메뉴 건너뛰기




Volumn 35, Issue 1, 2009, Pages 67-82

Engineering privacy

Author keywords

Anonymity; Identification; Privacy; Privacy enhancing technologies; Security

Indexed keywords

ARCHITECTURAL DESIGN; BEHAVIORAL RESEARCH; DATA PRIVACY; DATA PROCESSING; DATA TRANSFER; ENGINEERING RESEARCH; STRUCTURAL DESIGN;

EID: 60449120378     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2008.88     Document Type: Article
Times cited : (356)

References (116)
  • 2
    • 77950672457 scopus 로고    scopus 로고
    • Sun on Privacy: 'Get over It'
    • 1283,17538,00.html, 26 Jan
    • P. Sprenger, "Sun on Privacy: 'Get over It'," Wired News, http://www.wired.com/news/politics/0,1283,17538,00.html, 26 Jan. 1999.
    • (1999) Wired News
    • Sprenger, P.1
  • 3
    • 60449115168 scopus 로고    scopus 로고
    • The Coming Backlash in Privacy
    • "The Coming Backlash in Privacy," The Economist, 2000.
    • (2000) The Economist
  • 5
    • 60449091041 scopus 로고    scopus 로고
    • Facebook Hangs Its Head over Ad System
    • 0,1006420.story?coll=la-headlines-pe-business, 6 Dec
    • J. Guynn, "Facebook Hangs Its Head over Ad System," Los Angeles Times, http://www.latimes.com/business/printedition/ la-fifacebook6dec06,0,1006420.story?coll=la-headlines-pe-business, 6 Dec. 2007.
    • (2007) Los Angeles Times
    • Guynn, J.1
  • 8
    • 60449108077 scopus 로고    scopus 로고
    • US Privacy Enforcement Case Studies Guide
    • Int'l Assoc
    • Int'l Assoc. Privacy Professionals (IAPP), "US Privacy Enforcement Case Studies Guide," http://www.privacyassociation.org/ images/stories/pdfs/IAP_Privacy_Enforcement_Cases_07.05.07.pdf, 2007.
    • (2007)
  • 9
    • 60449110711 scopus 로고    scopus 로고
    • Poll: Privacy Rights under Attack,
    • Oct
    • CBS News, "Poll: Privacy Rights under Attack," http:// www.cbsnews.com/stories/2005/09/30/opinion/polls/main894733.shtml, Oct. 2005.
    • (2005) CBS News
  • 10
    • 60449112993 scopus 로고    scopus 로고
    • Privacy Int'l, National Privacy Ranking 2006 - European Union and Leading Surveillance Societies, 2006.
    • Privacy Int'l, National Privacy Ranking 2006 - European Union and Leading Surveillance Societies, 2006.
  • 11
    • 60449114980 scopus 로고    scopus 로고
    • TAUCIS - Technikfolgenabschätzungsstudie Ubiquitäres Computing und Informationelle Selbstbestimmung, J. Bizer et al., eds. 2006.
    • TAUCIS - Technikfolgenabschätzungsstudie Ubiquitäres Computing und Informationelle Selbstbestimmung, J. Bizer et al., eds. 2006.
  • 13
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and Rationality in Individual Decision Making
    • A. Acquisti and J. Grossklags, "Privacy and Rationality in Individual Decision Making," IEEE Security & Privacy, vol. 2, pp. 24-30, 2005.
    • (2005) IEEE Security & Privacy , vol.2 , pp. 24-30
    • Acquisti, A.1    Grossklags, J.2
  • 15
    • 60449097515 scopus 로고    scopus 로고
    • Acceptance of Ubiquitous Computing Services: About the Importance of Human Control
    • Heinz School of Public Policy and Management, Pittsburgh
    • S. Spiekermann, "Acceptance of Ubiquitous Computing Services: About the Importance of Human Control," presentation at the Carnegie Mellon Univ. Heinz School of Public Policy and Management, Pittsburgh, 2006.
    • (2006) presentation at the Carnegie Mellon Univ
    • Spiekermann, S.1
  • 17
    • 14544292118 scopus 로고    scopus 로고
    • Privacy and Trust Issues with Invisible Computers
    • S. Lahlou, M. Langheinrich, and C. Röcker, "Privacy and Trust Issues with Invisible Computers," Comm. ACM, vol. 48, no. 3, pp. 59-60, 2005.
    • (2005) Comm. ACM , vol.48 , Issue.3 , pp. 59-60
    • Lahlou, S.1    Langheinrich, M.2    Röcker, C.3
  • 18
  • 24
    • 42049105583 scopus 로고    scopus 로고
    • Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry
    • B. Friedman, I.E. Smith et al. "Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry," Proc. Eighth Int'l Conf. Ubiquitous Computing, 2006.
    • (2006) Proc. Eighth Int'l Conf. Ubiquitous Computing
    • Friedman, B.1    Smith, I.E.2
  • 25
    • 33749617824 scopus 로고    scopus 로고
    • User Interfaces for Privacy Agents
    • 10.1145/1165734.1165735, June 2006
    • L.F. Cranor, P. Guduru, and M. Arjula, "User Interfaces for Privacy Agents," ACM Trans. Computer-Human Interaction, vol. 13, no. 2, pp. 135-178, http://doi.acm.org/10.1145/1165734.1165735, June 2006.
    • ACM Trans. Computer-Human Interaction , vol.13 , Issue.2 , pp. 135-178
    • Cranor, L.F.1    Guduru, P.2    Arjula, M.3
  • 34
    • 60449108684 scopus 로고    scopus 로고
    • Heise Online, Datenschützer: Google's Mail-Service in Deutschland unzulässig,http://www.heise.de/newsticker/meldung/46383, 2004.
    • Heise Online, "Datenschützer: Google's Mail-Service in Deutschland unzulässig,"http://www.heise.de/newsticker/meldung/46383, 2004.
  • 37
    • 26844457831 scopus 로고    scopus 로고
    • I Didn't Buy It for Myself
    • C.-M. Karat, J.O. Blom, and J. Karat, eds, Kluwer Academic Publishers
    • L.F. Cranor, "I Didn't Buy It for Myself," Designing Personalized User Experiences in E-Commerce, C.-M. Karat, J.O. Blom, and J. Karat, eds., Kluwer Academic Publishers, 2004.
    • (2004) Designing Personalized User Experiences in E-Commerce
    • Cranor, L.F.1
  • 38
    • 0033279226 scopus 로고    scopus 로고
    • Taming the Wolf in Sheep's Clothing: Privacy in Multimedia Communications
    • A. Adams and A. Sasse, "Taming the Wolf in Sheep's Clothing: Privacy in Multimedia Communications," Proc. Seventh ACM Int'l Multimedia Conf. 1999.
    • (1999) Proc. Seventh ACM Int'l Multimedia Conf
    • Adams, A.1    Sasse, A.2
  • 39
    • 0038588452 scopus 로고    scopus 로고
    • Privacy in Multimedia Communications: Protecting Users, Not Just Data
    • J. Blandford, J. Vanderdonkt, and P. Gray, eds, pp, Springer
    • A. Adams and A. Sasse, "Privacy in Multimedia Communications: Protecting Users, Not Just Data," People and Computers XV - Interaction without Frontiers, J. Blandford, J. Vanderdonkt, and P. Gray, eds., pp. 49-64, Springer, 2001.
    • (2001) People and Computers XV - Interaction without Frontiers , pp. 49-64
    • Adams, A.1    Sasse, A.2
  • 40
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as Contextual Integrity
    • H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Rev., vol. 791, pp. 119-158, 2004.
    • (2004) Washington Law Rev , vol.791 , pp. 119-158
    • Nissenbaum, H.1
  • 41
    • 2342477114 scopus 로고    scopus 로고
    • Information Leakage Caused by Hidden Data in Published Documents
    • S. Byers, "Information Leakage Caused by Hidden Data in Published Documents," IEEE Security & Privacy, vol. 2, no. 2, pp. 23-27, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 23-27
    • Byers, S.1
  • 42
    • 0002595139 scopus 로고
    • Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When Privacy Matters
    • G.J. Nowag and J. Phelps, "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When Privacy Matters," J. Direct Marketing, vol. 93, pp. 46-60, 1995.
    • (1995) J. Direct Marketing , vol.93 , pp. 46-60
    • Nowag, G.J.1    Phelps, J.2
  • 43
    • 60449111096 scopus 로고    scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, J. European Communities, 281, no. 31, 1995.
    • "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," J. European Communities, vol. 281, no. 31, 1995.
  • 45
    • 34948903300 scopus 로고    scopus 로고
    • The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
    • Sept./Oct, doi: http:///10.1109/MSP.2007.126
    • P.N. Otto, A.I. Anton, and D.L. Baumer, "The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information," IEEE Security & Privacy, vol. 5, no. 5, pp. 15-23, Sept./Oct. 2007, doi: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.126.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.5 , pp. 15-23
    • Otto, P.N.1    Anton, A.I.2    Baumer, D.L.3
  • 47
    • 16444368611 scopus 로고    scopus 로고
    • Privacy in E-Commerce: Stated Preferences versus Actual Behavior
    • B. Berendt et al., "Privacy in E-Commerce: Stated Preferences versus Actual Behavior," Comm. ACM, vol. 484, pp. 101-106, 2005.
    • (2005) Comm. ACM , vol.484 , pp. 101-106
    • Berendt, B.1
  • 49
    • 0036005221 scopus 로고    scopus 로고
    • Toward a Typology of Internet Users and Online Privacy Concerns
    • K.B. Sheehan, "Toward a Typology of Internet Users and Online Privacy Concerns," The Information Soc., vol. 1821, pp. 21-32, 2002.
    • (2002) The Information Soc , vol.1821 , pp. 21-32
    • Sheehan, K.B.1
  • 50
    • 33947186222 scopus 로고    scopus 로고
    • Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior
    • M. Brown and R. Muchira, "Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior," J. Electronic Commerce Research, vol. 5, no. 1, pp. 62-70, 2004.
    • (2004) J. Electronic Commerce Research , vol.5 , Issue.1 , pp. 62-70
    • Brown, M.1    Muchira, R.2
  • 51
    • 13244298307 scopus 로고    scopus 로고
    • Internet Users' Information Privacy Concerns IUIPC: The Construct, the Scale, and a Causal Model
    • N. Malhotra, S.S. Kim, and J. Agarwal, "Internet Users' Information Privacy Concerns IUIPC: The Construct, the Scale, and a Causal Model," Information Systems Research, vol. 15, no. 4, pp. 336-355, 2004.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.1    Kim, S.S.2    Agarwal, J.3
  • 52
    • 84883892066 scopus 로고    scopus 로고
    • Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences
    • Nov
    • M.S. Ackerman, L.F. Cranor, and J. Reagle, "Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences," Proc. First ACM Conf. Electronic Commerce, pp. 1-8, http://doi.acm.org/10.1145/ 336992.336995, Nov. 1999.
    • (1999) Proc. First ACM Conf. Electronic Commerce , pp. 1-8
    • Ackerman, M.S.1    Cranor, L.F.2    Reagle, J.3
  • 53
    • 0000981743 scopus 로고    scopus 로고
    • Information Privacy: Measuring Individuals' Concerns about Organizational Practices
    • J.H. Smith et al., "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, vol. 202, pp. 167-196, 1996.
    • (1996) MIS Quarterly , vol.202 , pp. 167-196
    • Smith, J.H.1
  • 54
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of Data Passed: A Study of Disk Sanitization Practices
    • Jan./Feb
    • S. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, Jan./Feb. 2003.
    • (2003) IEEE Security & Privacy
    • Garfinkel, S.1    Shelat, A.2
  • 55
    • 23344443023 scopus 로고    scopus 로고
    • The Deceptive Behaviors that Offend Us Most about Spyware
    • 10.1145/1076211.1076240, Aug. 2005
    • N.F. Awad and K. Fitzgerald, "The Deceptive Behaviors that Offend Us Most about Spyware," Comm. ACM, vol. 48, pp. 55-60, http:// doi.acm.org/10.1145/1076211.1076240, Aug. 2005.
    • Comm. ACM , vol.48 , pp. 55-60
    • Awad, N.F.1    Fitzgerald, K.2
  • 56
    • 29344439800 scopus 로고    scopus 로고
    • RFID Verbraucherängste und Verbraucherschutz
    • O. Berthold et al., "RFID Verbraucherängste und Verbraucherschutz," Wirtschaftsinformatik Heft, vol. 6, 2005.
    • (2005) Wirtschaftsinformatik Heft , vol.6
    • Berthold, O.1
  • 57
    • 25444432074 scopus 로고    scopus 로고
    • RFID and Perceived Control - The Consumer's View
    • O. Guenther and S. Spiekermann, "RFID and Perceived Control - The Consumer's View," Comm. ACM, vol. 489, pp. 73-76, 2005.
    • (2005) Comm. ACM , vol.489 , pp. 73-76
    • Guenther, O.1    Spiekermann, S.2
  • 58
    • 49049105487 scopus 로고    scopus 로고
    • Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-Up Ads
    • S.M. Edwards, H. Li et al., "Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-Up Ads," J. Advertising, vol. 313, pp. 83-96, 2002.
    • (2002) J. Advertising , vol.313 , pp. 83-96
    • Edwards, S.M.1    Li, H.2
  • 59
    • 26844436808 scopus 로고    scopus 로고
    • The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services
    • S. Spiekermann, "The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services," Int'l J. Technology and Human Interaction, vol. 11, 2004.
    • (2004) Int'l J. Technology and Human Interaction , vol.11
    • Spiekermann, S.1
  • 60
    • 60449114790 scopus 로고    scopus 로고
    • Exhibitionismus - leichtgemacht
    • D. Spiegel, "Exhibitionismus - leichtgemacht," Der Spiegel, vol. 29, 2006.
    • (2006) Der Spiegel , vol.29
    • Spiegel, D.1
  • 61
    • 36549036012 scopus 로고    scopus 로고
    • Privacy Indexes: A Survey of Westin's Studies,
    • CMU-ISRI-05-138
    • P. Kumaraguru and L. Cranor, "Privacy Indexes: A Survey of Westin's Studies," ISRI Technical Report CMU-ISRI-05-138, http:// reports-archive.adm.cs.cmu.edu/anon/isri2005/abstracts/05-138.html, 2005.
    • (2005) ISRI Technical Report
    • Kumaraguru, P.1    Cranor, L.2
  • 62
    • 60449117746 scopus 로고    scopus 로고
    • Auswirkungen der UC-Technologie auf Verbraucher: Chancen und Risiken
    • J. Bizer, O. Guenther, and S. Spiekermann, eds. Berlin, Bundesministerium für Bildung und Forschung BMBF, pp
    • S. Spiekermann, "Auswirkungen der UC-Technologie auf Verbraucher: Chancen und Risiken," Technikfolgenabschätzung Ubiquitäres Computing und Informationelle Selbstbestimmung TAUCIS, J. Bizer, O. Guenther, and S. Spiekermann, eds. Berlin, Bundesministerium für Bildung und Forschung BMBF, pp. 153-196, 2006.
    • (2006) Technikfolgenabschätzung Ubiquitäres Computing und Informationelle Selbstbestimmung TAUCIS , pp. 153-196
    • Spiekermann, S.1
  • 63
    • 0002489136 scopus 로고    scopus 로고
    • Anomalies in Intertemporal Choice: Evidence and an Interpretation
    • D. Kahneman and A. Tversky, eds, pp, Cambridge Univ. Press
    • G. Löwenstein and D. Prelect, "Anomalies in Intertemporal Choice: Evidence and an Interpretation," Choices, Values, and Frames, D. Kahneman and A. Tversky, eds., pp. 578-596, Cambridge Univ. Press, 2000.
    • (2000) Choices, Values, and Frames , pp. 578-596
    • Löwenstein, G.1    Prelect, D.2
  • 64
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in Electronic Commerce and the Economics of Immediate Gratification
    • 10.1145/988772.988777, May 2004
    • A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. Fifth ACM Conf. Electronic Commerce pp. 21-29, http://doi.acm.org/10.1145/988772.988777, May 2004.
    • Proc. Fifth ACM Conf. Electronic Commerce , pp. 21-29
    • Acquisti, A.1
  • 67
    • 27644505323 scopus 로고    scopus 로고
    • Valuating Privacy
    • B. Huberman et al., "Valuating Privacy," IEEE Security & Privacy vol. 1, pp. 22-25, 2004.
    • (2004) IEEE Security & Privacy , vol.1 , pp. 22-25
    • Huberman, B.1
  • 68
    • 85088736779 scopus 로고    scopus 로고
    • Bloggers' Expectations of Privacy and Accountability: An Initial Survey
    • F.B. Viégas, "Bloggers' Expectations of Privacy and Accountability: An Initial Survey," J. Computer-Mediated Comm., vol. 103, 2005.
    • (2005) J. Computer-Mediated Comm , vol.103
    • Viégas, F.B.1
  • 72
    • 33750687395 scopus 로고    scopus 로고
    • The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization
    • N.F. Awad and M.S. Krishnan, "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization," MIS Quarterly, vol. 301, pp. 13-28, 2006.
    • (2006) MIS Quarterly , vol.301 , pp. 13-28
    • Awad, N.F.1    Krishnan, M.S.2
  • 74
    • 60449092246 scopus 로고    scopus 로고
    • Richtlinie Des Europäischen Parlaments Und Des Rates über die Vorratsspeicherung von Daten, die bei der Bereitstellung öffentlich zugänglicher elektronischer Kommunikationsdienste oder öffentlicher Kommunikationsnetze erzeugt oder verarbeitet werden, und zur Änderung der Richtlinie 2002/58/EG, Brussels, European Parlament2005/0182 COD, EU, 2006.
    • Richtlinie Des Europäischen Parlaments Und Des Rates über die Vorratsspeicherung von Daten, die bei der Bereitstellung öffentlich zugänglicher elektronischer Kommunikationsdienste oder öffentlicher Kommunikationsnetze erzeugt oder verarbeitet werden, und zur Änderung der Richtlinie 2002/58/EG, Brussels, European Parlament2005/0182 COD, EU, 2006.
  • 76
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-Preserving Data Mining
    • June, doi: http:///10.1145/335191.335438
    • R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining," SIGMOD Record, vol. 29, no. 2, pp. 439-450, June 2000, doi: http://doi.acm.org/10.1145/335191.335438.
    • (2000) SIGMOD Record , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 78
    • 60449101019 scopus 로고    scopus 로고
    • OECD, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/document/18/ 0,2340,en_2649_201185_1815186_1_1_1_1,00.html, 1980.
    • OECD, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data," http://www.oecd.org/document/18/ 0,2340,en_2649_201185_1815186_1_1_1_1,00.html, 1980.
  • 80
    • 0022145479 scopus 로고
    • Security without Identification: Transaction Systems to Make Big Brother Obsolete
    • Oct
    • D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, 1030-1044, http://doi.acm.org/10.1145/4372.4373, Oct. 1985.
    • (1985) Comm. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 81
    • 0038687775 scopus 로고    scopus 로고
    • Design and Implementation of the 'Idemix' Anonymous Credential System
    • V. Atluri, ed, pp, 10.1145/586110.586114, Nov. 2002
    • J. Camenisch and E. Van Herreweghen, "Design and Implementation of the 'Idemix' Anonymous Credential System," Proc. Ninth ACM Conf. Computer and Comm. Security, V. Atluri, ed., pp. 21-30, http:// doi.acm.org/10.1145/586110.586114, Nov. 2002.
    • Proc. Ninth ACM Conf. Computer and Comm. Security , pp. 21-30
    • Camenisch, J.1    Van Herreweghen, E.2
  • 82
    • 3843125737 scopus 로고
    • Rechtssicherheit Trotz Anonymität in Offenen Digitalen Systemen; Datenschutz und Datensicherung
    • B. Pfitzmann, M. Waidner et al. "Rechtssicherheit Trotz Anonymität in Offenen Digitalen Systemen; Datenschutz und Datensicherung," Datenschutz und Datensicherheit DuD, vol. 14, pp. 5-6, 1990.
    • (1990) Datenschutz und Datensicherheit DuD , vol.14 , pp. 5-6
    • Pfitzmann, B.1    Waidner, M.2
  • 83
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web Transactions with Crowds
    • Feb
    • M.K. Reiter and A.D. Rubin, "Anonymous Web Transactions with Crowds," Comm. ACM, vol. 42, no. 2, pp. 32-48, http:// doi.acm.org/10.1145/293411.293778, Feb. 1999.
    • (1999) Comm. ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 87
    • 36248966458 scopus 로고    scopus 로고
    • J. Zibuschka, L. Fritsch, M. Radmacher, T. Scherner, and K. Rannenberg, Enabling Privacy in Real-Life LBS: A Platform for Flexible Mobile Service Provisioning, New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, eds., IFIP Int'l Federation for Information Processing, 232, pp. 325-336, Springer, 2008.
    • J. Zibuschka, L. Fritsch, M. Radmacher, T. Scherner, and K. Rannenberg, "Enabling Privacy in Real-Life LBS: A Platform for Flexible Mobile Service Provisioning," New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, eds., IFIP Int'l Federation for Information Processing, vol. 232, pp. 325-336, Springer, 2008.
  • 88
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis
    • June, doi: http:///10.1145/1145911.1145917
    • M. Gruteser and D. Grunwald, "Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, June 2005, doi: http://doi.acm.org/10.1145/1145911.1145917.
    • (2005) Mobile Networks and Applications , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 89
    • 60449107871 scopus 로고    scopus 로고
    • User Agents in E-Commerce Environments: Industry versus Consumer Perspectives on Data Exchange
    • S. Spiekermann et al., "User Agents in E-Commerce Environments: Industry versus Consumer Perspectives on Data Exchange," Proc. 15th Conf. Advanced Information Systems Eng., 2003.
    • (2003) Proc. 15th Conf. Advanced Information Systems Eng
    • Spiekermann, S.1
  • 90
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through Pseudonymity in User-Adaptive Systems
    • 10.1145/767193.767196, May 2003
    • A. Kobsa and J. Schreck, "Privacy through Pseudonymity in User-Adaptive Systems," ACM Trans. Internet Technology, vol. 3, no. 2, pp. 149-183, http://doi.acm.org/10.1145/767193.767196, May 2003.
    • ACM Trans. Internet Technology , vol.3 , Issue.2 , pp. 149-183
    • Kobsa, A.1    Schreck, J.2
  • 91
    • 34547460819 scopus 로고    scopus 로고
    • Privacy-Enhanced Web Personalization
    • P. Bruslikovsky, A. Kobsa, and W. Nejdl, eds, Springer Verlag
    • A. Kobsa, "Privacy-Enhanced Web Personalization," The Adaptive Web: Methods and Strategies of Web Personalization, P. Bruslikovsky, A. Kobsa, and W. Nejdl, eds., Springer Verlag, 2007.
    • (2007) The Adaptive Web: Methods and Strategies of Web Personalization
    • Kobsa, A.1
  • 92
    • 34250013678 scopus 로고    scopus 로고
    • A Face is Exposed for AOL Searcher No. 4417749,
    • 9 Aug
    • M. Barbaro and T. Zeller, "A Face is Exposed for AOL Searcher No. 4417749," The New York Times, 9 Aug. 2006.
    • (2006) The New York Times
    • Barbaro, M.1    Zeller, T.2
  • 93
    • 60449120330 scopus 로고    scopus 로고
    • Three Workers Depart AOL after Privacy Uproar
    • 21 Aug
    • E. Mills and A. Broache, "Three Workers Depart AOL after Privacy Uproar," CNET News.com, 21 Aug. 2006.
    • (2006) CNET News.com
    • Mills, E.1    Broache, A.2
  • 96
    • 33749609531 scopus 로고    scopus 로고
    • Betrayed by My Shadow: Learning Data Identity Via Trail Matching
    • B. Malin, "Betrayed by My Shadow: Learning Data Identity Via Trail Matching," J. Privacy Technology, http://www.jopt.org/ publications/20050609001_malin_abstract.html, 2005.
    • (2005) J. Privacy Technology
    • Malin, B.1
  • 101
    • 60449086448 scopus 로고    scopus 로고
    • The Center for Information Policy Leadership, Jan. 2007
    • "The Center for Information Policy Leadership," Multi-Layered Notices Explained, http://www.hunton.com/files/ tbl_s47Details/FileUpload265/1303/CIPL-APEC_Notices_White_Paper.pdf, Jan. 2007.
    • Multi-Layered Notices Explained
  • 103
    • 34548433382 scopus 로고    scopus 로고
    • What's Wrong with Online Privacy Policies?
    • Sept
    • I. Pollach, "What's Wrong with Online Privacy Policies?" Comm. ACM vol. 50, no. 9, pp. 103-108, http://doi.acm.org/10.1145/ 1284621.1284627, Sept. 2007.
    • (2007) Comm. ACM , vol.50 , Issue.9 , pp. 103-108
    • Pollach, I.1
  • 104
    • 60449116838 scopus 로고    scopus 로고
    • Microsoft, Privacy Guidelines for Developing Software Products and Services - Version 1.0, 2006.
    • Microsoft, Privacy Guidelines for Developing Software Products and Services - Version 1.0, 2006.
  • 105
    • 0036435781 scopus 로고    scopus 로고
    • Comparison of Four Primary Methods for Coordinating the Interruption of People in Human-Computer Interaction
    • D. McFarlane, "Comparison of Four Primary Methods for Coordinating the Interruption of People in Human-Computer Interaction," Human-Computer Interaction, vol. 173, pp. 63-139, 2002.
    • (2002) Human-Computer Interaction , vol.173 , pp. 63-139
    • McFarlane, D.1
  • 106
    • 38149035174 scopus 로고    scopus 로고
    • Field Deployment of 'IMBuddy': A Study of Privacy Control and Feedback Mechanisms for Contextual IM
    • G. Hsieh, K.P. Tang, W.Y. Low, and J.I. Hong, "Field Deployment of 'IMBuddy': A Study of Privacy Control and Feedback Mechanisms for Contextual IM," Proc. Ninth Int'l Conf. Ubiquitous Computing, pp. 91-108, 2007.
    • (2007) Proc. Ninth Int'l Conf. Ubiquitous Computing , pp. 91-108
    • Hsieh, G.1    Tang, K.P.2    Low, W.Y.3    Hong, J.I.4
  • 110
    • 60449092043 scopus 로고    scopus 로고
    • HP Scandal Reviving Pretexting Legislation
    • 15 Sept
    • D. McCullough and A. Broache, "HP Scandal Reviving Pretexting Legislation," CNET News.com, 15 Sept. 2006.
    • (2006) CNET News.com
    • McCullough, D.1    Broache, A.2
  • 111
    • 60449115347 scopus 로고    scopus 로고
    • Your Grocery Purchases on the Web for All to See? Privacy J., 27, no. 5, pp. 1-7, Mar. 2001.
    • "Your Grocery Purchases on the Web for All to See?" Privacy J., vol. 27, no. 5, pp. 1-7, Mar. 2001.
  • 113
    • 33750054462 scopus 로고    scopus 로고
    • Enterprise Privacy Promises and Enforcement
    • 10.1145/1045405.1045412, Jan. 2005
    • A. Barth and J.C. Mitchell, "Enterprise Privacy Promises and Enforcement," Proc. Workshop Issues in the Theory of Security, pp. 58-66, http://doi.acm.org/10.1145/1045405.1045412, Jan. 2005.
    • Proc. Workshop Issues in the Theory of Security , pp. 58-66
    • Barth, A.1    Mitchell, J.C.2
  • 114
    • 24944578141 scopus 로고    scopus 로고
    • W3C Member Submission 10
    • Nov
    • C. Powers and M. Schunter, "Enterprise Privacy Authorization Language EPAL 1.2," W3C Member Submission 10, http:// www.w3.org/Submission/EPAL/, Nov. 2003.
    • (2003)
    • Powers, C.1    Schunter, M.2
  • 116
    • 0347989497 scopus 로고    scopus 로고
    • Information Privacy in Cyberspace Transactions
    • J. Kang, "Information Privacy in Cyberspace Transactions," Stanford Law Rev., vol. 50, pp. 1194-1294, 1998.
    • (1998) Stanford Law Rev , vol.50 , pp. 1194-1294
    • Kang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.