-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the Facebook
-
Danezis G, Golle P (eds), Springer, New York
-
Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P (eds) Privacy enhancing technologies. LNCS, vol 4258. Springer, New York, pp 36-58
-
(2006)
Privacy Enhancing Technologies. LNCS
, vol.4258
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
2
-
-
67650500737
-
Predicting social security numbers from public dat
-
Acquisti A, Gross R (2009) Predicting social security numbers from public data. Proc Nat Acad Sci 106(27):10975-10980
-
(2009)
Proc Nat Acad Sci
, vol.106
, Issue.27
, pp. 10975-10980
-
-
Acquisti, A.1
Gross, R.2
-
3
-
-
84898001382
-
SPION deliverable 2.1 State of the art
-
K.U. Leuven, Belgium
-
Acquisti A, Balsa E, Berendt B, Clarke D, DeWolf R, Diaz C, Gao B, Gürses SF, Kuczerawy A, Pierson J, Piessens F, Sayaf R, Schellens T, Stutzman F, Van Alsenoy B, Vanderhoven E (2011) SPION deliverable 2.1 State of the art. COSIC Internal Technical Report, K.U. Leuven, Belgium. http://www.cosic. esat.kuleuven.be/publications/article-2077.pdf
-
(2011)
COSIC Internal Technical Report
-
-
Acquisti, A.1
Balsa, E.2
Berendt, B.3
Clarke, D.4
Dewolf, R.5
Diaz, C.6
Gao, B.7
Gürses, S.F.8
Kuczerawy, A.9
Pierson, J.10
Piessens, F.11
Sayaf, R.12
Schellens, T.13
Stutzman, F.14
Van Alsenoy, B.15
Vanderhoven, E.16
-
4
-
-
0041783510
-
Privacy-preserving data mining
-
ACM, Dallas
-
Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: SIGMOD conference. ACM, Dallas, pp 439-450
-
(2000)
SIGMOD Conference
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
80052799499
-
A general survey of privacy-preserving data mining models and algorithms
-
Aggarwal CC, Yu PS (eds), Springer, New York
-
Aggarwal CC, Yu PS (2008a) A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer, New York, pp 11-51
-
(2008)
Privacy-preserving Data Mining: Models and Algorithms
, pp. 11-51
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
7
-
-
0242674432
-
Hippocratic databases
-
Morgan Kaufmann, San Francisco
-
Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic databases. In: VLDB. Morgan Kaufmann, San Francisco, pp 143-154
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
9
-
-
53449102514
-
Alambic: A privacy-preserving recommender system for electronic commerce
-
A?meur E, Brassard G, Fernandez JM, Onana FSM (2008) Alambic: a privacy-preserving recommender system for electronic commerce. Int J Inf Secur 7(5):307-334
-
(2008)
Int J Inf Secur
, vol.7
, Issue.5
, pp. 307-334
-
-
Ameur, E.1
Brassard, G.2
Fernandez, J.M.3
Fsm, O.4
-
11
-
-
84898014222
-
-
Initiative for mental health in professional sports
-
Ärztebla T T, (2011) Initiative f?r psychische Gesundheit im Leistungssport (Initiative for mental health in professional sports). http://www.aerzteblatt.de/nachrichten/46692/Initiative-fr-psychische-Gesundheit- im-Leistungssport.htm
-
(2011)
Initiative für Psychische Gesundheit im Leistungssport
-
-
Ärztebla, T.T.1
-
13
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
Williamson CL, Zurko ME, Patel-Schneider PF, Shenoy PJ (eds), ACM, Ithaca
-
Backstrom L, Dwork C, Kleinberg JM (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Williamson CL, Zurko ME, Patel-Schneider PF, Shenoy PJ (eds) WWW. ACM, Ithaca , pp 181-190
-
(2007)
WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.M.3
-
14
-
-
84897980497
-
Issues with privacy preservation in query log mining
-
Ferrari E, Bonchi F (eds), Chapman & Hall/CRC Press, Boca Raton
-
Baeza-Yates R, Jones R, Poblete B, Spiliopoulou M (2010) Issues with privacy preservation in query log mining. In: Ferrari E, Bonchi F (eds) Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & Hall/CRC Press, Boca Raton
-
(2010)
Privacy-aware Knowledge Discovery: Novel Applications and New Techniques
-
-
Baeza-Yates, R.1
Jones, R.2
Poblete, B.3
Spiliopoulou, M.4
-
15
-
-
65449127268
-
-
New York Times, New York BBC News, 2008 Timeline: child benefits records loss
-
Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. New York Times, New York BBC News (2008) Timeline: child benefits records loss. http://news.bbc.co.uk/2/hi/7104368.stm
-
A Face Is Exposed for AOL Searcher No, 4417749
, vol.2006
-
-
Barbaro, M.1
Zeller, T.2
-
16
-
-
16444368611
-
Privacy in e-commerce: Stated preferences vs. Actual behavior
-
Berendt B, GüntherO, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101-106
-
(2005)
Commun ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Günther, O.2
Spiekermann, S.3
-
17
-
-
42649122624
-
Aprivacy-protecting business-analytics service for online transactions
-
Berendt B, Preibusch S, TeltzrowM (2008) Aprivacy-protecting business-analytics service for online transactions. Int J Electron Commer 12(3):115-150
-
(2008)
Int J Electron Commer
, vol.12
, Issue.3
, pp. 115-150
-
-
Berendt, B.1
Preibusch, S.2
Teltzrow, M.3
-
18
-
-
80052068951
-
Examining users? Attitude towards privacy preserving collaborative filtering
-
Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (eds)
-
Berkovsky S, Borisov N, Eytani Y, Kuflik T, Ricci F (2007) Examining users? attitude towards privacy preserving collaborative filtering. In: Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (eds) Proceedings of the workshop on data mining for user modelling at UM 2007. http://vasarely. wiwi.hu-berlin.de/DM.UM07/Proceedings/DM.UM07-proceedings.pdf
-
(2007)
Proceedings of the Workshop on Data Mining for User Modelling at UM
, vol.2007
-
-
Berkovsky, S.1
Borisov, N.2
Eytani, Y.3
Kuflik, T.4
Ricci, F.5
-
19
-
-
77951144748
-
A survey of quantification of privacy preserving data mining algorithms
-
Aggarwal CC, Yu PS (eds), Springer, New York
-
Bertino E, Lin D, JiangW(2008) A survey of quantification of privacy preserving data mining algorithms. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer, New York, pp 181-200
-
(2008)
Privacy-preserving Data Mining: Models and Algorithms
, pp. 181-200
-
-
Bertino, E.1
Lin, D.2
Jiang, W.3
-
20
-
-
84878528535
-
The problem of conflicting social spheres: Effects of network structure on experienced tension in social network sites
-
Binder J, Howes A, Sutcliffe AG (2009) The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In: CHI, ACM, pp 965-974
-
(2009)
CHI, ACM
, pp. 965-974
-
-
Binder, J.1
Howes, A.2
Sutcliffe, A.G.3
-
21
-
-
0346762517
-
Anewlook at trade secret law: Doctrine in search of justification
-
BoneRG (1998) Anewlook at trade secret law: doctrine in search of justification. Calif LawRev 86(2):241-313
-
(1998)
Calif LawRev
, vol.86
, Issue.2
, pp. 241-313
-
-
Bone, R.G.1
-
22
-
-
79955854747
-
The privacy jungle: On the market for data protection in social networks
-
Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: WEIS 2009, http://preibusch.de/publications/ socialnetworks/privacyjungledataset.htm
-
(2009)
WEIS 2009
-
-
Bonneau, J.1
Preibusch, S.2
-
24
-
-
37249053884
-
Social network sites: Definition, history and scholarship
-
boyd D, Ellison N (2007) Social network sites: definition, history and scholarship. J Comput Mediat Commun 13(1), http://jcmc.indiana.edu/vol13/issue1/ boyd.ellison.html
-
(2007)
J Comput Mediat Commun
, vol.13
, Issue.1
-
-
Boyd, D.1
Ellison, N.2
-
25
-
-
84897980053
-
Profiting from untrusted parties in web-based applications
-
LNCS, Springer
-
Boyens C, Fischmann M (2003) Profiting from untrusted parties in web-based applications. In: EC-Web. LNCS, Springer, vol 2738, pp 216-226
-
(2003)
EC-Web
, vol.2738
, pp. 216-226
-
-
Boyens, C.1
Fischmann, M.2
-
26
-
-
84897987679
-
-
Bundesverfassungsgericht, Oktober 1983- 1 BvR 209, 269, 362, 420, 440, 484/83 in den Verfahren über die Verfassungsbeschwerden
-
Bundesverfassungsgericht (1983) BVerfGE 65, 1-Volksz?hlung. Urteil des Ersten Senats vom 15. Dezember 1983 auf die mündliche Verhandlung vom 18. und 19. Oktober 1983- 1 BvR 209, 269, 362, 420, 440, 484/83 in den Verfahren über die Verfassungsbeschwerden. http://www.telemedicus.info/urteile/ Datenschutzrecht/88-BVerfG-Az-1-BvR-209,-269,-362, -420,-440,-48483- Volkszaehlungsurteil.html
-
(1983)
BVerfGE 65, 1-Volksz?hlung. Urteil des Ersten Senats Vom 15. Dezember 1983 Auf Die Mündliche Verhandlung Vom 18. und 19
, vol.18
-
-
-
28
-
-
77958063401
-
Three naive Bayes approaches for discrimination-free classification
-
Calders T, Verwer S (2010) Three naive Bayes approaches for discrimination-free classification. Data Min Knowl Discov 21(2):277-292
-
(2010)
Data Min Knowl Discov
, vol.21
, Issue.2
, pp. 277-292
-
-
Calders, T.1
Verwer, S.2
-
29
-
-
67049154037
-
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted dat
-
LNCS, Springer, New York
-
Camenisch J, Kohlweiss M, Rial A, Sheedy C (2009) Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Public key cryptography. LNCS, vol 5443. Springer, New York, pp 196-214
-
(2009)
Public Key Cryptography
, vol.5443
, pp. 196-214
-
-
Camenisch, J.1
Kohlweiss, M.2
Rial, A.3
Sheedy, C.4
-
30
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
ACM
-
Canny JF (2002) Collaborative filtering with privacy via factor analysis. In: SIGIR. ACM, pp 238-245
-
(2002)
SIGIR
, pp. 238-245
-
-
Canny, J.F.1
-
32
-
-
84897980750
-
Privacy issues in web-based social networks
-
Ferrari E, Bonchi F (2010). Chapman & Hall/ CRC Press, Boca Raton
-
Carminati B, Ferrari E, Kantarcioglu M, Thuraisingham B (2010) Privacy issues in web-based social networks. In: Ferrari E, Bonchi F (2010) Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & Hall/CRC Press, Boca Raton
-
(2010)
Privacy-aware Knowledge Discovery: Novel Applications and New Techniques
-
-
Carminati, B.1
Ferrari, E.2
Kantarcioglu, M.3
Thuraisingham, B.4
-
33
-
-
0032201622
-
Private information retrieval
-
Chor B, Kushilevitz E, Goldreich O, SudanM (1998) Private information retrieval. J ACM 45(6):965-981
-
(1998)
J ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
34
-
-
78149348689
-
K-anonymous data mining: A survey
-
Aggarwal CC, Yu PS (eds), Springer, New York
-
Ciriani V, di Vimercati SDC, Foresti S, Samarati P (2008) k-anonymous data mining: a survey. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer, New York, pp 103-134
-
(2008)
Privacy-preserving Data Mining: Models and Algorithms
, pp. 103-134
-
-
Ciriani, V.1
Di Vimercati, S.D.C.2
Foresti, S.3
Samarati, P.4
-
36
-
-
84897986672
-
Judgment of the court of 6 November 2003
-
Court of Justice
-
Court of Justice (2003) Judgment of the court of 6 November 2003. Criminal proceedings against Bodil Lindqvist. http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:62001J0101:EN:HTML CRISP-DM (2000) CRISP-DM 1.0 Step-by-step data mining guide. http://www.spss.ch/upload/ 1107356429CrispDM1.0.pdf
-
(2003)
Criminal Proceedings Against Bodil Lindqvist
-
-
-
37
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius T (1977) Towards a methodology for statistical disclosure control. Stat Tidskrift 15:429-444
-
(1977)
Stat Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
38
-
-
50249171823
-
A survey of anonymous communication channels
-
Microsoft Research
-
Danezis G, Diaz C (2008) A survey of anonymous communication channels. Tech. Rep.MSR-TR-2008-35, Microsoft Research
-
(2008)
Tech. Rep.MSR-TR-2008-35
-
-
Danezis, G.1
Diaz, C.2
-
39
-
-
38149082680
-
Efficient negative databases from cryptographic hash functions
-
LNCS, Springer, New York
-
Danezis G, Díaz C, Faust S, K?sper E, Troncoso C, Preneel B (2007) Efficient negative databases from cryptographic hash functions. In: ISC. LNCS, vol 4779, Springer, New York, pp 423-436
-
(2007)
ISC
, vol.4779
, pp. 423-436
-
-
Danezis, G.1
Díaz, C.2
Faust, S.3
Ksper, E.4
Troncoso, C.5
Preneel, B.6
-
43
-
-
38049048780
-
A three-dimensional conceptual framework for database privacy
-
LNCS, Springer, New York
-
Domingo-Ferrer J (2007) A three-dimensional conceptual framework for database privacy. In: Secure data management. LNCS, vol 4721. Springer, New York, pp 193-202
-
(2007)
Secure Data Management
, vol.4721
, pp. 193-202
-
-
Domingo-Ferrer, J.1
-
44
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
IEEE Computer Society
-
Domingo-Ferrer J, Torra V (2008) A critique of k-anonymity and some of its enhancements. In: ARES 2008. IEEE Computer Society, pp 990-993
-
(2008)
ARES 2008
, pp. 990-993
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
46
-
-
0003039571
-
The impact of legalized abortion on crime
-
Donohue J, Levitt S (2001) The impact of legalized abortion on crime. Q J Econ 116(2):379-420
-
(2001)
Q J Econ
, vol.116
, Issue.2
, pp. 379-420
-
-
Donohue, J.1
Levitt, S.2
-
48
-
-
33746335051
-
Differential privacy
-
Bugliesi M, Preneel B, Sassone V, Wegener I (eds), Springer, New York
-
Dwork C (2006) Differential privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds) ICALP (2), LNCS. vol 4052. Springer, New York , pp 1-12
-
(2006)
ICALP (2), LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
49
-
-
70349305273
-
Differential privacy: A survey of results
-
LNCS, Springer, New York
-
Dwork C (2008) Differential privacy: a survey of results. In: TAMC. LNCS, vol 4978. Springer, New York, pp 1-19
-
(2008)
TAMC
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
52
-
-
84898016755
-
-
Electronic Privacy Information Center
-
Electronic Privacy Information Center (2010a) Automated targeting system. http://epic.org/privacy/travel/ ats/
-
(2010)
Automated Targeting System
-
-
-
53
-
-
84897971210
-
-
Electronic Privacy Information Center
-
Electronic Privacy Information Center (2010b) Netflix cancels contest over privacy concerns. http://epic. org/2010/03/netflix-cancels-contest-over-p. html
-
(2010)
Netflix Cancels Contest over Privacy Concerns
-
-
-
54
-
-
84898009266
-
-
Electronic Privacy Information Center
-
Electronic Privacy Information Center (2011a) Facebook privacy. http://epic.org/privacy/facebook/
-
(2011)
Facebook Privacy
-
-
-
55
-
-
84897987959
-
-
Electronic Privacy Information Center
-
Electronic Privacy Information Center (2011b) In re Facebook. http://epic.org/privacy/inrefacebook/
-
(2011)
Re Facebook
-
-
-
56
-
-
84897983020
-
Privacy?
-
Electronic Privacy Information Center
-
Electronic Privacy Information Center (2011c) Privacy? Proposed Google/DoubleClick deal. http://epic. org/privacy/ftc/google/
-
(2011)
Proposed Google/DoubleClick Deal
-
-
-
57
-
-
84865183578
-
-
Electronic Privacy Information Center (n.d.)
-
Electronic Privacy Information Center (n.d.) EPIC online guide to practical privacy tools. http://epic.org/ privacy/tools.html
-
EPIC Online Guide to Practical Privacy Tools
-
-
-
62
-
-
84898001670
-
-
European Court of Human Rights, Germany.ECHR115(2011)
-
European Court of Human Rights (2011) European Court of Human Rights: violation of freedom of expression in caseHeinisch v. Germany.ECHR115 (2011). http://human-rights-convention.org/2011/07/22/ european-court-of-human-rights- violation-of-freedom-of-expression-in-case-heinisch-v-germany/
-
(2011)
European Court of Human Rights: Violation of Freedom of Expression in CaseHeinisch v
-
-
-
63
-
-
0035841472
-
Ethical issues in qualitative research on internet communities
-
Eysenbach G, Till JE (2001) Ethical issues in qualitative research on internet communities. Br Med J 323:1103-1105
-
(2001)
Br Med J
, vol.323
, pp. 1103-1105
-
-
Eysenbach, G.1
Till, J.E.2
-
64
-
-
0030270991
-
Data mining and knowledge discovery: Making sense out of data
-
Fayyad UM (1996) Data mining and knowledge discovery: making sense out of data. IEEE Expert 11(5):20-25
-
(1996)
IEEE Expert
, vol.11
, Issue.5
, pp. 20-25
-
-
Fayyad, U.M.1
-
66
-
-
84898004714
-
Are IP addresses
-
Fleischer P (2008) Are IP addresses "personal data" http://peterfleischer.blogspot.com/2007/02/are-ip-addr esses-personal-data.html
-
(2008)
Personal Data?
-
-
Fleischer, P.1
-
67
-
-
33750357681
-
You are what you say: Privacy risks of public mentions
-
ACM
-
Frankowski D, Cosley D, Sen S, Terveen LG, Riedl J (2006) You are what you say: privacy risks of public mentions. In: SIGIR. ACM, pp 565-572
-
(2006)
SIGIR
, pp. 565-572
-
-
Frankowski, D.1
Cosley, D.2
Sen, S.3
Terveen, L.G.4
Riedl, J.5
-
69
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey on recent developments. ACM Comput Surv 42(4)
-
(2010)
ACM Comput Surv
, vol.42
, pp. 4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
71
-
-
84897979271
-
-
GermanWorking Group on Data Retention (AK Vorrat) (n.d.)
-
GermanWorking Group on Data Retention (AK Vorrat) (n.d.) Pros and cons of data retention. http://www. vorratsdatenspeicherung.de/content/view/83/87/lang, en/
-
Pros and Cons of Data Retention
-
-
-
72
-
-
84979522519
-
Privacy-enhancing technologies for the internet III: Ten years later
-
Goldberg I (2007) Privacy-enhancing technologies for the internet III: ten years later. In: Digital privacy: theory, technologies, and practices, Auerbach, pp 3-18, http://www.cypherpunks.ca/iang/pubs/pet3. pdf
-
(2007)
Digital Privacy: Theory, Technologies, and Practices, Auerbach
, pp. 3-18
-
-
Goldberg, I.1
-
73
-
-
2542498719
-
International infectious disease law
-
Revision of the World Health Organization?s international health regulations
-
Gostin LO (2004) International infectious disease law. Revision of the World Health Organization?s international health regulations. J Am Med Assoc 291(21):2623-2627
-
(2004)
J Am Med Assoc
, vol.291
, Issue.21
, pp. 2623-2627
-
-
Gostin, L.O.1
-
74
-
-
56349121964
-
Towards the development of privacy-aware systems
-
Guarda P, Zannone N (2009) Towards the development of privacy-aware systems. Inf Softw Technol 51(2):337-350
-
(2009)
Inf Softw Technol
, vol.51
, Issue.2
, pp. 337-350
-
-
Guarda, P.1
Zannone, N.2
-
77
-
-
84864263741
-
PETs in the surveillance society: A critical review of the potentials and limitations of the privacy as confidentiality paradigm
-
Gutwirth S, Poullet Y, De Hert P (eds), Springer, Dordrecht
-
Gürses S, Berendt B (2010) PETs in the surveillance society: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. In: Gutwirth S, Poullet Y, De Hert P (eds) Data protection in a profiled world. Springer, Dordrecht , pp 301-321
-
(2010)
Data Protection in A Profiled World
, pp. 301-321
-
-
Gürses, S.1
Berendt, B.2
-
78
-
-
84864240744
-
The social web and privacy: Practices, reciprocity and conflict detection in social networks
-
Ferrari E, Bonchi F (eds), Chapman & Hall/CRC Press, Boca Raton
-
Gürses S, Berendt B (2010b) The social web and privacy: practices, reciprocity and conflict detection in social networks. In: Ferrari E, Bonchi F (eds) Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & Hall/CRC Press, Boca Raton
-
(2010)
Privacy-aware Knowledge Discovery: Novel Applications and New Techniques
-
-
Gürses, S.1
Berendt, B.2
-
80
-
-
84870973762
-
Privacy design in online social networks: Learning from privacy breaches and community feedback
-
ACM
-
Gürses S, Rizk R, GüntherO(2008) Privacy design in online social networks: learning from privacy breaches and community feedback. In: ICIS. ACM
-
(2008)
ICIS
-
-
Gürses, S.1
Rizk, R.2
Günther, O.3
-
82
-
-
77950902501
-
Butler lies: Awareness, deception and design
-
ACM
-
Hancock JT, Birnholtz JP, Bazarova NN, Guillory J, Perlin J, Amos B (2009) Butler lies: awareness, deception and design. In: CHI. ACM, pp 517-526
-
(2009)
CHI
, pp. 517-526
-
-
Hancock, J.T.1
Birnholtz, J.P.2
Bazarova, N.N.3
Guillory, J.4
Perlin, J.5
Amos, B.6
-
83
-
-
70350579818
-
Linkage control-integrating the essence of privacy protection into identity management
-
HansenM(2008) Linkage control-integrating the essence of privacy protection into identity management. In: Proceedings of eChallenges. pp 1585-1592
-
(2008)
Proceedings of EChallenges.
, pp. 1585-1592
-
-
Hansen, M.1
-
84
-
-
84861433530
-
Private analysis of network data
-
Ferrari E, Bonchi F (eds), Chapman & Hall/CRC Press, Boca Raton
-
Hay M, Miklau G, Jensen D (2010) Private analysis of network data. In: Ferrari E, Bonchi F (eds) Privacyaware knowledge discovery: novel applications and new techniques. Chapman & Hall/CRC Press, Boca Raton
-
(2010)
Privacyaware Knowledge Discovery: Novel Applications and New Techniques
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
-
85
-
-
34248656127
-
Privacy and identity
-
Claes E, Duff A, Gutwirth S (eds), Intersentia, Antwerp
-
Hildebrandt M (2006) Privacy and identity. In: Claes E, Duff A, Gutwirth S (eds) Privacy and the criminal law. Intersentia, Antwerp , pp 43-58
-
(2006)
Privacy and the Criminal Law
, pp. 43-58
-
-
Hildebrandt, M.1
-
87
-
-
85014297149
-
-
Morgan Kaufman, San Francisco
-
Hornick MF, Marcade E, Venkayala S (2007) Java data mining: strategy, standard, and practice. Morgan Kaufman, San Francisco
-
(2007)
Java Data Mining: Strategy, Standard, and Practice
-
-
Hornick, M.F.1
Marcade, E.2
Venkayala, S.3
-
88
-
-
35348815641
-
Demographic prediction based on user?s browsing behavior
-
ACM
-
Hu J, Zeng HJ, Li H, Niu C, Chen Z (2007) Demographic prediction based on user?s browsing behavior. In: WWW. ACM, pp 151-160
-
(2007)
WWW
, pp. 151-160
-
-
Hu, J.1
Zeng, H.J.2
Li, H.3
Niu, C.4
Chen, Z.5
-
89
-
-
84897981862
-
Gesetz zur Verhütung und Bek?mpfung von Infektionskrankheiten beim Menschen
-
Infektionsschutzgesetz
-
Infektionsschutzgesetz (2001) Gesetz zur Verhütung und Bek?mpfung von Infektionskrankheiten beim Menschen (Law for the avoidance and fighting of infectious human diseases). http://www. gesetze-im-internet.de/bundesrecht/ifsg/ gesamt.pdf
-
(2001)
Law for the Avoidance and Fighting of Infectious Human Diseases
-
-
-
90
-
-
0001009493
-
Internet therapy and self help groups-The pros and cons
-
Academic Press, San Diego
-
King SA, Moreggi D (1998) Internet therapy and self help groups-the pros and cons. In: Gackenbach JPsychology and the Internet. Academic Press, San Diego
-
(1998)
Gackenbach JPsychology and the Internet
-
-
King, S.A.1
Moreggi, D.2
-
91
-
-
84897995757
-
Glossary of terms
-
Korolova A, Kenthapadi K, Mishra N, Ntoulas A, 2009 Releasing search queries and clicks privately
-
Kohavi R, Provost F (1998) Glossary of terms. http://ai.stanford.edu/ ~ronnyk/glossary.html Korolova A, Kenthapadi K, Mishra N, Ntoulas A (2009) Releasing search queries and clicks privately. In: WWW. pp 171-180
-
(1998)
WWW
, pp. 171-180
-
-
Kohavi, R.1
Provost, F.2
-
92
-
-
19944367736
-
Personal privacy through understanding and personal privacy through understanding and action: Five pitfalls for designers
-
Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and personal privacy through understanding and action: five pitfalls for designers. Pers Ubiq Comput 8(6):440-454
-
(2004)
Pers Ubiq Comput
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
93
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
IEEE
-
Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE. IEEE, pp 106-115
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
95
-
-
84974555530
-
Privacy preserving data mining
-
LNCS, Springer, New York
-
Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: CRYPTO. LNCS, vol 1880. Springer, New York, pp 36-54
-
(2000)
CRYPTO
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
96
-
-
85091951704
-
Understanding privacy settings in facebook with an audience view
-
USENIX Association
-
Lipford HR, Besmer A, Watson J (2008) Understanding privacy settings in Facebook with an audience view. In: UPSEC?08: proceedings of the 1st conference on usability, psychology, and security. USENIX Association, pp 1-8
-
(2008)
UPSEC?08: Proceedings of the 1st conference on usability, psychology, and security
, pp. 1-8
-
-
Lipford, H.R.1
Besmer, A.2
Watson, J.3
-
97
-
-
84893412531
-
Of men, women, and computers: Sata-driven gender modeling for improved user interfaces
-
Liu H,Mihalcea R (2007) Of men, women, and computers: data-driven gender modeling for improved user interfaces. In: ICWSM, pp 121-128
-
(2007)
ICWSM
, pp. 121-128
-
-
Liu, H.1
Mihalcea, R.2
-
102
-
-
5144226528
-
Privacy mirrors: Understanding and shaping socio-technical ubiquitous computing
-
Georgia Institute of Technology, USA
-
Nguyen DH, Mynatt E (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing. Technical Report GIT-GVU-02-16, Georgia Institute of Technology, USA http://smartech. gatech.edu/handle/1853/3268
-
(2002)
Technical Report GIT-GVU-02-16
-
-
Nguyen, D.H.1
Mynatt, E.2
-
105
-
-
0038037379
-
Unpacking ?privacy? for a networked world
-
ACM
-
Palen L, Dourish P (2003) Unpacking ?privacy? for a networked world. In: CHI. ACM, pp 129-136
-
(2003)
CHI
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
106
-
-
65449163899
-
Discrimination-aware data mining
-
ACM
-
Pedreschi D, Ruggieri S, Turini F (2008) Discrimination-aware data mining. In: KDD. ACM, pp 560-568
-
(2008)
KDD
, pp. 560-568
-
-
Pedreschi, D.1
Ruggieri, S.2
Turini, F.3
-
107
-
-
84898047487
-
Measuring discrimination in socially-sensitive decision records
-
Pedreschi D, Ruggieri S, Turini F (2009) Measuring discrimination in socially-sensitive decision records. In: SDM. pp 581-592
-
(2009)
SDM
, pp. 581-592
-
-
Pedreschi, D.1
Ruggieri, S.2
Turini, F.3
-
108
-
-
33745883087
-
-
Pfitzmann A, Hansen M (2006-2010) Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. http://dud.inf.tu-dresden.de/ AnonTerminology.shtml
-
(2006)
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
109
-
-
10944244304
-
Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies
-
Phillips D (2004) Privacy policy and PETs: the influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Soc 6(6):691-706
-
(2004)
New Media Soc
, vol.6
, Issue.6
, pp. 691-706
-
-
Phillips, D.1
-
110
-
-
84897969934
-
Millions assigned terror risk score on trips to the US
-
2 December 2006
-
Pilkington E (2006) Millions assigned terror risk score on trips to the US. The Guardian, 2 December 2006 http://www.guardian.co.uk/usa/story/0,, 1962299,00.html
-
(2006)
The Guardian
-
-
Pilkington, E.1
-
111
-
-
41949107359
-
Website privacy preservation for query log publishing
-
Bonchi F, Ferrari E, Malin B, Saygin Y (eds), Springer, New York
-
Poblete B, Spiliopoulou M, Baeza-Yates RA (2007) Website privacy preservation for query log publishing. In: Bonchi F, Ferrari E, Malin B, Saygin Y (eds) PinKDD, LNCS. vol 4890. Springer, New York , pp 80-96
-
(2007)
PinKDD, LNCS
, vol.4890
, pp. 80-96
-
-
Poblete, B.1
Spiliopoulou, M.2
Baeza-Yates, R.A.3
-
112
-
-
85121161350
-
Privacy-preserving query log mining for business confidentiality protection
-
Poblete B, Spiliopoulou M, Baeza-Yates RA (2010) Privacy-preserving query log mining for business confidentiality protection. TWEB 4(3):10-11026
-
(2010)
TWEB
, vol.4
, Issue.3
, pp. 10-11026
-
-
Poblete, B.1
Spiliopoulou, M.2
Baeza-Yates, R.A.3
-
113
-
-
33745640308
-
Implementing privacy negotiations in e-commerce
-
LNCS, Springer, New York
-
Preibusch S (2006) Implementing privacy negotiations in e-commerce. In: APWeb. LNCS, vol 3841. Springer, New York, pp 604-615
-
(2006)
APWeb
, vol.3841
, pp. 604-615
-
-
Preibusch, S.1
-
114
-
-
70350054627
-
Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling
-
Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (Eds)
-
Preibusch S, Hoser B, Gürses S, Berendt B (2007) Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling. In: Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (Eds) Proceedings of the workshop on data mining for user modelling at UM 2007. http://vasarely.wiwi.hu-berlin.de/DM.UM07/Proceedings/DM.UM07-proceedings.pdf
-
(2007)
Proceedings of the Workshop on Data Mining for User Modelling at UM 2007
-
-
Preibusch, S.1
Hoser, B.2
Gürses, S.3
Berendt, B.4
-
115
-
-
84897997115
-
-
Privacy International
-
Privacy International (2004) Complaint: Google Inc-Gmail email service. http://www.privacyinter national.org/issues/internet/gmail-complaint.pdf
-
(2004)
Complaint: Google Inc-Gmail Email Service
-
-
-
118
-
-
0242456823
-
Mining knowledge-sharing sites for viral marketing
-
ACM
-
Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: KDD. ACM, pp 61-70
-
(2002)
KDD
, pp. 61-70
-
-
Richardson, M.1
Domingos, P.2
-
119
-
-
77955228348
-
Disambiguating identity web references using web 2.0 data and semantics
-
Rowe M, Ciravegna F (2010) Disambiguating identity web references using web 2.0 data and semantics. J Web Semant 8(2)
-
(2010)
J Web Semant
, vol.8
, Issue.2
-
-
Rowe, M.1
Ciravegna, F.2
-
120
-
-
36148936813
-
On combating the abuse of state secrecy
-
doi:10.1111/j. 1467-9760.2007.00283.x
-
Sagar R (2007) On combating the abuse of state secrecy. J Polit Philos 15:404-427. doi:10.1111/j. 1467-9760.2007.00283.x
-
(2007)
J Polit Philos
, vol.15
, pp. 404-427
-
-
Sagar, R.1
-
121
-
-
85048478145
-
Das missbrauchte Staatsgeheimnis. Wikileaks und die Demokratie (The abused state secret. Wikileaks and democracy)
-
(Wikileaks and the consequences), Suhrkamp, Berlin
-
Sagar R (2011) Das missbrauchte Staatsgeheimnis. Wikileaks und die Demokratie (The abused state secret. Wikileaks and democracy). In: Wikileaks und die Folgen. (Wikileaks and the consequences), Suhrkamp, Berlin, pp 201-223
-
(2011)
Wikileaks und Die Folgen
, pp. 201-223
-
-
Sagar, R.1
-
122
-
-
7444228338
-
The CRISP-DM model: The new blueprint for data mining
-
Sinus Sociovision (n.d.) Sinus-Milieus
-
Shearer C (2000) The CRISP-DM model: the new blueprint for data mining. J Data Wareh 5(4):13-22 Sinus Sociovision (n.d.) Sinus-Milieus. http://www.sociovision.de/loesungen/sinus-milieus.html
-
(2000)
J Data Wareh
, vol.5
, Issue.4
, pp. 13-22
-
-
Shearer, C.1
-
124
-
-
84897975108
-
How to blog-and keep your jo
-
Smith-Spark L (2006) How to blog-and keep your job. BBC News. http://news.bbc.co.uk/2/hi/europe/ 5195714.stm
-
(2006)
BBC News
-
-
Smith-Spark, L.1
-
127
-
-
11844281385
-
State-Of-The-Art in privacy preserving data mining
-
Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. SIGMOD Rec 33(1):50-57
-
(2004)
SIGMOD Rec
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
130
-
-
0039492283
-
Gays, lesbians, and consumer behavior
-
(ed), Haworth Press, New York
-
Wardlow DL (ed) (1996) Gays, lesbians, and consumer behavior. Theory, practice, and research issues in marketing. Haworth Press, New York
-
(1996)
Theory, Practice, and Research Issues in Marketing
-
-
Wardlow, D.L.1
-
133
-
-
84856191070
-
A survey of privacy-preservation of graphs and social networks
-
Aggarwal CC, Wang H (eds), Kluwer, Boston
-
Wu X, Ying X, Liu K, Chen L (2010) A survey of privacy-preservation of graphs and social networks. In: Aggarwal CC, Wang H (eds) Managing and mining graph data. Kluwer, Boston , pp 421-454
-
(2010)
Managing and Mining Graph Data
, pp. 421-454
-
-
Wu, X.1
Ying, X.2
Liu, K.3
Chen, L.4
-
134
-
-
34250680246
-
Personalized privacy preservation
-
ACM
-
Xiao X, Tao Y (2006) Personalized privacy preservation. In: SIGMOD conference. ACM, pp 229-240
-
(2006)
SIGMOD Conference
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
135
-
-
70449440659
-
Asurvey on privacy preserving approaches in data publishing
-
IEEE Computer Society
-
ZhaoY, Du M, Le J, LuoY (2009)Asurvey on privacy preserving approaches in data publishing. In: DBTA. IEEE Computer Society, pp 128-131
-
(2009)
DBTA
, pp. 128-131
-
-
Zhao, Y.1
Du, M.2
Le, J.3
Luo, Y.4
-
136
-
-
70350632870
-
A brief survey on anonymization techniques for privacy preserving publishing of social network dat
-
Zhou B, Pei J, LukW (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor 10(2):12-22
-
(2008)
SIGKDD Explor
, vol.10
, Issue.2
, pp. 12-22
-
-
Zhou, B.1
Pei, J.2
Luk, W.3
|