-
1
-
-
0034827009
-
On the design and quantification of privacy-preserving data mining algorithms
-
D. Agrawal and C.C. Aggarwal, On the design and quantification of privacy-preserving data mining algorithms, ACM PODS (2001), 247-255.
-
(2001)
ACM PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
3
-
-
0042414013
-
Scaling mining algorithms to large databases
-
P. Bradley, J. Gehrke, R. Ramakrishnan and R. Srikant, Scaling mining algorithms to large databases, Communications of the ACM 45(8) (2002), 38-43.
-
(2002)
Communications of the ACM
, vol.45
, Issue.8
, pp. 38-43
-
-
Bradley, P.1
Gehrke, J.2
Ramakrishnan, R.3
Srikant, R.4
-
4
-
-
10044263276
-
Disclosive computer ethics
-
P. Brey, Disclosive computer ethics, Computers and Society (2000), 10-16.
-
(2000)
Computers and Society
, pp. 10-16
-
-
Brey, P.1
-
5
-
-
84902715381
-
Unregulated databases hold personal data
-
J. DiSabatino, Unregulated databases hold personal data, Computerworld 36(4) (2002), 7.
-
(2002)
Computerworld
, vol.36
, Issue.4
, pp. 7
-
-
DiSabatino, J.1
-
6
-
-
10044266556
-
Solution to a philosophical question concerning data mining
-
J.S. Fulda, Solution to a philosophical question concerning data mining, Computers and Society (1999), 6-7.
-
(1999)
Computers and Society
, pp. 6-7
-
-
Fulda, J.S.1
-
7
-
-
10044220852
-
If chocolate then champagne
-
R. Matthews, If chocolate then champagne, World Link 13(2) (2000), 12-13.
-
(2000)
World Link
, vol.13
, Issue.2
, pp. 12-13
-
-
Matthews, R.1
-
8
-
-
5744254862
-
Data mining: A slippery slope
-
J. Montãna, Data mining: A slippery slope, Information Management Journal 35(4) (2001), 50-54.
-
(2001)
Information Management Journal
, vol.35
, Issue.4
, pp. 50-54
-
-
Montãna, J.1
-
9
-
-
5744229768
-
Teaching temperance to the cookie monster: Ethical challenges to data mining and direct marketing
-
J. Morse and S. Morse, Teaching temperance to the cookie monster: Ethical challenges to data mining and direct marketing, Business and Society Review 107(1) (2002), 76-97.
-
(2002)
Business and Society Review
, vol.107
, Issue.1
, pp. 76-97
-
-
Morse, J.1
Morse, S.2
-
10
-
-
0034446996
-
Towards OLAP security design - Survey and research issues
-
T. Priebe and G. Pernul, Towards OLAP security design - survey and research issues, ACMDOLAP (2000), 33-40.
-
(2000)
ACMDOLAP
, pp. 33-40
-
-
Priebe, T.1
Pernul, G.2
-
11
-
-
10044232871
-
Guarding the data warehouse gate
-
D. Radcliff, Guarding the data warehouse gate, Computerworld 35(4) (2001), 44-45.
-
(2001)
Computerworld
, vol.35
, Issue.4
, pp. 44-45
-
-
Radcliff, D.1
-
12
-
-
2542439297
-
Balancing internet marketing needs with consumer concerns: A property rights framework
-
E. Rose, Balancing Internet marketing needs with consumer concerns: A property rights framework, Computers and Society (2001), 17-21.
-
(2001)
Computers and Society
, pp. 17-21
-
-
Rose, E.1
-
13
-
-
10044273084
-
Privacy and information access
-
Chapter 5, Prentice Hall, Upper Saddle River, New Jersey
-
R.A. Spinello, Chapter 5: Privacy and information access, in: Case Studies in Information Technology Ethics, Prentice Hall, Upper Saddle River, New Jersey, 2003, pp. 104-111.
-
(2003)
Case Studies in Information Technology Ethics
, pp. 104-111
-
-
Spinello, R.A.1
-
15
-
-
2542469289
-
Privacy protection, control of information, and privacy-enhancing technologies
-
H.T. Tavani and J.H. Moor, Privacy protection, control of information, and privacy-enhancing technologies, Computers and Society (2001), 6-11.
-
(2001)
Computers and Society
, pp. 6-11
-
-
Tavani, H.T.1
Moor, J.H.2
|