-
2
-
-
77950672457
-
Sun on Privacy: 'Get over It'
-
1283,17538,00.html, 26 Jan
-
P. Sprenger, "Sun on Privacy: 'Get over It'," Wired News, http://www.wired.com/news/politics/0,1283,17538,00.html, 26 Jan. 1999.
-
(1999)
Wired News
-
-
Sprenger, P.1
-
3
-
-
60449115168
-
The Coming Backlash in Privacy
-
"The Coming Backlash in Privacy," The Economist, 2000.
-
(2000)
The Economist
-
-
-
5
-
-
60449091041
-
Facebook Hangs Its Head over Ad System
-
0,1006420.story?coll=la-headlines-pe-business, 6 Dec
-
J. Guynn, "Facebook Hangs Its Head over Ad System," Los Angeles Times, http://www.latimes.com/business/printedition/ la-fifacebook6dec06,0,1006420.story?coll=la-headlines-pe-business, 6 Dec. 2007.
-
(2007)
Los Angeles Times
-
-
Guynn, J.1
-
8
-
-
60449108077
-
US Privacy Enforcement Case Studies Guide
-
Int'l Assoc
-
Int'l Assoc. Privacy Professionals (IAPP), "US Privacy Enforcement Case Studies Guide," http://www.privacyassociation.org/ images/stories/pdfs/IAP_Privacy_Enforcement_Cases_07.05.07.pdf, 2007.
-
(2007)
-
-
-
9
-
-
60449110711
-
Poll: Privacy Rights under Attack,
-
Oct
-
CBS News, "Poll: Privacy Rights under Attack," http:// www.cbsnews.com/stories/2005/09/30/opinion/polls/main894733.shtml, Oct. 2005.
-
(2005)
CBS News
-
-
-
10
-
-
60449112993
-
-
Privacy Int'l, National Privacy Ranking 2006 - European Union and Leading Surveillance Societies, 2006.
-
Privacy Int'l, National Privacy Ranking 2006 - European Union and Leading Surveillance Societies, 2006.
-
-
-
-
11
-
-
60449114980
-
-
TAUCIS - Technikfolgenabschätzungsstudie Ubiquitäres Computing und Informationelle Selbstbestimmung, J. Bizer et al., eds. 2006.
-
TAUCIS - Technikfolgenabschätzungsstudie Ubiquitäres Computing und Informationelle Selbstbestimmung, J. Bizer et al., eds. 2006.
-
-
-
-
13
-
-
14744275332
-
Privacy and Rationality in Individual Decision Making
-
A. Acquisti and J. Grossklags, "Privacy and Rationality in Individual Decision Making," IEEE Security & Privacy, vol. 2, pp. 24-30, 2005.
-
(2005)
IEEE Security & Privacy
, vol.2
, pp. 24-30
-
-
Acquisti, A.1
Grossklags, J.2
-
15
-
-
60449097515
-
Acceptance of Ubiquitous Computing Services: About the Importance of Human Control
-
Heinz School of Public Policy and Management, Pittsburgh
-
S. Spiekermann, "Acceptance of Ubiquitous Computing Services: About the Importance of Human Control," presentation at the Carnegie Mellon Univ. Heinz School of Public Policy and Management, Pittsburgh, 2006.
-
(2006)
presentation at the Carnegie Mellon Univ
-
-
Spiekermann, S.1
-
16
-
-
70049110855
-
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
-
June
-
J. Tsai, S. Egelman, L. Cranor, and A. Acquisti, "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study," Proc. Workshop Economics of Information Security, June 2007.
-
(2007)
Proc. Workshop Economics of Information Security
-
-
Tsai, J.1
Egelman, S.2
Cranor, L.3
Acquisti, A.4
-
17
-
-
14544292118
-
Privacy and Trust Issues with Invisible Computers
-
S. Lahlou, M. Langheinrich, and C. Röcker, "Privacy and Trust Issues with Invisible Computers," Comm. ACM, vol. 48, no. 3, pp. 59-60, 2005.
-
(2005)
Comm. ACM
, vol.48
, Issue.3
, pp. 59-60
-
-
Lahlou, S.1
Langheinrich, M.2
Röcker, C.3
-
19
-
-
34948873004
-
Anonymity Loves Company: Usability and the Network Effect
-
L. Cranor and S. Garfinkel, eds, pp
-
R. Dingledine and N. Mathewson, "Anonymity Loves Company: Usability and the Network Effect," Security and Usability: Designing Secure Systems that People Can Use, L. Cranor and S. Garfinkel, eds., pp. 547-559, 2005.
-
(2005)
Security and Usability: Designing Secure Systems that People Can Use
, pp. 547-559
-
-
Dingledine, R.1
Mathewson, N.2
-
22
-
-
34547248624
-
Data Collection with Self-Enforcing Privacy
-
10.1145/1180405.1180416, Oct./Nov. 2006
-
P. Golle, F. McSherry, and I. Mironov, "Data Collection with Self-Enforcing Privacy," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 69-78, http://doi.acm.org/10.1145/1180405.1180416, Oct./Nov. 2006.
-
Proc. 13th ACM Conf. Computer and Comm. Security
, pp. 69-78
-
-
Golle, P.1
McSherry, F.2
Mironov, I.3
-
23
-
-
84959058818
-
-
Revised Papers from the ACM CCS-8 Workshop Security and Privacy in Digital Rights Management, pp, T. Sander, ed
-
J. Feigenbaum, M.J. Freedman, T. Sander, and A. Shostack, "Privacy Engineering for Digital Rights Management Systems," Revised Papers from the ACM CCS-8 Workshop Security and Privacy in Digital Rights Management, pp. 76-105, T. Sander, ed., 2002.
-
(2002)
Privacy Engineering for Digital Rights Management Systems
, pp. 76-105
-
-
Feigenbaum, J.1
Freedman, M.J.2
Sander, T.3
Shostack, A.4
-
24
-
-
42049105583
-
Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry
-
B. Friedman, I.E. Smith et al. "Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry," Proc. Eighth Int'l Conf. Ubiquitous Computing, 2006.
-
(2006)
Proc. Eighth Int'l Conf. Ubiquitous Computing
-
-
Friedman, B.1
Smith, I.E.2
-
25
-
-
33749617824
-
User Interfaces for Privacy Agents
-
10.1145/1165734.1165735, June 2006
-
L.F. Cranor, P. Guduru, and M. Arjula, "User Interfaces for Privacy Agents," ACM Trans. Computer-Human Interaction, vol. 13, no. 2, pp. 135-178, http://doi.acm.org/10.1145/1165734.1165735, June 2006.
-
ACM Trans. Computer-Human Interaction
, vol.13
, Issue.2
, pp. 135-178
-
-
Cranor, L.F.1
Guduru, P.2
Arjula, M.3
-
26
-
-
33947646395
-
A Social, Technical and Legal Framework for Privacy Management and Policies
-
J.B. Earp, A.I. Antón, and O. Jarvinen, "A Social, Technical and Legal Framework for Privacy Management and Policies," Proc. Americas Conf. Information Systems, 2002.
-
(2002)
Proc. Americas Conf. Information Systems
-
-
Earp, J.B.1
Antón, A.I.2
Jarvinen, O.3
-
27
-
-
10044248787
-
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems
-
10.1145/1013115.1013129, Aug. 2004
-
J.I. Hong, J.D. Ng, S. Lederer, and J.A. Landay, "Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems," Proc. Fifth Conf. Designing Interactive Systems: Processes, Practices, Methods, and Techniques, pp. 91-100, http://doi.acm.org/10.1145/1013115.1013129, Aug. 2004.
-
Proc. Fifth Conf. Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
34
-
-
60449108684
-
-
Heise Online, Datenschützer: Google's Mail-Service in Deutschland unzulässig,http://www.heise.de/newsticker/meldung/46383, 2004.
-
Heise Online, "Datenschützer: Google's Mail-Service in Deutschland unzulässig,"http://www.heise.de/newsticker/meldung/46383, 2004.
-
-
-
-
37
-
-
26844457831
-
I Didn't Buy It for Myself
-
C.-M. Karat, J.O. Blom, and J. Karat, eds, Kluwer Academic Publishers
-
L.F. Cranor, "I Didn't Buy It for Myself," Designing Personalized User Experiences in E-Commerce, C.-M. Karat, J.O. Blom, and J. Karat, eds., Kluwer Academic Publishers, 2004.
-
(2004)
Designing Personalized User Experiences in E-Commerce
-
-
Cranor, L.F.1
-
38
-
-
0033279226
-
Taming the Wolf in Sheep's Clothing: Privacy in Multimedia Communications
-
A. Adams and A. Sasse, "Taming the Wolf in Sheep's Clothing: Privacy in Multimedia Communications," Proc. Seventh ACM Int'l Multimedia Conf. 1999.
-
(1999)
Proc. Seventh ACM Int'l Multimedia Conf
-
-
Adams, A.1
Sasse, A.2
-
39
-
-
0038588452
-
Privacy in Multimedia Communications: Protecting Users, Not Just Data
-
J. Blandford, J. Vanderdonkt, and P. Gray, eds, pp, Springer
-
A. Adams and A. Sasse, "Privacy in Multimedia Communications: Protecting Users, Not Just Data," People and Computers XV - Interaction without Frontiers, J. Blandford, J. Vanderdonkt, and P. Gray, eds., pp. 49-64, Springer, 2001.
-
(2001)
People and Computers XV - Interaction without Frontiers
, pp. 49-64
-
-
Adams, A.1
Sasse, A.2
-
40
-
-
1842538795
-
Privacy as Contextual Integrity
-
H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Rev., vol. 791, pp. 119-158, 2004.
-
(2004)
Washington Law Rev
, vol.791
, pp. 119-158
-
-
Nissenbaum, H.1
-
41
-
-
2342477114
-
Information Leakage Caused by Hidden Data in Published Documents
-
S. Byers, "Information Leakage Caused by Hidden Data in Published Documents," IEEE Security & Privacy, vol. 2, no. 2, pp. 23-27, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 23-27
-
-
Byers, S.1
-
42
-
-
0002595139
-
Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When Privacy Matters
-
G.J. Nowag and J. Phelps, "Direct Marketing and the Use of Individual-Level Consumer Information: Determining How and When Privacy Matters," J. Direct Marketing, vol. 93, pp. 46-60, 1995.
-
(1995)
J. Direct Marketing
, vol.93
, pp. 46-60
-
-
Nowag, G.J.1
Phelps, J.2
-
43
-
-
60449111096
-
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, J. European Communities, 281, no. 31, 1995.
-
"Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," J. European Communities, vol. 281, no. 31, 1995.
-
-
-
-
45
-
-
34948903300
-
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
-
Sept./Oct, doi: http:///10.1109/MSP.2007.126
-
P.N. Otto, A.I. Anton, and D.L. Baumer, "The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information," IEEE Security & Privacy, vol. 5, no. 5, pp. 15-23, Sept./Oct. 2007, doi: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.126.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.5
, pp. 15-23
-
-
Otto, P.N.1
Anton, A.I.2
Baumer, D.L.3
-
47
-
-
16444368611
-
Privacy in E-Commerce: Stated Preferences versus Actual Behavior
-
B. Berendt et al., "Privacy in E-Commerce: Stated Preferences versus Actual Behavior," Comm. ACM, vol. 484, pp. 101-106, 2005.
-
(2005)
Comm. ACM
, vol.484
, pp. 101-106
-
-
Berendt, B.1
-
49
-
-
0036005221
-
Toward a Typology of Internet Users and Online Privacy Concerns
-
K.B. Sheehan, "Toward a Typology of Internet Users and Online Privacy Concerns," The Information Soc., vol. 1821, pp. 21-32, 2002.
-
(2002)
The Information Soc
, vol.1821
, pp. 21-32
-
-
Sheehan, K.B.1
-
50
-
-
33947186222
-
Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior
-
M. Brown and R. Muchira, "Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior," J. Electronic Commerce Research, vol. 5, no. 1, pp. 62-70, 2004.
-
(2004)
J. Electronic Commerce Research
, vol.5
, Issue.1
, pp. 62-70
-
-
Brown, M.1
Muchira, R.2
-
51
-
-
13244298307
-
Internet Users' Information Privacy Concerns IUIPC: The Construct, the Scale, and a Causal Model
-
N. Malhotra, S.S. Kim, and J. Agarwal, "Internet Users' Information Privacy Concerns IUIPC: The Construct, the Scale, and a Causal Model," Information Systems Research, vol. 15, no. 4, pp. 336-355, 2004.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.1
Kim, S.S.2
Agarwal, J.3
-
52
-
-
84883892066
-
Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences
-
Nov
-
M.S. Ackerman, L.F. Cranor, and J. Reagle, "Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences," Proc. First ACM Conf. Electronic Commerce, pp. 1-8, http://doi.acm.org/10.1145/ 336992.336995, Nov. 1999.
-
(1999)
Proc. First ACM Conf. Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
53
-
-
0000981743
-
Information Privacy: Measuring Individuals' Concerns about Organizational Practices
-
J.H. Smith et al., "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, vol. 202, pp. 167-196, 1996.
-
(1996)
MIS Quarterly
, vol.202
, pp. 167-196
-
-
Smith, J.H.1
-
54
-
-
3042825662
-
Remembrance of Data Passed: A Study of Disk Sanitization Practices
-
Jan./Feb
-
S. Garfinkel and A. Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security & Privacy, Jan./Feb. 2003.
-
(2003)
IEEE Security & Privacy
-
-
Garfinkel, S.1
Shelat, A.2
-
55
-
-
23344443023
-
The Deceptive Behaviors that Offend Us Most about Spyware
-
10.1145/1076211.1076240, Aug. 2005
-
N.F. Awad and K. Fitzgerald, "The Deceptive Behaviors that Offend Us Most about Spyware," Comm. ACM, vol. 48, pp. 55-60, http:// doi.acm.org/10.1145/1076211.1076240, Aug. 2005.
-
Comm. ACM
, vol.48
, pp. 55-60
-
-
Awad, N.F.1
Fitzgerald, K.2
-
56
-
-
29344439800
-
RFID Verbraucherängste und Verbraucherschutz
-
O. Berthold et al., "RFID Verbraucherängste und Verbraucherschutz," Wirtschaftsinformatik Heft, vol. 6, 2005.
-
(2005)
Wirtschaftsinformatik Heft
, vol.6
-
-
Berthold, O.1
-
57
-
-
25444432074
-
RFID and Perceived Control - The Consumer's View
-
O. Guenther and S. Spiekermann, "RFID and Perceived Control - The Consumer's View," Comm. ACM, vol. 489, pp. 73-76, 2005.
-
(2005)
Comm. ACM
, vol.489
, pp. 73-76
-
-
Guenther, O.1
Spiekermann, S.2
-
58
-
-
49049105487
-
Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-Up Ads
-
S.M. Edwards, H. Li et al., "Forced Exposure and Psychological Reactance: Antecedents and Consequences of the Perceived Intrusiveness of Pop-Up Ads," J. Advertising, vol. 313, pp. 83-96, 2002.
-
(2002)
J. Advertising
, vol.313
, pp. 83-96
-
-
Edwards, S.M.1
Li, H.2
-
59
-
-
26844436808
-
The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services
-
S. Spiekermann, "The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services," Int'l J. Technology and Human Interaction, vol. 11, 2004.
-
(2004)
Int'l J. Technology and Human Interaction
, vol.11
-
-
Spiekermann, S.1
-
60
-
-
60449114790
-
Exhibitionismus - leichtgemacht
-
D. Spiegel, "Exhibitionismus - leichtgemacht," Der Spiegel, vol. 29, 2006.
-
(2006)
Der Spiegel
, vol.29
-
-
Spiegel, D.1
-
61
-
-
36549036012
-
Privacy Indexes: A Survey of Westin's Studies,
-
CMU-ISRI-05-138
-
P. Kumaraguru and L. Cranor, "Privacy Indexes: A Survey of Westin's Studies," ISRI Technical Report CMU-ISRI-05-138, http:// reports-archive.adm.cs.cmu.edu/anon/isri2005/abstracts/05-138.html, 2005.
-
(2005)
ISRI Technical Report
-
-
Kumaraguru, P.1
Cranor, L.2
-
62
-
-
60449117746
-
Auswirkungen der UC-Technologie auf Verbraucher: Chancen und Risiken
-
J. Bizer, O. Guenther, and S. Spiekermann, eds. Berlin, Bundesministerium für Bildung und Forschung BMBF, pp
-
S. Spiekermann, "Auswirkungen der UC-Technologie auf Verbraucher: Chancen und Risiken," Technikfolgenabschätzung Ubiquitäres Computing und Informationelle Selbstbestimmung TAUCIS, J. Bizer, O. Guenther, and S. Spiekermann, eds. Berlin, Bundesministerium für Bildung und Forschung BMBF, pp. 153-196, 2006.
-
(2006)
Technikfolgenabschätzung Ubiquitäres Computing und Informationelle Selbstbestimmung TAUCIS
, pp. 153-196
-
-
Spiekermann, S.1
-
63
-
-
0002489136
-
Anomalies in Intertemporal Choice: Evidence and an Interpretation
-
D. Kahneman and A. Tversky, eds, pp, Cambridge Univ. Press
-
G. Löwenstein and D. Prelect, "Anomalies in Intertemporal Choice: Evidence and an Interpretation," Choices, Values, and Frames, D. Kahneman and A. Tversky, eds., pp. 578-596, Cambridge Univ. Press, 2000.
-
(2000)
Choices, Values, and Frames
, pp. 578-596
-
-
Löwenstein, G.1
Prelect, D.2
-
64
-
-
3242812017
-
Privacy in Electronic Commerce and the Economics of Immediate Gratification
-
10.1145/988772.988777, May 2004
-
A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. Fifth ACM Conf. Electronic Commerce pp. 21-29, http://doi.acm.org/10.1145/988772.988777, May 2004.
-
Proc. Fifth ACM Conf. Electronic Commerce
, pp. 21-29
-
-
Acquisti, A.1
-
67
-
-
27644505323
-
Valuating Privacy
-
B. Huberman et al., "Valuating Privacy," IEEE Security & Privacy vol. 1, pp. 22-25, 2004.
-
(2004)
IEEE Security & Privacy
, vol.1
, pp. 22-25
-
-
Huberman, B.1
-
68
-
-
85088736779
-
Bloggers' Expectations of Privacy and Accountability: An Initial Survey
-
F.B. Viégas, "Bloggers' Expectations of Privacy and Accountability: An Initial Survey," J. Computer-Mediated Comm., vol. 103, 2005.
-
(2005)
J. Computer-Mediated Comm
, vol.103
-
-
Viégas, F.B.1
-
71
-
-
34250721634
-
Power Strips, Prophylactics, and Privacy, Oh My
-
10.1145/1143120.1143137, July 2006
-
J. Gideon, L. Cranor, S. Egelman, and A. Acquisti, "Power Strips, Prophylactics, and Privacy, Oh My," Proc. Second Symp. Usable Privacy and Security, vol. 149, pp. 133-144, http://doi.acm.org/ 10.1145/1143120.1143137, July 2006.
-
Proc. Second Symp. Usable Privacy and Security
, vol.149
, pp. 133-144
-
-
Gideon, J.1
Cranor, L.2
Egelman, S.3
Acquisti, A.4
-
72
-
-
33750687395
-
The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization
-
N.F. Awad and M.S. Krishnan, "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization," MIS Quarterly, vol. 301, pp. 13-28, 2006.
-
(2006)
MIS Quarterly
, vol.301
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
74
-
-
60449092246
-
-
Richtlinie Des Europäischen Parlaments Und Des Rates über die Vorratsspeicherung von Daten, die bei der Bereitstellung öffentlich zugänglicher elektronischer Kommunikationsdienste oder öffentlicher Kommunikationsnetze erzeugt oder verarbeitet werden, und zur Änderung der Richtlinie 2002/58/EG, Brussels, European Parlament2005/0182 COD, EU, 2006.
-
Richtlinie Des Europäischen Parlaments Und Des Rates über die Vorratsspeicherung von Daten, die bei der Bereitstellung öffentlich zugänglicher elektronischer Kommunikationsdienste oder öffentlicher Kommunikationsnetze erzeugt oder verarbeitet werden, und zur Änderung der Richtlinie 2002/58/EG, Brussels, European Parlament2005/0182 COD, EU, 2006.
-
-
-
-
76
-
-
0041783510
-
Privacy-Preserving Data Mining
-
June, doi: http:///10.1145/335191.335438
-
R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining," SIGMOD Record, vol. 29, no. 2, pp. 439-450, June 2000, doi: http://doi.acm.org/10.1145/335191.335438.
-
(2000)
SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
77
-
-
60449091663
-
-
L. F. Cranor, S. Egelman, J. Hong, P. Kumaraguru, C. Kuo, S. Romanosky, J. Tsai, and K. Vaniea, "FoxTor: A Tor Design Proposal," http://cups.cs.cmu.edu/pubs/TorGUIContest 113005.pdf, 2005.
-
(2005)
FoxTor: A Tor Design Proposal
-
-
Cranor, L.F.1
Egelman, S.2
Hong, J.3
Kumaraguru, P.4
Kuo, C.5
Romanosky, S.6
Tsai, J.7
Vaniea, K.8
-
78
-
-
60449101019
-
-
OECD, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/document/18/ 0,2340,en_2649_201185_1815186_1_1_1_1,00.html, 1980.
-
OECD, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data," http://www.oecd.org/document/18/ 0,2340,en_2649_201185_1815186_1_1_1_1,00.html, 1980.
-
-
-
-
80
-
-
0022145479
-
Security without Identification: Transaction Systems to Make Big Brother Obsolete
-
Oct
-
D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, 1030-1044, http://doi.acm.org/10.1145/4372.4373, Oct. 1985.
-
(1985)
Comm. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
81
-
-
0038687775
-
Design and Implementation of the 'Idemix' Anonymous Credential System
-
V. Atluri, ed, pp, 10.1145/586110.586114, Nov. 2002
-
J. Camenisch and E. Van Herreweghen, "Design and Implementation of the 'Idemix' Anonymous Credential System," Proc. Ninth ACM Conf. Computer and Comm. Security, V. Atluri, ed., pp. 21-30, http:// doi.acm.org/10.1145/586110.586114, Nov. 2002.
-
Proc. Ninth ACM Conf. Computer and Comm. Security
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
82
-
-
3843125737
-
Rechtssicherheit Trotz Anonymität in Offenen Digitalen Systemen; Datenschutz und Datensicherung
-
B. Pfitzmann, M. Waidner et al. "Rechtssicherheit Trotz Anonymität in Offenen Digitalen Systemen; Datenschutz und Datensicherung," Datenschutz und Datensicherheit DuD, vol. 14, pp. 5-6, 1990.
-
(1990)
Datenschutz und Datensicherheit DuD
, vol.14
, pp. 5-6
-
-
Pfitzmann, B.1
Waidner, M.2
-
83
-
-
0001777423
-
Anonymous Web Transactions with Crowds
-
Feb
-
M.K. Reiter and A.D. Rubin, "Anonymous Web Transactions with Crowds," Comm. ACM, vol. 42, no. 2, pp. 32-48, http:// doi.acm.org/10.1145/293411.293778, Feb. 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
84
-
-
4544259863
-
An Architecture for Privacy-Sensitive Ubiquitous Computing
-
June
-
J.I. Hong and J.A. Landay, "An Architecture for Privacy-Sensitive Ubiquitous Computing," Proc. Second Int'l Conf. Mobile Systems, Applications, and Services, pp. 177-189, http://doi.acm.org/10.1145/ 990064.990087, June 2004.
-
(2004)
Proc. Second Int'l Conf. Mobile Systems, Applications, and Services
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
85
-
-
24944591431
-
Place Lab: Device Positioning Using Radio Beacons in the Wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit, "Place Lab: Device Positioning Using Radio Beacons in the Wild," Proc. Int'l Conf. Pervasive Computing, 2005.
-
(2005)
Proc. Int'l Conf. Pervasive Computing
-
-
LaMarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
Scott, J.6
Sohn, T.7
Howard, J.8
Hughes, J.9
Potter, F.10
Tabert, J.11
Powledge, P.12
Borriello, G.13
Schilit, B.14
-
87
-
-
36248966458
-
-
J. Zibuschka, L. Fritsch, M. Radmacher, T. Scherner, and K. Rannenberg, Enabling Privacy in Real-Life LBS: A Platform for Flexible Mobile Service Provisioning, New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, eds., IFIP Int'l Federation for Information Processing, 232, pp. 325-336, Springer, 2008.
-
J. Zibuschka, L. Fritsch, M. Radmacher, T. Scherner, and K. Rannenberg, "Enabling Privacy in Real-Life LBS: A Platform for Flexible Mobile Service Provisioning," New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, eds., IFIP Int'l Federation for Information Processing, vol. 232, pp. 325-336, Springer, 2008.
-
-
-
-
88
-
-
23944520444
-
Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis
-
June, doi: http:///10.1145/1145911.1145917
-
M. Gruteser and D. Grunwald, "Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, June 2005, doi: http://doi.acm.org/10.1145/1145911.1145917.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
89
-
-
60449107871
-
User Agents in E-Commerce Environments: Industry versus Consumer Perspectives on Data Exchange
-
S. Spiekermann et al., "User Agents in E-Commerce Environments: Industry versus Consumer Perspectives on Data Exchange," Proc. 15th Conf. Advanced Information Systems Eng., 2003.
-
(2003)
Proc. 15th Conf. Advanced Information Systems Eng
-
-
Spiekermann, S.1
-
90
-
-
85016682337
-
Privacy through Pseudonymity in User-Adaptive Systems
-
10.1145/767193.767196, May 2003
-
A. Kobsa and J. Schreck, "Privacy through Pseudonymity in User-Adaptive Systems," ACM Trans. Internet Technology, vol. 3, no. 2, pp. 149-183, http://doi.acm.org/10.1145/767193.767196, May 2003.
-
ACM Trans. Internet Technology
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
91
-
-
34547460819
-
Privacy-Enhanced Web Personalization
-
P. Bruslikovsky, A. Kobsa, and W. Nejdl, eds, Springer Verlag
-
A. Kobsa, "Privacy-Enhanced Web Personalization," The Adaptive Web: Methods and Strategies of Web Personalization, P. Bruslikovsky, A. Kobsa, and W. Nejdl, eds., Springer Verlag, 2007.
-
(2007)
The Adaptive Web: Methods and Strategies of Web Personalization
-
-
Kobsa, A.1
-
92
-
-
34250013678
-
A Face is Exposed for AOL Searcher No. 4417749,
-
9 Aug
-
M. Barbaro and T. Zeller, "A Face is Exposed for AOL Searcher No. 4417749," The New York Times, 9 Aug. 2006.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
93
-
-
60449120330
-
Three Workers Depart AOL after Privacy Uproar
-
21 Aug
-
E. Mills and A. Broache, "Three Workers Depart AOL after Privacy Uproar," CNET News.com, 21 Aug. 2006.
-
(2006)
CNET News.com
-
-
Mills, E.1
Broache, A.2
-
94
-
-
38349067290
-
-
Nov
-
A. Pfitzmann and M. Hansen, Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology Version v0.30, http:// dud.inf.tu-dresden.de/Anon_Terminology.shtml, Nov. 2007.
-
(2007)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology Version v0.30
-
-
Pfitzmann, A.1
Hansen, M.2
-
96
-
-
33749609531
-
Betrayed by My Shadow: Learning Data Identity Via Trail Matching
-
B. Malin, "Betrayed by My Shadow: Learning Data Identity Via Trail Matching," J. Privacy Technology, http://www.jopt.org/ publications/20050609001_malin_abstract.html, 2005.
-
(2005)
J. Privacy Technology
-
-
Malin, B.1
-
97
-
-
0036811662
-
k-Anonymity: A Model for Protecting Privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
98
-
-
34248181923
-
L-Diversity: Privacy Beyond k-Anonymity
-
Mar, doi: http:// /10.1145/1217299.1217302
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond k-Anonymity," ACM Trans. Knowledge Discovery from Data, vol. 1, no. 3, Mar. 2007, doi: http:// doi.acm.org/10.1145/1217299.1217302.
-
(2007)
ACM Trans. Knowledge Discovery from Data
, vol.1
, Issue.3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
101
-
-
60449086448
-
-
The Center for Information Policy Leadership, Jan. 2007
-
"The Center for Information Policy Leadership," Multi-Layered Notices Explained, http://www.hunton.com/files/ tbl_s47Details/FileUpload265/1303/CIPL-APEC_Notices_White_Paper.pdf, Jan. 2007.
-
Multi-Layered Notices Explained
-
-
-
103
-
-
34548433382
-
What's Wrong with Online Privacy Policies?
-
Sept
-
I. Pollach, "What's Wrong with Online Privacy Policies?" Comm. ACM vol. 50, no. 9, pp. 103-108, http://doi.acm.org/10.1145/ 1284621.1284627, Sept. 2007.
-
(2007)
Comm. ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach, I.1
-
104
-
-
60449116838
-
-
Microsoft, Privacy Guidelines for Developing Software Products and Services - Version 1.0, 2006.
-
Microsoft, Privacy Guidelines for Developing Software Products and Services - Version 1.0, 2006.
-
-
-
-
105
-
-
0036435781
-
Comparison of Four Primary Methods for Coordinating the Interruption of People in Human-Computer Interaction
-
D. McFarlane, "Comparison of Four Primary Methods for Coordinating the Interruption of People in Human-Computer Interaction," Human-Computer Interaction, vol. 173, pp. 63-139, 2002.
-
(2002)
Human-Computer Interaction
, vol.173
, pp. 63-139
-
-
McFarlane, D.1
-
106
-
-
38149035174
-
Field Deployment of 'IMBuddy': A Study of Privacy Control and Feedback Mechanisms for Contextual IM
-
G. Hsieh, K.P. Tang, W.Y. Low, and J.I. Hong, "Field Deployment of 'IMBuddy': A Study of Privacy Control and Feedback Mechanisms for Contextual IM," Proc. Ninth Int'l Conf. Ubiquitous Computing, pp. 91-108, 2007.
-
(2007)
Proc. Ninth Int'l Conf. Ubiquitous Computing
, pp. 91-108
-
-
Hsieh, G.1
Tang, K.P.2
Low, W.Y.3
Hong, J.I.4
-
107
-
-
46449098913
-
User-Controllable Security and Privacy for Pervasive Computing
-
J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh, "User-Controllable Security and Privacy for Pervasive Computing," Proc. Eighth IEEE Workshop Mobile Computing Systems and Applications, 2007.
-
(2007)
Proc. Eighth IEEE Workshop Mobile Computing Systems and Applications
-
-
Cornwell, J.1
Fette, I.2
Hsieh, G.3
Prabaker, M.4
Rao, J.5
Tang, K.6
Vaniea, K.7
Bauer, L.8
Cranor, L.9
Hong, J.10
McLaren, B.11
Reiter, M.12
Sadeh, N.13
-
108
-
-
60449097896
-
Understanding and Capturing People's Privacy Policies in a People Finder Application
-
Sept
-
M. Prabaker, J. Rao, I. Fette, P. Kelley, L. Cranor, J. Hong, and N. Sadeh, "Understanding and Capturing People's Privacy Policies in a People Finder Application," Proc. Workshop Ubicomp Privacy, Sept. 2007.
-
(2007)
Proc. Workshop Ubicomp Privacy
-
-
Prabaker, M.1
Rao, J.2
Fette, I.3
Kelley, P.4
Cranor, L.5
Hong, J.6
Sadeh, N.7
-
110
-
-
60449092043
-
HP Scandal Reviving Pretexting Legislation
-
15 Sept
-
D. McCullough and A. Broache, "HP Scandal Reviving Pretexting Legislation," CNET News.com, 15 Sept. 2006.
-
(2006)
CNET News.com
-
-
McCullough, D.1
Broache, A.2
-
111
-
-
60449115347
-
-
Your Grocery Purchases on the Web for All to See? Privacy J., 27, no. 5, pp. 1-7, Mar. 2001.
-
"Your Grocery Purchases on the Web for All to See?" Privacy J., vol. 27, no. 5, pp. 1-7, Mar. 2001.
-
-
-
-
113
-
-
33750054462
-
Enterprise Privacy Promises and Enforcement
-
10.1145/1045405.1045412, Jan. 2005
-
A. Barth and J.C. Mitchell, "Enterprise Privacy Promises and Enforcement," Proc. Workshop Issues in the Theory of Security, pp. 58-66, http://doi.acm.org/10.1145/1045405.1045412, Jan. 2005.
-
Proc. Workshop Issues in the Theory of Security
, pp. 58-66
-
-
Barth, A.1
Mitchell, J.C.2
-
114
-
-
24944578141
-
W3C Member Submission 10
-
Nov
-
C. Powers and M. Schunter, "Enterprise Privacy Authorization Language EPAL 1.2," W3C Member Submission 10, http:// www.w3.org/Submission/EPAL/, Nov. 2003.
-
(2003)
-
-
Powers, C.1
Schunter, M.2
-
115
-
-
34548105790
-
Personal Rights Management
-
G. Danezis and P. Golle, eds
-
M. Deng, L. Fritsch, and K. Kursawe, "Personal Rights Management," Proc. Sixth Workshop Privacy-Enhancing Technologies, G. Danezis and P. Golle, eds., 2006.
-
(2006)
Proc. Sixth Workshop Privacy-Enhancing Technologies
-
-
Deng, M.1
Fritsch, L.2
Kursawe, K.3
-
116
-
-
0347989497
-
Information Privacy in Cyberspace Transactions
-
J. Kang, "Information Privacy in Cyberspace Transactions," Stanford Law Rev., vol. 50, pp. 1194-1294, 1998.
-
(1998)
Stanford Law Rev
, vol.50
, pp. 1194-1294
-
-
Kang, J.1
|