메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Privacy design in online social networks: Learning from privacy breaches and community feedback;Conception de la vie privée dans les réseaux sociaux numériques: Apprentissage suite à des manquements et aux retours de la communauté

Author keywords

Privacy; Privacy design; Privacy negotiation; Social software; Systems analysis and design development

Indexed keywords

COMMUNITY INVOLVEMENT; ONLINE SOCIAL NETWORKS; PRIVACY BREACHES; PRIVACY DESIGN; SECURITY ANALYSIS; SOCIAL SOFTWARE; SYSTEMS ANALYSIS AND DESIGN;

EID: 84870973762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (38)
  • 1
    • 41849093342 scopus 로고    scopus 로고
    • Online Social Networking as Participatory Surveillance
    • Albrechtslund, A. "Online Social Networking as Participatory Surveillance, " First Monday, (13:3), 2008.
    • (2008) First Monday , vol.13 , Issue.3
    • Albrechtslund, A.1
  • 3
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • in
    • Backstrom, L., Dwork, C., and Kleinberg, J. "Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, " in Proceedings of the 16th Conference on the WWW, 2007.
    • (2007) Proceedings of the 16th Conference on the WWW
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 10
    • 35948934463 scopus 로고    scopus 로고
    • Tactical Memory: The Politics of Openness in the Construction of Memory
    • Braman, S. "Tactical Memory: The Politics of Openness in the Construction of Memory, " First Monday (11:7), 2006.
    • (2006) First Monday , vol.11 , Issue.7
    • Braman, S.1
  • 11
    • 50249103030 scopus 로고    scopus 로고
    • ENISA Position Paper #1, Giles Hogben (Ed), European Network and Information Security Agency
    • ENISA Position Paper #1, "Security Issues and Recommendations for Social Networks, " Giles Hogben (Ed), European Network and Information Security Agency, 2007.
    • (2007) Security Issues and Recommendations for Social Networks
  • 12
    • 84870015741 scopus 로고    scopus 로고
    • retrieved March
    • Facebook Beacon. http://www.Facebook.com/business/?Beacon, retrieved March 2008.
    • (2008) Facebook Beacon
  • 13
    • 84870015740 scopus 로고    scopus 로고
    • retrieved December
    • Facebook Beacon, http://www.Facebook.com/business/?Beacon, retrieved December 2007.
    • (2007) Facebook Beacon
  • 14
    • 70450236169 scopus 로고    scopus 로고
    • retrieved March
    • Facebook Terms of Use, http://www.Facebook.com/terms.php, retrieved March 2008
    • (2008) Facebook Terms of Use
  • 15
    • 84870963789 scopus 로고    scopus 로고
    • retrieved March
    • Facebook Privacy Policy, http://www.Facebook.com/policy.php, retrieved March 2008.
    • (2008) Facebook Privacy Policy
  • 16
    • 0037985451 scopus 로고    scopus 로고
    • Digitizing surveillance: Categorization, Space, Inequality
    • Graham, S. and Wood, D., "Digitizing surveillance: Categorization, Space, Inequality, " Critical Social Policy, (23:2), 2003, pages 227-248
    • (2003) Critical Social Policy , vol.23 , Issue.2 , pp. 227-248
    • Graham, S.1    Wood, D.2
  • 18
    • 73249124934 scopus 로고    scopus 로고
    • Multilateral security requirements analysis for preserving privacy in ubiquitous environments
    • in, B., Menasalvas, E. (Eds.)
    • Gürses, S., Berendt, B., Santen, T. "Multilateral security requirements analysis for preserving privacy in ubiquitous environments, " in Proceedings of the UKDU Workshop Berendt, B., Menasalvas, E. (Eds.), 2006, pp. 51-64.
    • (2006) Proceedings of the UKDU Workshop Berendt , pp. 51-64
    • Gürses, S.1    Berendt, B.2    Santen, T.3
  • 21
    • 33748544940 scopus 로고    scopus 로고
    • Network-Based Marketing: Identifying Likely Adopters via Consumer Networks
    • Hill, S., Provost, F., Volinsky, C. "Network-Based Marketing: Identifying Likely Adopters via Consumer Networks, " Statistical Science, (21:2), 2006.
    • (2006) Statistical Science , vol.21 , Issue.2
    • Hill, S.1    Provost, F.2    Volinsky, C.3
  • 22
    • 19944381365 scopus 로고    scopus 로고
    • Privacy Policies as Decision-Making Tools: A Usability Evaluation of Online Privacy Notices
    • in
    • Jensen. C. and Potts, C. "Privacy Policies as Decision-Making Tools: A Usability Evaluation of Online Privacy Notices, " in Proceedings of CHI, 2004.
    • (2004) Proceedings of CHI
    • Jensen, C.1    Potts, C.2
  • 23
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • in
    • Lederer S., Hong, J., Dey, A., Landay, J. "Personal privacy through understanding and action: Five pitfalls for designers, " in Personal and Ubiquitous Computing, (8:6), 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6
    • Lederer, S.1    Hong, J.2    Dey, A.3    Landay, J.4
  • 24
    • 84870958238 scopus 로고    scopus 로고
    • 2008, November, retrieved in July
    • Li, C., "Close encounter with facebook beacon. " http://blogs.forrester.com/charleneli/2007/11/close-encounter.html, November, 2007, retrieved in July, 2008.
    • (2007) Close encounter with facebook beacon
    • Li, C.1
  • 28
    • 84870960915 scopus 로고    scopus 로고
    • retrieved March 5
    • Myspace Terms of Use. http://www.myspace.com/index.cfm?fuseaction=misc.privacy, retrieved March 5, 2008.
    • (2008) Myspace Terms of Use
  • 29
    • 84870961749 scopus 로고    scopus 로고
    • retrieved March 5
    • Myspace Privacy Policy, http://www.myspace.com/index.cfm?fuseaction=misc.terms, retrieved March 5, 2008.
    • (2008) Myspace Privacy Policy
  • 30
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as Contextual Integrity
    • Nissenbaum, H., "Privacy as Contextual Integrity, " Washington Law Review, (79:1), 2004, pp. 119-158.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119-158
    • Nissenbaum, H.1
  • 32
    • 70350054627 scopus 로고    scopus 로고
    • Ubiquitous social networks-opportunities and challenges for privacy aware user modeling
    • in
    • Sören Preibusch, Bettina Hoser, Seda Gürses, Bettina Berendt, "Ubiquitous social networks-opportunities and challenges for privacy aware user modeling, " in Proceedings of the K-DUUM Workshop, 2007.
    • (2007) Proceedings of the K-DUUM Workshop
    • Preibusch, S.1    Hoser, B.2    Gürses, S.3    Berendt, B.4
  • 33
    • 10944244304 scopus 로고    scopus 로고
    • Privacy Policy and PETs
    • Phillips, D. J. "Privacy Policy and PETs, " New Media and Society, (6:6)2004, pp. 691-706.
    • (2004) New Media and Society , vol.6 , Issue.6 , pp. 691-706
    • Phillips, D.J.1
  • 35
    • 84870959605 scopus 로고    scopus 로고
    • StudiVZ, retrieved Sept. 1
    • StudiVZ, STUDIVERZEICHNIS, http://www.studivz.net, retrieved Sept. 1, 2008.
    • (2008) Studiverzeichnis
  • 36
    • 34250001672 scopus 로고    scopus 로고
    • What Anyone Can Know: The Privacy Risks of Social Networking Sites
    • Rosenblum, D. "What Anyone Can Know: The Privacy Risks of Social Networking Sites, " IEEE Security and Privacy, Vol. 5, No. 3,2007, pp. 40-49.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 40-49
    • Rosenblum, D.1
  • 38
    • 79957658284 scopus 로고    scopus 로고
    • 2006, Entry on September 8
    • Zuckerberg, M. Facebook Blog. Entry on September 8, 2006, http://blog.Facebook.com/blog.php?post=2208562130, 2008.
    • (2008) Facebook Blog
    • Zuckerberg, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.