메뉴 건너뛰기




Volumn 24, Issue 3, 2012, Pages 697-737

More than modelling and hiding: Towards a comprehensive view ofWeb mining and privacy

Author keywords

Knowledge discovery cycle; Privacy; Social network analysis; Web mining; Web usage (mining)

Indexed keywords

DATA PRIVACY; PROBLEM SOLVING; SOCIAL NETWORKING (ONLINE);

EID: 84897974165     PISSN: 13845810     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10618-012-0254-1     Document Type: Article
Times cited : (20)

References (136)
  • 1
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the Facebook
    • Danezis G, Golle P (eds), Springer, New York
    • Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P (eds) Privacy enhancing technologies. LNCS, vol 4258. Springer, New York, pp 36-58
    • (2006) Privacy Enhancing Technologies. LNCS , vol.4258 , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 2
    • 67650500737 scopus 로고    scopus 로고
    • Predicting social security numbers from public dat
    • Acquisti A, Gross R (2009) Predicting social security numbers from public data. Proc Nat Acad Sci 106(27):10975-10980
    • (2009) Proc Nat Acad Sci , vol.106 , Issue.27 , pp. 10975-10980
    • Acquisti, A.1    Gross, R.2
  • 4
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • ACM, Dallas
    • Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: SIGMOD conference. ACM, Dallas, pp 439-450
    • (2000) SIGMOD Conference , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 5
    • 80052799499 scopus 로고    scopus 로고
    • A general survey of privacy-preserving data mining models and algorithms
    • Aggarwal CC, Yu PS (eds), Springer, New York
    • Aggarwal CC, Yu PS (2008a) A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer, New York, pp 11-51
    • (2008) Privacy-preserving Data Mining: Models and Algorithms , pp. 11-51
    • Aggarwal, C.C.1    Yu, P.S.2
  • 7
    • 0242674432 scopus 로고    scopus 로고
    • Hippocratic databases
    • Morgan Kaufmann, San Francisco
    • Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic databases. In: VLDB. Morgan Kaufmann, San Francisco, pp 143-154
    • (2002) VLDB , pp. 143-154
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 9
    • 53449102514 scopus 로고    scopus 로고
    • Alambic: A privacy-preserving recommender system for electronic commerce
    • A?meur E, Brassard G, Fernandez JM, Onana FSM (2008) Alambic: a privacy-preserving recommender system for electronic commerce. Int J Inf Secur 7(5):307-334
    • (2008) Int J Inf Secur , vol.7 , Issue.5 , pp. 307-334
    • Ameur, E.1    Brassard, G.2    Fernandez, J.M.3    Fsm, O.4
  • 11
    • 84898014222 scopus 로고    scopus 로고
    • Initiative for mental health in professional sports
    • Ärztebla T T, (2011) Initiative f?r psychische Gesundheit im Leistungssport (Initiative for mental health in professional sports). http://www.aerzteblatt.de/nachrichten/46692/Initiative-fr-psychische-Gesundheit- im-Leistungssport.htm
    • (2011) Initiative für Psychische Gesundheit im Leistungssport
    • Ärztebla, T.T.1
  • 13
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • Williamson CL, Zurko ME, Patel-Schneider PF, Shenoy PJ (eds), ACM, Ithaca
    • Backstrom L, Dwork C, Kleinberg JM (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Williamson CL, Zurko ME, Patel-Schneider PF, Shenoy PJ (eds) WWW. ACM, Ithaca , pp 181-190
    • (2007) WWW , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.M.3
  • 15
    • 65449127268 scopus 로고    scopus 로고
    • New York Times, New York BBC News, 2008 Timeline: child benefits records loss
    • Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. New York Times, New York BBC News (2008) Timeline: child benefits records loss. http://news.bbc.co.uk/2/hi/7104368.stm
    • A Face Is Exposed for AOL Searcher No, 4417749 , vol.2006
    • Barbaro, M.1    Zeller, T.2
  • 16
    • 16444368611 scopus 로고    scopus 로고
    • Privacy in e-commerce: Stated preferences vs. Actual behavior
    • Berendt B, GüntherO, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101-106
    • (2005) Commun ACM , vol.48 , Issue.4 , pp. 101-106
    • Berendt, B.1    Günther, O.2    Spiekermann, S.3
  • 17
    • 42649122624 scopus 로고    scopus 로고
    • Aprivacy-protecting business-analytics service for online transactions
    • Berendt B, Preibusch S, TeltzrowM (2008) Aprivacy-protecting business-analytics service for online transactions. Int J Electron Commer 12(3):115-150
    • (2008) Int J Electron Commer , vol.12 , Issue.3 , pp. 115-150
    • Berendt, B.1    Preibusch, S.2    Teltzrow, M.3
  • 18
    • 80052068951 scopus 로고    scopus 로고
    • Examining users? Attitude towards privacy preserving collaborative filtering
    • Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (eds)
    • Berkovsky S, Borisov N, Eytani Y, Kuflik T, Ricci F (2007) Examining users? attitude towards privacy preserving collaborative filtering. In: Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (eds) Proceedings of the workshop on data mining for user modelling at UM 2007. http://vasarely. wiwi.hu-berlin.de/DM.UM07/Proceedings/DM.UM07-proceedings.pdf
    • (2007) Proceedings of the Workshop on Data Mining for User Modelling at UM , vol.2007
    • Berkovsky, S.1    Borisov, N.2    Eytani, Y.3    Kuflik, T.4    Ricci, F.5
  • 19
    • 77951144748 scopus 로고    scopus 로고
    • A survey of quantification of privacy preserving data mining algorithms
    • Aggarwal CC, Yu PS (eds), Springer, New York
    • Bertino E, Lin D, JiangW(2008) A survey of quantification of privacy preserving data mining algorithms. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining: models and algorithms. Springer, New York, pp 181-200
    • (2008) Privacy-preserving Data Mining: Models and Algorithms , pp. 181-200
    • Bertino, E.1    Lin, D.2    Jiang, W.3
  • 20
    • 84878528535 scopus 로고    scopus 로고
    • The problem of conflicting social spheres: Effects of network structure on experienced tension in social network sites
    • Binder J, Howes A, Sutcliffe AG (2009) The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In: CHI, ACM, pp 965-974
    • (2009) CHI, ACM , pp. 965-974
    • Binder, J.1    Howes, A.2    Sutcliffe, A.G.3
  • 21
    • 0346762517 scopus 로고    scopus 로고
    • Anewlook at trade secret law: Doctrine in search of justification
    • BoneRG (1998) Anewlook at trade secret law: doctrine in search of justification. Calif LawRev 86(2):241-313
    • (1998) Calif LawRev , vol.86 , Issue.2 , pp. 241-313
    • Bone, R.G.1
  • 22
    • 79955854747 scopus 로고    scopus 로고
    • The privacy jungle: On the market for data protection in social networks
    • Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: WEIS 2009, http://preibusch.de/publications/ socialnetworks/privacyjungledataset.htm
    • (2009) WEIS 2009
    • Bonneau, J.1    Preibusch, S.2
  • 24
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: Definition, history and scholarship
    • boyd D, Ellison N (2007) Social network sites: definition, history and scholarship. J Comput Mediat Commun 13(1), http://jcmc.indiana.edu/vol13/issue1/ boyd.ellison.html
    • (2007) J Comput Mediat Commun , vol.13 , Issue.1
    • Boyd, D.1    Ellison, N.2
  • 25
    • 84897980053 scopus 로고    scopus 로고
    • Profiting from untrusted parties in web-based applications
    • LNCS, Springer
    • Boyens C, Fischmann M (2003) Profiting from untrusted parties in web-based applications. In: EC-Web. LNCS, Springer, vol 2738, pp 216-226
    • (2003) EC-Web , vol.2738 , pp. 216-226
    • Boyens, C.1    Fischmann, M.2
  • 26
    • 84897987679 scopus 로고
    • Bundesverfassungsgericht, Oktober 1983- 1 BvR 209, 269, 362, 420, 440, 484/83 in den Verfahren über die Verfassungsbeschwerden
    • Bundesverfassungsgericht (1983) BVerfGE 65, 1-Volksz?hlung. Urteil des Ersten Senats vom 15. Dezember 1983 auf die mündliche Verhandlung vom 18. und 19. Oktober 1983- 1 BvR 209, 269, 362, 420, 440, 484/83 in den Verfahren über die Verfassungsbeschwerden. http://www.telemedicus.info/urteile/ Datenschutzrecht/88-BVerfG-Az-1-BvR-209,-269,-362, -420,-440,-48483- Volkszaehlungsurteil.html
    • (1983) BVerfGE 65, 1-Volksz?hlung. Urteil des Ersten Senats Vom 15. Dezember 1983 Auf Die Mündliche Verhandlung Vom 18. und 19 , vol.18
  • 28
    • 77958063401 scopus 로고    scopus 로고
    • Three naive Bayes approaches for discrimination-free classification
    • Calders T, Verwer S (2010) Three naive Bayes approaches for discrimination-free classification. Data Min Knowl Discov 21(2):277-292
    • (2010) Data Min Knowl Discov , vol.21 , Issue.2 , pp. 277-292
    • Calders, T.1    Verwer, S.2
  • 29
    • 67049154037 scopus 로고    scopus 로고
    • Blind and anonymous identity-based encryption and authorised private searches on public key encrypted dat
    • LNCS, Springer, New York
    • Camenisch J, Kohlweiss M, Rial A, Sheedy C (2009) Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Public key cryptography. LNCS, vol 5443. Springer, New York, pp 196-214
    • (2009) Public Key Cryptography , vol.5443 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 30
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • ACM
    • Canny JF (2002) Collaborative filtering with privacy via factor analysis. In: SIGIR. ACM, pp 238-245
    • (2002) SIGIR , pp. 238-245
    • Canny, J.F.1
  • 36
    • 84897986672 scopus 로고    scopus 로고
    • Judgment of the court of 6 November 2003
    • Court of Justice
    • Court of Justice (2003) Judgment of the court of 6 November 2003. Criminal proceedings against Bodil Lindqvist. http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:62001J0101:EN:HTML CRISP-DM (2000) CRISP-DM 1.0 Step-by-step data mining guide. http://www.spss.ch/upload/ 1107356429CrispDM1.0.pdf
    • (2003) Criminal Proceedings Against Bodil Lindqvist
  • 37
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • Dalenius T (1977) Towards a methodology for statistical disclosure control. Stat Tidskrift 15:429-444
    • (1977) Stat Tidskrift , vol.15 , pp. 429-444
    • Dalenius, T.1
  • 38
    • 50249171823 scopus 로고    scopus 로고
    • A survey of anonymous communication channels
    • Microsoft Research
    • Danezis G, Diaz C (2008) A survey of anonymous communication channels. Tech. Rep.MSR-TR-2008-35, Microsoft Research
    • (2008) Tech. Rep.MSR-TR-2008-35
    • Danezis, G.1    Diaz, C.2
  • 39
    • 38149082680 scopus 로고    scopus 로고
    • Efficient negative databases from cryptographic hash functions
    • LNCS, Springer, New York
    • Danezis G, Díaz C, Faust S, K?sper E, Troncoso C, Preneel B (2007) Efficient negative databases from cryptographic hash functions. In: ISC. LNCS, vol 4779, Springer, New York, pp 423-436
    • (2007) ISC , vol.4779 , pp. 423-436
    • Danezis, G.1    Díaz, C.2    Faust, S.3    Ksper, E.4    Troncoso, C.5    Preneel, B.6
  • 43
    • 38049048780 scopus 로고    scopus 로고
    • A three-dimensional conceptual framework for database privacy
    • LNCS, Springer, New York
    • Domingo-Ferrer J (2007) A three-dimensional conceptual framework for database privacy. In: Secure data management. LNCS, vol 4721. Springer, New York, pp 193-202
    • (2007) Secure Data Management , vol.4721 , pp. 193-202
    • Domingo-Ferrer, J.1
  • 44
    • 49049098124 scopus 로고    scopus 로고
    • A critique of k-anonymity and some of its enhancements
    • IEEE Computer Society
    • Domingo-Ferrer J, Torra V (2008) A critique of k-anonymity and some of its enhancements. In: ARES 2008. IEEE Computer Society, pp 990-993
    • (2008) ARES 2008 , pp. 990-993
    • Domingo-Ferrer, J.1    Torra, V.2
  • 46
    • 0003039571 scopus 로고    scopus 로고
    • The impact of legalized abortion on crime
    • Donohue J, Levitt S (2001) The impact of legalized abortion on crime. Q J Econ 116(2):379-420
    • (2001) Q J Econ , vol.116 , Issue.2 , pp. 379-420
    • Donohue, J.1    Levitt, S.2
  • 48
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Bugliesi M, Preneel B, Sassone V, Wegener I (eds), Springer, New York
    • Dwork C (2006) Differential privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds) ICALP (2), LNCS. vol 4052. Springer, New York , pp 1-12
    • (2006) ICALP (2), LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 49
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • LNCS, Springer, New York
    • Dwork C (2008) Differential privacy: a survey of results. In: TAMC. LNCS, vol 4978. Springer, New York, pp 1-19
    • (2008) TAMC , vol.4978 , pp. 1-19
    • Dwork, C.1
  • 52
    • 84898016755 scopus 로고    scopus 로고
    • Electronic Privacy Information Center
    • Electronic Privacy Information Center (2010a) Automated targeting system. http://epic.org/privacy/travel/ ats/
    • (2010) Automated Targeting System
  • 53
    • 84897971210 scopus 로고    scopus 로고
    • Electronic Privacy Information Center
    • Electronic Privacy Information Center (2010b) Netflix cancels contest over privacy concerns. http://epic. org/2010/03/netflix-cancels-contest-over-p. html
    • (2010) Netflix Cancels Contest over Privacy Concerns
  • 54
    • 84898009266 scopus 로고    scopus 로고
    • Electronic Privacy Information Center
    • Electronic Privacy Information Center (2011a) Facebook privacy. http://epic.org/privacy/facebook/
    • (2011) Facebook Privacy
  • 55
    • 84897987959 scopus 로고    scopus 로고
    • Electronic Privacy Information Center
    • Electronic Privacy Information Center (2011b) In re Facebook. http://epic.org/privacy/inrefacebook/
    • (2011) Re Facebook
  • 56
    • 84897983020 scopus 로고    scopus 로고
    • Privacy?
    • Electronic Privacy Information Center
    • Electronic Privacy Information Center (2011c) Privacy? Proposed Google/DoubleClick deal. http://epic. org/privacy/ftc/google/
    • (2011) Proposed Google/DoubleClick Deal
  • 57
    • 84865183578 scopus 로고    scopus 로고
    • Electronic Privacy Information Center (n.d.)
    • Electronic Privacy Information Center (n.d.) EPIC online guide to practical privacy tools. http://epic.org/ privacy/tools.html
    • EPIC Online Guide to Practical Privacy Tools
  • 62
    • 84898001670 scopus 로고    scopus 로고
    • European Court of Human Rights, Germany.ECHR115(2011)
    • European Court of Human Rights (2011) European Court of Human Rights: violation of freedom of expression in caseHeinisch v. Germany.ECHR115 (2011). http://human-rights-convention.org/2011/07/22/ european-court-of-human-rights- violation-of-freedom-of-expression-in-case-heinisch-v-germany/
    • (2011) European Court of Human Rights: Violation of Freedom of Expression in CaseHeinisch v
  • 63
    • 0035841472 scopus 로고    scopus 로고
    • Ethical issues in qualitative research on internet communities
    • Eysenbach G, Till JE (2001) Ethical issues in qualitative research on internet communities. Br Med J 323:1103-1105
    • (2001) Br Med J , vol.323 , pp. 1103-1105
    • Eysenbach, G.1    Till, J.E.2
  • 64
    • 0030270991 scopus 로고    scopus 로고
    • Data mining and knowledge discovery: Making sense out of data
    • Fayyad UM (1996) Data mining and knowledge discovery: making sense out of data. IEEE Expert 11(5):20-25
    • (1996) IEEE Expert , vol.11 , Issue.5 , pp. 20-25
    • Fayyad, U.M.1
  • 66
    • 84898004714 scopus 로고    scopus 로고
    • Are IP addresses
    • Fleischer P (2008) Are IP addresses "personal data" http://peterfleischer.blogspot.com/2007/02/are-ip-addr esses-personal-data.html
    • (2008) Personal Data?
    • Fleischer, P.1
  • 67
    • 33750357681 scopus 로고    scopus 로고
    • You are what you say: Privacy risks of public mentions
    • ACM
    • Frankowski D, Cosley D, Sen S, Terveen LG, Riedl J (2006) You are what you say: privacy risks of public mentions. In: SIGIR. ACM, pp 565-572
    • (2006) SIGIR , pp. 565-572
    • Frankowski, D.1    Cosley, D.2    Sen, S.3    Terveen, L.G.4    Riedl, J.5
  • 69
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey on recent developments. ACM Comput Surv 42(4)
    • (2010) ACM Comput Surv , vol.42 , pp. 4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 71
    • 84897979271 scopus 로고    scopus 로고
    • GermanWorking Group on Data Retention (AK Vorrat) (n.d.)
    • GermanWorking Group on Data Retention (AK Vorrat) (n.d.) Pros and cons of data retention. http://www. vorratsdatenspeicherung.de/content/view/83/87/lang, en/
    • Pros and Cons of Data Retention
  • 72
    • 84979522519 scopus 로고    scopus 로고
    • Privacy-enhancing technologies for the internet III: Ten years later
    • Goldberg I (2007) Privacy-enhancing technologies for the internet III: ten years later. In: Digital privacy: theory, technologies, and practices, Auerbach, pp 3-18, http://www.cypherpunks.ca/iang/pubs/pet3. pdf
    • (2007) Digital Privacy: Theory, Technologies, and Practices, Auerbach , pp. 3-18
    • Goldberg, I.1
  • 73
    • 2542498719 scopus 로고    scopus 로고
    • International infectious disease law
    • Revision of the World Health Organization?s international health regulations
    • Gostin LO (2004) International infectious disease law. Revision of the World Health Organization?s international health regulations. J Am Med Assoc 291(21):2623-2627
    • (2004) J Am Med Assoc , vol.291 , Issue.21 , pp. 2623-2627
    • Gostin, L.O.1
  • 74
    • 56349121964 scopus 로고    scopus 로고
    • Towards the development of privacy-aware systems
    • Guarda P, Zannone N (2009) Towards the development of privacy-aware systems. Inf Softw Technol 51(2):337-350
    • (2009) Inf Softw Technol , vol.51 , Issue.2 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 77
    • 84864263741 scopus 로고    scopus 로고
    • PETs in the surveillance society: A critical review of the potentials and limitations of the privacy as confidentiality paradigm
    • Gutwirth S, Poullet Y, De Hert P (eds), Springer, Dordrecht
    • Gürses S, Berendt B (2010) PETs in the surveillance society: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. In: Gutwirth S, Poullet Y, De Hert P (eds) Data protection in a profiled world. Springer, Dordrecht , pp 301-321
    • (2010) Data Protection in A Profiled World , pp. 301-321
    • Gürses, S.1    Berendt, B.2
  • 78
    • 84864240744 scopus 로고    scopus 로고
    • The social web and privacy: Practices, reciprocity and conflict detection in social networks
    • Ferrari E, Bonchi F (eds), Chapman & Hall/CRC Press, Boca Raton
    • Gürses S, Berendt B (2010b) The social web and privacy: practices, reciprocity and conflict detection in social networks. In: Ferrari E, Bonchi F (eds) Privacy-aware knowledge discovery: novel applications and new techniques. Chapman & Hall/CRC Press, Boca Raton
    • (2010) Privacy-aware Knowledge Discovery: Novel Applications and New Techniques
    • Gürses, S.1    Berendt, B.2
  • 80
    • 84870973762 scopus 로고    scopus 로고
    • Privacy design in online social networks: Learning from privacy breaches and community feedback
    • ACM
    • Gürses S, Rizk R, GüntherO(2008) Privacy design in online social networks: learning from privacy breaches and community feedback. In: ICIS. ACM
    • (2008) ICIS
    • Gürses, S.1    Rizk, R.2    Günther, O.3
  • 83
    • 70350579818 scopus 로고    scopus 로고
    • Linkage control-integrating the essence of privacy protection into identity management
    • HansenM(2008) Linkage control-integrating the essence of privacy protection into identity management. In: Proceedings of eChallenges. pp 1585-1592
    • (2008) Proceedings of EChallenges. , pp. 1585-1592
    • Hansen, M.1
  • 85
    • 34248656127 scopus 로고    scopus 로고
    • Privacy and identity
    • Claes E, Duff A, Gutwirth S (eds), Intersentia, Antwerp
    • Hildebrandt M (2006) Privacy and identity. In: Claes E, Duff A, Gutwirth S (eds) Privacy and the criminal law. Intersentia, Antwerp , pp 43-58
    • (2006) Privacy and the Criminal Law , pp. 43-58
    • Hildebrandt, M.1
  • 88
    • 35348815641 scopus 로고    scopus 로고
    • Demographic prediction based on user?s browsing behavior
    • ACM
    • Hu J, Zeng HJ, Li H, Niu C, Chen Z (2007) Demographic prediction based on user?s browsing behavior. In: WWW. ACM, pp 151-160
    • (2007) WWW , pp. 151-160
    • Hu, J.1    Zeng, H.J.2    Li, H.3    Niu, C.4    Chen, Z.5
  • 89
    • 84897981862 scopus 로고    scopus 로고
    • Gesetz zur Verhütung und Bek?mpfung von Infektionskrankheiten beim Menschen
    • Infektionsschutzgesetz
    • Infektionsschutzgesetz (2001) Gesetz zur Verhütung und Bek?mpfung von Infektionskrankheiten beim Menschen (Law for the avoidance and fighting of infectious human diseases). http://www. gesetze-im-internet.de/bundesrecht/ifsg/ gesamt.pdf
    • (2001) Law for the Avoidance and Fighting of Infectious Human Diseases
  • 90
    • 0001009493 scopus 로고    scopus 로고
    • Internet therapy and self help groups-The pros and cons
    • Academic Press, San Diego
    • King SA, Moreggi D (1998) Internet therapy and self help groups-the pros and cons. In: Gackenbach JPsychology and the Internet. Academic Press, San Diego
    • (1998) Gackenbach JPsychology and the Internet
    • King, S.A.1    Moreggi, D.2
  • 91
    • 84897995757 scopus 로고    scopus 로고
    • Glossary of terms
    • Korolova A, Kenthapadi K, Mishra N, Ntoulas A, 2009 Releasing search queries and clicks privately
    • Kohavi R, Provost F (1998) Glossary of terms. http://ai.stanford.edu/ ~ronnyk/glossary.html Korolova A, Kenthapadi K, Mishra N, Ntoulas A (2009) Releasing search queries and clicks privately. In: WWW. pp 171-180
    • (1998) WWW , pp. 171-180
    • Kohavi, R.1    Provost, F.2
  • 92
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and personal privacy through understanding and action: Five pitfalls for designers
    • Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and personal privacy through understanding and action: five pitfalls for designers. Pers Ubiq Comput 8(6):440-454
    • (2004) Pers Ubiq Comput , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4
  • 93
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • IEEE
    • Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE. IEEE, pp 106-115
    • (2007) ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 95
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • LNCS, Springer, New York
    • Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: CRYPTO. LNCS, vol 1880. Springer, New York, pp 36-54
    • (2000) CRYPTO , vol.1880 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 97
    • 84893412531 scopus 로고    scopus 로고
    • Of men, women, and computers: Sata-driven gender modeling for improved user interfaces
    • Liu H,Mihalcea R (2007) Of men, women, and computers: data-driven gender modeling for improved user interfaces. In: ICWSM, pp 121-128
    • (2007) ICWSM , pp. 121-128
    • Liu, H.1    Mihalcea, R.2
  • 98
    • 33750740793 scopus 로고    scopus 로고
    • Unraveling the taste fabric of social networks
    • Liu H, Maes P, Davenport G (2006) Unraveling the taste fabric of social networks. Int J Semant Web Inf Syst 2(1):42-71
    • (2006) Int J Semant Web Inf Syst , vol.2 , Issue.1 , pp. 42-71
    • Liu, H.1    Maes, P.2    Davenport, G.3
  • 102
    • 5144226528 scopus 로고    scopus 로고
    • Privacy mirrors: Understanding and shaping socio-technical ubiquitous computing
    • Georgia Institute of Technology, USA
    • Nguyen DH, Mynatt E (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing. Technical Report GIT-GVU-02-16, Georgia Institute of Technology, USA http://smartech. gatech.edu/handle/1853/3268
    • (2002) Technical Report GIT-GVU-02-16
    • Nguyen, D.H.1    Mynatt, E.2
  • 105
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking ?privacy? for a networked world
    • ACM
    • Palen L, Dourish P (2003) Unpacking ?privacy? for a networked world. In: CHI. ACM, pp 129-136
    • (2003) CHI , pp. 129-136
    • Palen, L.1    Dourish, P.2
  • 106
    • 65449163899 scopus 로고    scopus 로고
    • Discrimination-aware data mining
    • ACM
    • Pedreschi D, Ruggieri S, Turini F (2008) Discrimination-aware data mining. In: KDD. ACM, pp 560-568
    • (2008) KDD , pp. 560-568
    • Pedreschi, D.1    Ruggieri, S.2    Turini, F.3
  • 107
    • 84898047487 scopus 로고    scopus 로고
    • Measuring discrimination in socially-sensitive decision records
    • Pedreschi D, Ruggieri S, Turini F (2009) Measuring discrimination in socially-sensitive decision records. In: SDM. pp 581-592
    • (2009) SDM , pp. 581-592
    • Pedreschi, D.1    Ruggieri, S.2    Turini, F.3
  • 109
    • 10944244304 scopus 로고    scopus 로고
    • Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies
    • Phillips D (2004) Privacy policy and PETs: the influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Soc 6(6):691-706
    • (2004) New Media Soc , vol.6 , Issue.6 , pp. 691-706
    • Phillips, D.1
  • 110
    • 84897969934 scopus 로고    scopus 로고
    • Millions assigned terror risk score on trips to the US
    • 2 December 2006
    • Pilkington E (2006) Millions assigned terror risk score on trips to the US. The Guardian, 2 December 2006 http://www.guardian.co.uk/usa/story/0,, 1962299,00.html
    • (2006) The Guardian
    • Pilkington, E.1
  • 111
    • 41949107359 scopus 로고    scopus 로고
    • Website privacy preservation for query log publishing
    • Bonchi F, Ferrari E, Malin B, Saygin Y (eds), Springer, New York
    • Poblete B, Spiliopoulou M, Baeza-Yates RA (2007) Website privacy preservation for query log publishing. In: Bonchi F, Ferrari E, Malin B, Saygin Y (eds) PinKDD, LNCS. vol 4890. Springer, New York , pp 80-96
    • (2007) PinKDD, LNCS , vol.4890 , pp. 80-96
    • Poblete, B.1    Spiliopoulou, M.2    Baeza-Yates, R.A.3
  • 112
    • 85121161350 scopus 로고    scopus 로고
    • Privacy-preserving query log mining for business confidentiality protection
    • Poblete B, Spiliopoulou M, Baeza-Yates RA (2010) Privacy-preserving query log mining for business confidentiality protection. TWEB 4(3):10-11026
    • (2010) TWEB , vol.4 , Issue.3 , pp. 10-11026
    • Poblete, B.1    Spiliopoulou, M.2    Baeza-Yates, R.A.3
  • 113
    • 33745640308 scopus 로고    scopus 로고
    • Implementing privacy negotiations in e-commerce
    • LNCS, Springer, New York
    • Preibusch S (2006) Implementing privacy negotiations in e-commerce. In: APWeb. LNCS, vol 3841. Springer, New York, pp 604-615
    • (2006) APWeb , vol.3841 , pp. 604-615
    • Preibusch, S.1
  • 114
    • 70350054627 scopus 로고    scopus 로고
    • Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling
    • Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (Eds)
    • Preibusch S, Hoser B, Gürses S, Berendt B (2007) Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling. In: Baker R, Beck J, Berendt B, Menasalvas E, Kröner A, Weibelzahl S (Eds) Proceedings of the workshop on data mining for user modelling at UM 2007. http://vasarely.wiwi.hu-berlin.de/DM.UM07/Proceedings/DM.UM07-proceedings.pdf
    • (2007) Proceedings of the Workshop on Data Mining for User Modelling at UM 2007
    • Preibusch, S.1    Hoser, B.2    Gürses, S.3    Berendt, B.4
  • 115
    • 84897997115 scopus 로고    scopus 로고
    • Privacy International
    • Privacy International (2004) Complaint: Google Inc-Gmail email service. http://www.privacyinter national.org/issues/internet/gmail-complaint.pdf
    • (2004) Complaint: Google Inc-Gmail Email Service
  • 118
    • 0242456823 scopus 로고    scopus 로고
    • Mining knowledge-sharing sites for viral marketing
    • ACM
    • Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: KDD. ACM, pp 61-70
    • (2002) KDD , pp. 61-70
    • Richardson, M.1    Domingos, P.2
  • 119
    • 77955228348 scopus 로고    scopus 로고
    • Disambiguating identity web references using web 2.0 data and semantics
    • Rowe M, Ciravegna F (2010) Disambiguating identity web references using web 2.0 data and semantics. J Web Semant 8(2)
    • (2010) J Web Semant , vol.8 , Issue.2
    • Rowe, M.1    Ciravegna, F.2
  • 120
    • 36148936813 scopus 로고    scopus 로고
    • On combating the abuse of state secrecy
    • doi:10.1111/j. 1467-9760.2007.00283.x
    • Sagar R (2007) On combating the abuse of state secrecy. J Polit Philos 15:404-427. doi:10.1111/j. 1467-9760.2007.00283.x
    • (2007) J Polit Philos , vol.15 , pp. 404-427
    • Sagar, R.1
  • 121
    • 85048478145 scopus 로고    scopus 로고
    • Das missbrauchte Staatsgeheimnis. Wikileaks und die Demokratie (The abused state secret. Wikileaks and democracy)
    • (Wikileaks and the consequences), Suhrkamp, Berlin
    • Sagar R (2011) Das missbrauchte Staatsgeheimnis. Wikileaks und die Demokratie (The abused state secret. Wikileaks and democracy). In: Wikileaks und die Folgen. (Wikileaks and the consequences), Suhrkamp, Berlin, pp 201-223
    • (2011) Wikileaks und Die Folgen , pp. 201-223
    • Sagar, R.1
  • 122
    • 7444228338 scopus 로고    scopus 로고
    • The CRISP-DM model: The new blueprint for data mining
    • Sinus Sociovision (n.d.) Sinus-Milieus
    • Shearer C (2000) The CRISP-DM model: the new blueprint for data mining. J Data Wareh 5(4):13-22 Sinus Sociovision (n.d.) Sinus-Milieus. http://www.sociovision.de/loesungen/sinus-milieus.html
    • (2000) J Data Wareh , vol.5 , Issue.4 , pp. 13-22
    • Shearer, C.1
  • 124
    • 84897975108 scopus 로고    scopus 로고
    • How to blog-and keep your jo
    • Smith-Spark L (2006) How to blog-and keep your job. BBC News. http://news.bbc.co.uk/2/hi/europe/ 5195714.stm
    • (2006) BBC News
    • Smith-Spark, L.1
  • 125
  • 133
    • 84856191070 scopus 로고    scopus 로고
    • A survey of privacy-preservation of graphs and social networks
    • Aggarwal CC, Wang H (eds), Kluwer, Boston
    • Wu X, Ying X, Liu K, Chen L (2010) A survey of privacy-preservation of graphs and social networks. In: Aggarwal CC, Wang H (eds) Managing and mining graph data. Kluwer, Boston , pp 421-454
    • (2010) Managing and Mining Graph Data , pp. 421-454
    • Wu, X.1    Ying, X.2    Liu, K.3    Chen, L.4
  • 134
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation
    • ACM
    • Xiao X, Tao Y (2006) Personalized privacy preservation. In: SIGMOD conference. ACM, pp 229-240
    • (2006) SIGMOD Conference , pp. 229-240
    • Xiao, X.1    Tao, Y.2
  • 135
    • 70449440659 scopus 로고    scopus 로고
    • Asurvey on privacy preserving approaches in data publishing
    • IEEE Computer Society
    • ZhaoY, Du M, Le J, LuoY (2009)Asurvey on privacy preserving approaches in data publishing. In: DBTA. IEEE Computer Society, pp 128-131
    • (2009) DBTA , pp. 128-131
    • Zhao, Y.1    Du, M.2    Le, J.3    Luo, Y.4
  • 136
    • 70350632870 scopus 로고    scopus 로고
    • A brief survey on anonymization techniques for privacy preserving publishing of social network dat
    • Zhou B, Pei J, LukW (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor 10(2):12-22
    • (2008) SIGKDD Explor , vol.10 , Issue.2 , pp. 12-22
    • Zhou, B.1    Pei, J.2    Luk, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.