-
1
-
-
74049139353
-
-
C. I. A. The World Factbook. Central Intelligence Agency, Washington, DC, 2008.
-
C. I. A. The World Factbook. Central Intelligence Agency, Washington, DC, 2008.
-
-
-
-
2
-
-
67651230216
-
Ethical approaches to robotic data gathering in academic research
-
Jan
-
G. Allen, D. Burk, and C. Ess. Ethical approaches to robotic data gathering in academic research. International Journal of Internet Research Ethics, 1(1):9-36, Jan. 2008.
-
(2008)
International Journal of Internet Research Ethics
, vol.1
, Issue.1
, pp. 9-36
-
-
Allen, G.1
Burk, D.2
Ess, C.3
-
3
-
-
34548245473
-
Shakra: Tracking and sharing daily activity levels with unaugmented mobile phones
-
June
-
I. Anderson, J. Maitland, S. Sherwood, L. Barkhuus, M. Chalmers, M. Hall, B. Brown, and H. Muller. Shakra: Tracking and sharing daily activity levels with unaugmented mobile phones. Mobile Networks and Applications, 12(2):185-199, June 2007.
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.2
, pp. 185-199
-
-
Anderson, I.1
Maitland, J.2
Sherwood, S.3
Barkhuus, L.4
Chalmers, M.5
Hall, M.6
Brown, B.7
Muller, H.8
-
4
-
-
74049121501
-
-
Associated Press. Google to reshoot street views of Japanese cities, 14 May 2009. http://www.japantoday.com/category/technology/view/ google-to-reshoot-street-views-of-japanese-cities, accessed 2009-05-19.
-
Associated Press. Google to reshoot street views of Japanese cities, 14 May 2009. http://www.japantoday.com/category/technology/view/ google-to-reshoot-street-views-of-japanese-cities, accessed 2009-05-19.
-
-
-
-
5
-
-
85048997432
-
The age of the thumb: A cultural reading of mobile technologies from Asia
-
June
-
G. Bell. The age of the thumb: A cultural reading of mobile technologies from Asia. Knowledge, Technology, and Policy, 19(2):41-57, June 2006.
-
(2006)
Knowledge, Technology, and Policy
, vol.19
, Issue.2
, pp. 41-57
-
-
Bell, G.1
-
6
-
-
84947486722
-
Less is more: Energy-efficient mobile sensing with SenseLess
-
Barcelona, Spain, Aug
-
F. Ben Abdesslem, A. Phillips, and T. Henderson. Less is more: Energy-efficient mobile sensing with SenseLess. In Proceedings of ACM SIGCOMM Mobiheld workshop, Barcelona, Spain, Aug. 2009.
-
(2009)
Proceedings of ACM SIGCOMM Mobiheld workshop
-
-
Ben Abdesslem, F.1
Phillips, A.2
Henderson, T.3
-
7
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
Oct
-
D. Boyd and N. B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1):210-230, Oct. 2007.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.1
Ellison, N.B.2
-
8
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
Las Vegas, Nevada, USA, Aug
-
J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In KDD '08: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 70-78, Las Vegas, Nevada, USA, Aug. 2008.
-
(2008)
KDD '08: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 70-78
-
-
Brickell, J.1
Shmatikov, V.2
-
9
-
-
44049104101
-
Privacy2.0: Towards collaborative data-privacy protection
-
Springer-Verlag, Boston, MA, USA
-
E. Buchmann, K. Böhm, and O. Raabe. Privacy2.0: Towards collaborative data-privacy protection. In Trust Management II, volume 263 of IFIP International Federation for Information Processing, pp 247-262. Springer-Verlag, Boston, MA, USA, 2008.
-
(2008)
Trust Management II, volume 263 of IFIP International Federation for Information Processing
, pp. 247-262
-
-
Buchmann, E.1
Böhm, K.2
Raabe, O.3
-
10
-
-
34247596905
-
Impact of human mobility on opportunistic forwarding algorithms
-
June
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6):606-620, June 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
11
-
-
74049090647
-
-
B. X. Chen. Why the Japanese hate the iPhone, 26 Feb. 2009. http: //blog.wired.com/gadgets/2009/02/why-the-iphone.html, accessed 2009-04-11.
-
B. X. Chen. Why the Japanese hate the iPhone, 26 Feb. 2009. http: //blog.wired.com/gadgets/2009/02/why-the-iphone.html, accessed 2009-04-11.
-
-
-
-
13
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
May
-
N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, 10(4):255-268, May 2006.
-
(2006)
Personal and Ubiquitous Computing
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.S.2
-
14
-
-
74049111703
-
-
Electronic Privacy Information Center and Privacy International. Privacy and Human Rights 2006. Electronic Privacy Information Center, Dec. 2007. http://www.privacyinternational.org/article.shtml?cmd[347] =x-347-559458, accessed 2009-05-21.
-
Electronic Privacy Information Center and Privacy International. Privacy and Human Rights 2006. Electronic Privacy Information Center, Dec. 2007. http://www.privacyinternational.org/article.shtml?cmd[347] =x-347-559458, accessed 2009-05-21.
-
-
-
-
15
-
-
74049147628
-
Measuring wireless network usage with the experience sampling method
-
Trentino, Italy, Apr
-
T. Henderson, D. Anthony, and D. Kotz. Measuring wireless network usage with the experience sampling method. In Proceedings of the First Workshop on Wireless Network Measurements, Trentino, Italy, Apr. 2005.
-
(2005)
Proceedings of the First Workshop on Wireless Network Measurements
-
-
Henderson, T.1
Anthony, D.2
Kotz, D.3
-
16
-
-
74049161455
-
The mobile phone and the dynamic between private and public communication: Results of an international exploratory study
-
June
-
J. Höflich. The mobile phone and the dynamic between private and public communication: Results of an international exploratory study. Knowledge, Technology & Policy, 19(2):58-68, June 2006.
-
(2006)
Knowledge, Technology & Policy
, vol.19
, Issue.2
, pp. 58-68
-
-
Höflich, J.1
-
17
-
-
74049103231
-
-
IEEE-SA Standards Board. IEEE Std 802.11d-2001 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications amendment 3: Specification for operation in additional regulatory domains. Tech. rep., IEEE, July 2001.
-
IEEE-SA Standards Board. IEEE Std 802.11d-2001 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications amendment 3: Specification for operation in additional regulatory domains. Tech. rep., IEEE, July 2001.
-
-
-
-
19
-
-
30344486245
-
CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth
-
Oct.-Dec
-
D. Kotz and T. Henderson. CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth. IEEE Pervasive Computing, 4(4):12-14, Oct.-Dec. 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.4
, pp. 12-14
-
-
Kotz, D.1
Henderson, T.2
-
20
-
-
34247381650
-
Opportunistic content distribution in an urban setting
-
Pisa, Italy, Sept
-
J. Leguay, A. Lindgren, J. Scott, T. Friedman, and J. Crowcroft. Opportunistic content distribution in an urban setting. In Proceedings of the ACM SIGCOMM Workshop on Challenged Networks (CHANTS 2006), Pisa, Italy, Sept. 2006.
-
(2006)
Proceedings of the ACM SIGCOMM Workshop on Challenged Networks (CHANTS 2006)
-
-
Leguay, J.1
Lindgren, A.2
Scott, J.3
Friedman, T.4
Crowcroft, J.5
-
21
-
-
74049137671
-
-
P. Lewis. Bluetooth is watching: secret study gives Bath a flavour of Big Brother. The Guardian, 21 July 2008. http: //www.guardian.co.uk/uk/2008/ jul/21/civilliberties.privacy, accessed 2009-04-12.
-
P. Lewis. Bluetooth is watching: secret study gives Bath a flavour of Big Brother. The Guardian, 21 July 2008. http: //www.guardian.co.uk/uk/2008/ jul/21/civilliberties.privacy, accessed 2009-04-12.
-
-
-
-
23
-
-
35048843219
-
WatchMe: Communication and awareness between members of a closely-knit group
-
Nottingham, UK, Sept
-
N. Marmasse, C. Schmandt, and D. Spectre. WatchMe: Communication and awareness between members of a closely-knit group. In Proceedings of Ubicomp, pp 214-231, Nottingham, UK, Sept. 2004.
-
(2004)
Proceedings of Ubicomp
, pp. 214-231
-
-
Marmasse, N.1
Schmandt, C.2
Spectre, D.3
-
24
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
-
Raleigh, NC, USA, Nov
-
E. Miluzzo, N. Lane, K. Fodor, R. Peterson, S. Eisenman, H. Lu, M. Musolesi, X. Zheng, and A. Campbell. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of ACM SenSys 2008, Raleigh, NC, USA, Nov. 2008.
-
(2008)
Proceedings of ACM SenSys 2008
-
-
Miluzzo, E.1
Lane, N.2
Fodor, K.3
Peterson, R.4
Eisenman, S.5
Lu, H.6
Musolesi, M.7
Zheng, X.8
Campbell, A.9
-
26
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
Vienna, Austria, Sept
-
V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In VLDB '07: Proceedings of the 33rd international conference on Very large data bases, pp 531-542, Vienna, Austria, Sept. 2007.
-
(2007)
VLDB '07: Proceedings of the 33rd international conference on Very large data bases
, pp. 531-542
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
27
-
-
0038803996
-
Safe harbors or free frontiers? Privacy and transborder data flows
-
July
-
P. M. Regan. Safe harbors or free frontiers? Privacy and transborder data flows. Journal of Social Issues, 59(2):263-282, July 2003.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 263-282
-
-
Regan, P.M.1
-
28
-
-
42549087242
-
-
J. L. Schenker. The iPhone in Europe - lost in translation. Business Week, 16 Apr. 2008. http://www.businessweek.com/ magazine/content/08-17/ b4081000500950.htm, accessed 2009-04-11.
-
J. L. Schenker. The iPhone in Europe - lost in translation. Business Week, 16 Apr. 2008. http://www.businessweek.com/ magazine/content/08-17/ b4081000500950.htm, accessed 2009-04-11.
-
-
-
-
29
-
-
74049162641
-
-
A. Singer. Conference password sniffing: Legal and ethical issues. ;login:, 30(4):5-9, Aug. 2005.
-
A. Singer. Conference password sniffing: Legal and ethical issues. ;login:, 30(4):5-9, Aug. 2005.
-
-
-
-
30
-
-
74049083098
-
-
C. Soghoian. Researchers could face legal risks for network snooping, 24 July 2008. http://news.cnet.com/8301-13739-3-9997273-46.html, accessed 2009-04-12.
-
C. Soghoian. Researchers could face legal risks for network snooping, 24 July 2008. http://news.cnet.com/8301-13739-3-9997273-46.html, accessed 2009-04-12.
-
-
-
-
32
-
-
84986131117
-
Implications of the new EU directive on data protection for multinational corporations
-
R. M. Walczuch and L. Steeghs. Implications of the new EU directive on data protection for multinational corporations. Information Technology and People, pp 142-162, 2001.
-
(2001)
Information Technology and People
, pp. 142-162
-
-
Walczuch, R.M.1
Steeghs, L.2
-
33
-
-
28044438697
-
Data protection legislation in the United Kingdom
-
June
-
A. Warren and J. Dearnley. Data protection legislation in the United Kingdom. Information, Communication and Society, 8(2):238-263, June 2005.
-
(2005)
Information, Communication and Society
, vol.8
, Issue.2
, pp. 238-263
-
-
Warren, A.1
Dearnley, J.2
|