메뉴 건너뛰기




Volumn 11, Issue 3, 2013, Pages 51-60

Must social networking conflict with privacy?

Author keywords

computer security; data security; information retrieval; professional communication; social network services; technology social factors

Indexed keywords

BUSINESS MODELS; ON-LINE SOCIAL NETWORKS; PROFESSIONAL COMMUNICATION; SOCIAL NETWORK SERVICES; TECHNOLOGY SOCIAL FACTORS;

EID: 84878655310     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.23     Document Type: Article
Times cited : (10)

References (19)
  • 1
    • 84878625439 scopus 로고    scopus 로고
    • Liorean, blog, 2004; http://codingforums.com/showpost.php?p=206569.
    • (2004) Liorean, Blog
  • 2
    • 50249141898 scopus 로고    scopus 로고
    • Inferring privacy information via social relations
    • IEEE CS
    • W. Xu, X. Zhou, and L. Li, "Inferring Privacy Information via Social Relations," Proc. IEEE 24th Int'l Conf. Data Engineering Workshop, IEEE CS, 2008, pp. 525-530; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4498373.
    • (2008) Proc. IEEE 24th Int'l Conf. Data Engineering Workshop , pp. 525-530
    • Xu, W.1    Zhou, X.2    Li, L.3
  • 3
    • 84878637644 scopus 로고    scopus 로고
    • New tools to control your experience
    • 9 Dec.
    • R. Sanghvi, "New Tools to Control Your Experience," Facebook blog, 9 Dec. 2009; https://www.facebook.com/blog/blog.php?post=196629387130.
    • (2009) Facebook Blog
    • Sanghvi, R.1
  • 4
    • 85016075583 scopus 로고    scopus 로고
    • Scribd facebook instant personalization is a privacy nightmare
    • 30 Sept.
    • P. Ganapati, "Scribd Facebook Instant Personalization Is a Privacy Nightmare," Wired, 30 Sept. 2010; www.wired.com/epicenter/2010/09/scribd- facebook-instant-personalization.
    • (2010) Wired
    • Ganapati, P.1
  • 5
    • 80052895803 scopus 로고    scopus 로고
    • Facebook in privacy breach
    • 17 Oct.
    • E. Steel and G.A. Fowler, "Facebook in Privacy Breach," Wall Street J., 17 Oct. 2010; http://online.wsj.com/article/ SB10001424052702304772804575558484075236968.html.
    • (2010) Wall Street J.
    • Steel, E.1    Fowler, G.A.2
  • 6
    • 79951743080 scopus 로고    scopus 로고
    • Privacy violations using microtargeted ads: A case study
    • IEEE CS
    • A. Korolova, "Privacy Violations Using Microtargeted Ads: A Case Study," Proc. 10th IEEE Int'l Conf. Data Mining Workshops (ICDMW 10), IEEE CS, 2010, pp. 474-482; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=5693335.
    • (2010) Proc. 10th IEEE Int'l Conf. Data Mining Workshops (ICDMW 10) , pp. 474-482
    • Korolova, A.1
  • 7
    • 84995488432 scopus 로고    scopus 로고
    • On the leakage of personally identifiable information via online social networks
    • ACM
    • B. Krishnamurthy and C.E. Wills, "On the Leakage of Personally Identifiable Information via Online Social Networks," Proc. 2nd ACM Workshop Online Social Networks (WOSN 09), ACM, 2009; http://dl.acm.org/ citation.cfm?id=1592665.1592668.
    • (2009) Proc. 2nd ACM Workshop Online Social Networks (WOSN 09)
    • Krishnamurthy, B.1    Wills, C.E.2
  • 9
    • 67650897413 scopus 로고    scopus 로고
    • When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information
    • J. Grossklags and A. Acquisti, "When 25 Cents Is Too Much: An Experiment on Willingness-to-Sell and Willingness-to-Protect Personal Information," Proc. 6th Workshop Economics of Information Security (WEIS 07), 2007; http://weis2007.econinfosec.org/papers/66.pdf.
    • (2007) Proc. 6th Workshop Economics of Information Security (WEIS 07)
    • Grossklags, J.1    Acquisti, A.2
  • 10
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in electronic commerce and the economics of immediate gratification
    • ACM
    • A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. 5th ACM Conf. Electronic Commerce (EC 04), ACM, 2004; http://portal.acm.org/citation.cfm?id=988772.988777.
    • (2004) Proc. 5th ACM Conf. Electronic Commerce (EC 04)
    • Acquisti, A.1
  • 16
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • IEEE CS
    • A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," Proc. 29th IEEE Symp. Security and Privacy (SP 08), IEEE CS, 2008, pp. 111-125; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4531148.
    • (2008) Proc. 29th IEEE Symp. Security and Privacy (SP 08) , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 17
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • DOI 10.1109/MSP.2004.64
    • K.-P. Yee, "Aligning Security and Usability," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 48-55; http://doi.ieeecomputersociety. org/10.1109/MSP.2004.64. (Pubitemid 40168626)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1
  • 18
    • 84878638715 scopus 로고    scopus 로고
    • PhD dissertation, Computer Laboratory, Univ. Cambridge
    • J. Anderson, "Privacy Engineering for Social Networks," PhD dissertation, Computer Laboratory, Univ. Cambridge, 2012; www.dspace.cam.ac.uk/ handle/1810/244239.
    • (2012) Privacy Engineering for Social Networks
    • Anderson, J.1
  • 19
    • 65949106243 scopus 로고    scopus 로고
    • Privacy protection for social networking platforms
    • IEEE
    • A. Felt and D. Evans, "Privacy Protection for Social Networking Platforms," Web 2.0 Security and Privacy (W2SP 08), IEEE, 2008; http://w2spconf.com/2008/papers/s3p1.pdf.
    • (2008) Web 2.0 Security and Privacy (W2SP 08)
    • Felt, A.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.