (IFIP working group 9.2 on social accountability and ICT)
  • Jan Hajny (VUT Brno)
  • Delphine Reinhardt (University of Göttingen)
  • Christiane Kuhn (Karlsruhe Institute of Technology)
  • Jo Pierson (Vrije Universiteit Brussel)
  • Arnold Roosendaal (Privacy Company)
  • Stefan Katzenbeisser (University of Passau)
  • José M. Del Álamo (Universidad Politécnica de Madrid)
  • Josep Domingo-Ferrer (Universitat Rovira i Virgili)
  • Jani Koskinen (University of Turku)
  • Rose-Mharie Åhlfeldt (University of Skövde)
  • Paula Helm (Univeristy of Tübingen)
  • Kai Kimppa (University of Turku)
  • Meiko Jensen Kiel (University of Applied Sciences)
  • Sebastian Pape (Goethe University Frankfurt)
  • Simone Van Der Hof (Leiden University)
  • Robin Pierce (TILT Tilburg Law School)
  • Galina Ivanova (University of Ruse)
  • Dominik Herrmann (University of Bamberg)
  • Simone Fischer-Hübner (Karlstad University)
  • Maria Grazia Porcedda (Trinity College Dublin)
  • Sandra Schmitz (Université du Luxembourg)
  • Tobias Pulls (Karlstad University)
  • Sébastien Canard (Orange Labs)

Organizers

Organized by

University of Luxembourg

In Cooperation with

IFIP

Supported By

CyberSec4Europe SPARTA