Home

Schedule

Accepted Papers

Call for Papers

Registration

Organization

Venue

Accommodation

CodeX

AAAI

Colocated Events




Schedule

The schedule is designed to promote high quality interaction and the sharing of ideas. It is structured around the following five important themes and panels:

Paper presentations will be strictly 10 minutes in length except for Session 5 on Wednesday morning. A MacPro laptop will be available to run Powerpoint and Keynote presentations. We will ask presenters to make contact with their respective Session Chairs at the symposium and to assemble 10mins before the commencement of their presentation session (there is no need to contact them before the symposium) to arrange for their presentation to be preloaded so that we can achieve a smooth and seemless transition between speakers.

Symposium participants will all have a copy of the proceedings which will contain the final versions of the papers. Therefore it is recommended that presenters give an overview of their ideas and convey the key points of their proposal. The audience will be multidisplinary and it is suggested that presenters highlight the key contributions, the challenges addressed, the benefits of their approach and its shortcomings. Diagrams and pictures that convey context and mechanisms are often more effective than slides full of text. Our draft schedule is as follows:


Time
Monday
Tuesday
Wednesday
9:00




9:15



Symposium Opening







Session 3
Presentations





Session 5
Presentations
10:30 Morning Tea Morning Tea Morning Tea
11:00 Session 1
Presentations
PANEL
Privacy Law

Chair: Roland Vogl
Susan Freiwald - University of San Francisco
Hank Greely - Stanford University
Lothar Determan - Baker and McKenzie and UC Berkeley

Session 6
Presentations

12:30 Lunch Lunch Lunch
14:00

PANEL

Privacy Theory and Technology
Chair: Michael Genesereth
Ken Anderson - Canada
Chris Hoofnagle - Berkeley
John Michell - Stanford
Yolanda Gil - USC
Jessica Staddon - PARC

PANEL

Privacy and Business
Chair: Mary-Anne Williams
Betsy Masiello - Google
Ryan Calo - Stanford
Erika Rottenberg - LinkedIn
Elliot Schrage - Facebook
MeMe Jacobs Rasmussen Adobe

CodeX Seminar

Commissioner Cavoukian

in the

Stanford Law School
All Welcome!

15:30 Afternoon Tea Afternoon Tea
16:00



17:30

Session 2
Presentations


Session 4
Presentations
18:00



19:00


Reception - Oak Lounge in Tresidder


Plenary Session - Annenberg Auditorium

SESSION 1 Presentations (10 minutes)

  1. Michael Seringhaus
    Forensic DNA Profiles: Database Expansion, Familial Search, and a Radical Solution
  2. Gregory Mayes
    Privacy and Transparency
  3. Bastian Könings, Florian Schaub, Frank Kargl and Michael Weber
    Towards Territorial Privacy in Smart Environments
  4. Nicole Ozer, Jennifer Lynch and Chris Conley
    Digital Books: A New Chapter for Reader Privacy?
  5. Christopher Hogan and Robert Bauer
    Privacy Classification Systems
  6. Richard Chow, Ji Fang, Philippe Golle and Jessica Staddon
    The Web as a Privacy Lab
  7. Betsy Masiello and Alma Whitten
    Engineering Privacy in an Age of Information Abundance
  8. Rainer Boehme and Stefanie Poetzsch
    Privacy in Online Social Lending

SESSION 2 Presentations (10 minutes)

  1. Robert Sprague
    Cloud Privacy: Normative Standards for Information Privacy Management Within Cloud Computing
  2. Sabah Al-Fedaghi
    Information Privacy and its Value.
  3. Saeed Abu-Nimeh and Nancy Mead
    Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering
  4. Luca Escoffier
    Radio frequency identification tags, memory spots, and the processing of personally identifiable information, and sensitive data: when there is no balance between right and wrong.
  5. Krasnow Waterman, Deborah McGuinness and Li Ding
    Selective Privacy in a Web-based World: Challenges of Representing and Inferring Context.
  6. Eran Kahana
    Application of an Autonomous Intelligent Cyber Entity as a Veiled Identity Agent.
  7. Frank Kargl, Florian Schaub and Stefan Dietzel
    Mandatory Enforcement of Privacy Policies using Trusted Computing Principles
  8. Nathan Gnanasambandam and Jessica Staddon
    Personalized Privacy Policies: Challenges for Data Loss Prevention

SESSION 3 Presentations (10 minutes)

  1. Jean-Francois Henrotte
    Influence of the “Internet of Things” on legislation regarding the protection of individu privacy
  2. Raffaele Zallone
    The privacy paradox, or how I learned to have rights that never quite seem to work
  3. Nancy Kim
    Wrap Contracts and Privacy.
  4. Raghu Seshadri
    The Problem of Onward Transfers under U.S. Law
  5. Clark Asay
    Consumers: The Missing Piece in a Piecemeal Approach to Privacy
  6. Chris Conley
    The Right to Delete.
  7. Antoni Roig
    Privacy and Social Networks: from data protection to pervasive computing.
  8. Shan Chen and Mary-Anne Williams
    Modeling privacy requirements for quality manipulation of information on social networking sites.

SESSION 4 Presentations (10 minutes)

  1. Ted Kang and Lalana Kagal
    Using Social Norms for Privacy Protection in Social Networking.
  2. Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas and Chris Hoofnagle
    Flash Cookies and Privacy
  3. Ron Dolin
    Search Query Privacy: The Problem of Anonymization.
  4. Girma Nigusse and Bart De Decker
    Privacy codes of practice for the Social Web: The analysis of existing privacy codes and emerging social-centric privacy risks
  5. Yang Wang and Alfred Kobsa
    Privacy in Cross-System Personalization
  6. Marta Poblet and Sergi Torralba
    Mobile Networks and Conflict Management: Farewell to Privacy?

SESSION 5 Presentations (20 minutes)

  1. Nuria Casellas, Juan-Emilio Nieto, Albert Meroño, Antoni Roig, Sergi Torralba, Mario Reyes de los Mozos and Pompeu Casanovas
    Ontological Semantics for Data Privacy Compliance: The NEURONA Project
  2. Nathaniel Gleicher and Jong Sung Hwang
    Geo-Spatial Information: The Risks and Opportunities of Real-Time Location-Based Mapping Services
  3. Christian Fritz and Yolanda Gil
    Reasoning about the Appropriate Use of Private Data through Computational Workflows
  4. Ryan Calo
    Privicons: Washing Instructions for your Email

SESSION 6 Presentations (10 minutes)

  1. Faye Fangfei Wang
    Protecting Information Privacy on the Internet:  Legal Framework in the EU.
  2. Yeyoung Chang
    The Distinction between ‘Privacy’ and ‘Personal Information’ – Issues of Personal Information Protection Act in Japan
  3. Bijan Brahmbhatt
    Position and Perspective of Privacy Law in India.
  4. Pompeu Casanovas, Emma Teodoro and Núria Gale
    Self-regulation and Policies in the Spanish Audiovisual Sector: The Catalan Code of Best Practices
  5. Dennys Antonialli
    Privacy and International Compliance: when differences become an issue.
  6. Thomas Stenger and Alexandre Coutant
    How teenagers deal with their privacy on social network sites? Results from a national survey in France
  7. Krasnow Waterman
    Pre-processing Legal Text: Policy Parsing and Isomorphic Intermediate Representation