-
1
-
-
84878625439
-
-
Liorean, blog, 2004; http://codingforums.com/showpost.php?p=206569.
-
(2004)
Liorean, Blog
-
-
-
2
-
-
50249141898
-
Inferring privacy information via social relations
-
IEEE CS
-
W. Xu, X. Zhou, and L. Li, "Inferring Privacy Information via Social Relations," Proc. IEEE 24th Int'l Conf. Data Engineering Workshop, IEEE CS, 2008, pp. 525-530; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4498373.
-
(2008)
Proc. IEEE 24th Int'l Conf. Data Engineering Workshop
, pp. 525-530
-
-
Xu, W.1
Zhou, X.2
Li, L.3
-
3
-
-
84878637644
-
New tools to control your experience
-
9 Dec.
-
R. Sanghvi, "New Tools to Control Your Experience," Facebook blog, 9 Dec. 2009; https://www.facebook.com/blog/blog.php?post=196629387130.
-
(2009)
Facebook Blog
-
-
Sanghvi, R.1
-
4
-
-
85016075583
-
Scribd facebook instant personalization is a privacy nightmare
-
30 Sept.
-
P. Ganapati, "Scribd Facebook Instant Personalization Is a Privacy Nightmare," Wired, 30 Sept. 2010; www.wired.com/epicenter/2010/09/scribd- facebook-instant-personalization.
-
(2010)
Wired
-
-
Ganapati, P.1
-
5
-
-
80052895803
-
Facebook in privacy breach
-
17 Oct.
-
E. Steel and G.A. Fowler, "Facebook in Privacy Breach," Wall Street J., 17 Oct. 2010; http://online.wsj.com/article/ SB10001424052702304772804575558484075236968.html.
-
(2010)
Wall Street J.
-
-
Steel, E.1
Fowler, G.A.2
-
6
-
-
79951743080
-
Privacy violations using microtargeted ads: A case study
-
IEEE CS
-
A. Korolova, "Privacy Violations Using Microtargeted Ads: A Case Study," Proc. 10th IEEE Int'l Conf. Data Mining Workshops (ICDMW 10), IEEE CS, 2010, pp. 474-482; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=5693335.
-
(2010)
Proc. 10th IEEE Int'l Conf. Data Mining Workshops (ICDMW 10)
, pp. 474-482
-
-
Korolova, A.1
-
7
-
-
84995488432
-
On the leakage of personally identifiable information via online social networks
-
ACM
-
B. Krishnamurthy and C.E. Wills, "On the Leakage of Personally Identifiable Information via Online Social Networks," Proc. 2nd ACM Workshop Online Social Networks (WOSN 09), ACM, 2009; http://dl.acm.org/ citation.cfm?id=1592665.1592668.
-
(2009)
Proc. 2nd ACM Workshop Online Social Networks (WOSN 09)
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
9
-
-
67650897413
-
When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information
-
J. Grossklags and A. Acquisti, "When 25 Cents Is Too Much: An Experiment on Willingness-to-Sell and Willingness-to-Protect Personal Information," Proc. 6th Workshop Economics of Information Security (WEIS 07), 2007; http://weis2007.econinfosec.org/papers/66.pdf.
-
(2007)
Proc. 6th Workshop Economics of Information Security (WEIS 07)
-
-
Grossklags, J.1
Acquisti, A.2
-
10
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification
-
ACM
-
A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. 5th ACM Conf. Electronic Commerce (EC 04), ACM, 2004; http://portal.acm.org/citation.cfm?id=988772.988777.
-
(2004)
Proc. 5th ACM Conf. Electronic Commerce (EC 04)
-
-
Acquisti, A.1
-
14
-
-
74349102159
-
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network
-
IEEE
-
L.A. Cutillo, R. Molva, and T. Strufe, "Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network," Proc. 3rd Int'l IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 09), IEEE, 2009, pp. 1-6; http://ieeexplore.ieee.org/xpl/ articleDetails.jsp?arnumber=5282446.
-
(2009)
Proc. 3rd Int'l IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 09)
, pp. 1-6
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
16
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
IEEE CS
-
A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," Proc. 29th IEEE Symp. Security and Privacy (SP 08), IEEE CS, 2008, pp. 111-125; http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4531148.
-
(2008)
Proc. 29th IEEE Symp. Security and Privacy (SP 08)
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
17
-
-
12844271558
-
Aligning security and usability
-
DOI 10.1109/MSP.2004.64
-
K.-P. Yee, "Aligning Security and Usability," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 48-55; http://doi.ieeecomputersociety. org/10.1109/MSP.2004.64. (Pubitemid 40168626)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
-
18
-
-
84878638715
-
-
PhD dissertation, Computer Laboratory, Univ. Cambridge
-
J. Anderson, "Privacy Engineering for Social Networks," PhD dissertation, Computer Laboratory, Univ. Cambridge, 2012; www.dspace.cam.ac.uk/ handle/1810/244239.
-
(2012)
Privacy Engineering for Social Networks
-
-
Anderson, J.1
-
19
-
-
65949106243
-
Privacy protection for social networking platforms
-
IEEE
-
A. Felt and D. Evans, "Privacy Protection for Social Networking Platforms," Web 2.0 Security and Privacy (W2SP 08), IEEE, 2008; http://w2spconf.com/2008/papers/s3p1.pdf.
-
(2008)
Web 2.0 Security and Privacy (W2SP 08)
-
-
Felt, A.1
Evans, D.2
|