-
1
-
-
41849093342
-
Online Social Networking as Participatory Surveillance
-
Albrechtslund, A. "Online Social Networking as Participatory Surveillance, " First Monday, (13:3), 2008.
-
(2008)
First Monday
, vol.13
, Issue.3
-
-
Albrechtslund, A.1
-
3
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
in
-
Backstrom, L., Dwork, C., and Kleinberg, J. "Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, " in Proceedings of the 16th Conference on the WWW, 2007.
-
(2007)
Proceedings of the 16th Conference on the WWW
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
4
-
-
0006364798
-
-
In Technology and Privacy: The New Landscape, Agre, P. and Rotenberg, M. (Eds.). MIT Press: Cambridge
-
Bellotti, V. "Design for Privacy in Multimedia Computing and Communications Environments, " In Technology and Privacy: The New Landscape, Agre, P. and Rotenberg, M. (Eds.). MIT Press: Cambridge, 1997.
-
(1997)
Design for Privacy in Multimedia Computing and Communications Environments
-
-
Bellotti, V.1
-
5
-
-
16444368611
-
-
Communications of the ACM
-
Berendt, B., Günther, O., and Spiekermann, S. "Privacy in e-commerce: stated preferences vs. actual behavior, " Communications of the ACM, Volume 48, Number 4, pp. 101-106, 2005.
-
(2005)
Privacy in e-commerce: Stated preferences vs. actual behavior
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Günther, O.2
Spiekermann, S.3
-
8
-
-
49049090050
-
Intra-Application Partitioning of Personal-Data
-
in
-
Borcea, K., Donker, H., Franz, E., Liesebach, K., Wahrig, H. "Intra-Application Partitioning of Personal-Data, " in Proceedings of the Workshop on Privacy-Enhanced Personalization, 2005.
-
(2005)
Proceedings of the Workshop on Privacy-Enhanced Personalization
-
-
Borcea, K.1
Donker, H.2
Franz, E.3
Liesebach, K.4
Wahrig, H.5
-
9
-
-
85048310044
-
-
retrieved March., 2006, Apophenia Blog. September 8
-
Boyd, D. "Facebook's 'Privacy Trainwreck': Exposure, Invasion, and Drama, " Apophenia Blog. September 8. http://www.danah.org/papers/FacebookAndPrivacy.html, 2006, retrieved March 2008.
-
(2008)
Facebook's 'Privacy Trainwreck': Exposure, Invasion, and Drama
-
-
Boyd, D.1
-
10
-
-
35948934463
-
Tactical Memory: The Politics of Openness in the Construction of Memory
-
Braman, S. "Tactical Memory: The Politics of Openness in the Construction of Memory, " First Monday (11:7), 2006.
-
(2006)
First Monday
, vol.11
, Issue.7
-
-
Braman, S.1
-
11
-
-
50249103030
-
-
ENISA Position Paper #1, Giles Hogben (Ed), European Network and Information Security Agency
-
ENISA Position Paper #1, "Security Issues and Recommendations for Social Networks, " Giles Hogben (Ed), European Network and Information Security Agency, 2007.
-
(2007)
Security Issues and Recommendations for Social Networks
-
-
-
12
-
-
84870015741
-
-
retrieved March
-
Facebook Beacon. http://www.Facebook.com/business/?Beacon, retrieved March 2008.
-
(2008)
Facebook Beacon
-
-
-
13
-
-
84870015740
-
-
retrieved December
-
Facebook Beacon, http://www.Facebook.com/business/?Beacon, retrieved December 2007.
-
(2007)
Facebook Beacon
-
-
-
14
-
-
70450236169
-
-
retrieved March
-
Facebook Terms of Use, http://www.Facebook.com/terms.php, retrieved March 2008
-
(2008)
Facebook Terms of Use
-
-
-
15
-
-
84870963789
-
-
retrieved March
-
Facebook Privacy Policy, http://www.Facebook.com/policy.php, retrieved March 2008.
-
(2008)
Facebook Privacy Policy
-
-
-
16
-
-
0037985451
-
Digitizing surveillance: Categorization, Space, Inequality
-
Graham, S. and Wood, D., "Digitizing surveillance: Categorization, Space, Inequality, " Critical Social Policy, (23:2), 2003, pages 227-248
-
(2003)
Critical Social Policy
, vol.23
, Issue.2
, pp. 227-248
-
-
Graham, S.1
Wood, D.2
-
17
-
-
33749016498
-
Information revelation and privacy in online social networks
-
in
-
Gross, R., Acquisti, A., and Heinz, H. J. "Information revelation and privacy in online social networks, " in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005.
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
-
-
Gross, R.1
Acquisti, A.2
Heinz, H.J.3
-
18
-
-
73249124934
-
Multilateral security requirements analysis for preserving privacy in ubiquitous environments
-
in, B., Menasalvas, E. (Eds.)
-
Gürses, S., Berendt, B., Santen, T. "Multilateral security requirements analysis for preserving privacy in ubiquitous environments, " in Proceedings of the UKDU Workshop Berendt, B., Menasalvas, E. (Eds.), 2006, pp. 51-64.
-
(2006)
Proceedings of the UKDU Workshop Berendt
, pp. 51-64
-
-
Gürses, S.1
Berendt, B.2
Santen, T.3
-
20
-
-
1642281602
-
Privacy Enhancing Identity Management
-
Hansen, M., Berlich, P., Camenisch, J., Clauss, S., Pfitzmann, A., Waidner, M. "Privacy Enhancing Identity Management, " Information Security Technical Report, Volume 9, Issue 1, 2004, pp. 35-44.
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clauss, S.4
Pfitzmann, A.5
Waidner, M.6
-
21
-
-
33748544940
-
Network-Based Marketing: Identifying Likely Adopters via Consumer Networks
-
Hill, S., Provost, F., Volinsky, C. "Network-Based Marketing: Identifying Likely Adopters via Consumer Networks, " Statistical Science, (21:2), 2006.
-
(2006)
Statistical Science
, vol.21
, Issue.2
-
-
Hill, S.1
Provost, F.2
Volinsky, C.3
-
22
-
-
19944381365
-
Privacy Policies as Decision-Making Tools: A Usability Evaluation of Online Privacy Notices
-
in
-
Jensen. C. and Potts, C. "Privacy Policies as Decision-Making Tools: A Usability Evaluation of Online Privacy Notices, " in Proceedings of CHI, 2004.
-
(2004)
Proceedings of CHI
-
-
Jensen, C.1
Potts, C.2
-
23
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
in
-
Lederer S., Hong, J., Dey, A., Landay, J. "Personal privacy through understanding and action: Five pitfalls for designers, " in Personal and Ubiquitous Computing, (8:6), 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
-
-
Lederer, S.1
Hong, J.2
Dey, A.3
Landay, J.4
-
24
-
-
84870958238
-
-
2008, November, retrieved in July
-
Li, C., "Close encounter with facebook beacon. " http://blogs.forrester.com/charleneli/2007/11/close-encounter.html, November, 2007, retrieved in July, 2008.
-
(2007)
Close encounter with facebook beacon
-
-
Li, C.1
-
25
-
-
85091951704
-
-
2008, USENIX Workshop on Usability, Psychology, and Security
-
Lipford H. R., Besmer A., and Watson, J., "Understanding Privacy Settings in Facebook with an Audience View, " 2008 USENIX Workshop on Usability, Psychology, and Security, 2008.
-
(2008)
Understanding Privacy Settings in Facebook with an Audience View
-
-
Lipford, H.R.1
Besmer, A.2
Watson, J.3
-
28
-
-
84870960915
-
-
retrieved March 5
-
Myspace Terms of Use. http://www.myspace.com/index.cfm?fuseaction=misc.privacy, retrieved March 5, 2008.
-
(2008)
Myspace Terms of Use
-
-
-
29
-
-
84870961749
-
-
retrieved March 5
-
Myspace Privacy Policy, http://www.myspace.com/index.cfm?fuseaction=misc.terms, retrieved March 5, 2008.
-
(2008)
Myspace Privacy Policy
-
-
-
30
-
-
1842538795
-
Privacy as Contextual Integrity
-
Nissenbaum, H., "Privacy as Contextual Integrity, " Washington Law Review, (79:1), 2004, pp. 119-158.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
32
-
-
70350054627
-
Ubiquitous social networks-opportunities and challenges for privacy aware user modeling
-
in
-
Sören Preibusch, Bettina Hoser, Seda Gürses, Bettina Berendt, "Ubiquitous social networks-opportunities and challenges for privacy aware user modeling, " in Proceedings of the K-DUUM Workshop, 2007.
-
(2007)
Proceedings of the K-DUUM Workshop
-
-
Preibusch, S.1
Hoser, B.2
Gürses, S.3
Berendt, B.4
-
33
-
-
10944244304
-
Privacy Policy and PETs
-
Phillips, D. J. "Privacy Policy and PETs, " New Media and Society, (6:6)2004, pp. 691-706.
-
(2004)
New Media and Society
, vol.6
, Issue.6
, pp. 691-706
-
-
Phillips, D.J.1
-
35
-
-
84870959605
-
-
StudiVZ, retrieved Sept. 1
-
StudiVZ, STUDIVERZEICHNIS, http://www.studivz.net, retrieved Sept. 1, 2008.
-
(2008)
Studiverzeichnis
-
-
-
36
-
-
34250001672
-
What Anyone Can Know: The Privacy Risks of Social Networking Sites
-
Rosenblum, D. "What Anyone Can Know: The Privacy Risks of Social Networking Sites, " IEEE Security and Privacy, Vol. 5, No. 3,2007, pp. 40-49.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 40-49
-
-
Rosenblum, D.1
-
37
-
-
84882630942
-
-
in Advances in Information Security
-
Vaidya, J., Clifton, C., Zhu, M. "Privacy Preserving Data Mining, " (19) in Advances in Information Security, 2006.
-
(2006)
Privacy Preserving Data Mining
, vol.19
-
-
Vaidya, J.1
Clifton, C.2
Zhu, M.3
-
38
-
-
79957658284
-
-
2006, Entry on September 8
-
Zuckerberg, M. Facebook Blog. Entry on September 8, 2006, http://blog.Facebook.com/blog.php?post=2208562130, 2008.
-
(2008)
Facebook Blog
-
-
Zuckerberg, M.1
|