Search for dissertations about: "GDPR"
Showing result 11 - 15 of 17 swedish dissertations containing the word GDPR.
-
11. Managing Migration Flows by processing Personal Data within the adequate Data Protection Instrument : Scoping Exercise between general and law enforcement Data Protection Rules applicable to Third Country Nationals
Abstract : In the aftermath of increased migration flows coming to Europe in 2015, the so-called migration crisis, irregular migration and related crimes such as migrant smuggling and human trafficking became a hotly debated topic on European Union (EU) level. The results of those discussions were the fortification of the EU’s external borders, the strengthening of the mandate of relevant EU Agencies and the establishment of new databases in the Area of Freedom, Security and Justice (AFSJ). READ MORE
-
12. Towards Privacy Preserving Micro-data Analysis : A machine learning based perspective under prevailing privacy regulations
Abstract : Machine learning (ML) has been employed in a wide variety of domains where micro-data (i.e., personal data) are used in the training process. READ MORE
-
13. Context-based explanations for machine learning predictions
Abstract : In recent years, growing concern regarding trust in algorithmic decision-making has drawn attention to more transparent and interpretable models. Laws and regulations are moving towards requiring this functionality from information systems to prevent unintended side effects. READ MORE
-
14. Cryptographic Tools for Privacy Preservation
Abstract : Data permeates every aspect of our daily life and it is the backbone of our digitalized society. Smartphones, smartwatches and many more smart devices measure, collect, modify and share data in what is known as the Internet of Things. READ MORE
-
15. Robust and Efficient Federated Learning for IoT Security
Abstract : The widespread adoption of Internet of Things (IoT) devices has led to substantial progress across various industrial sectors, including healthcare, transportation, and manufacturing. However, these devices also introduce significant security vulnerabilities because they are often deployed without adequate security measures, making them susceptible to cyber threats. READ MORE