-
3
-
-
84883811672
-
An analysis of student privacy rights in the use of plagiarism detection systems
-
Brinkman, B., (2012). An analysis of student privacy rights in the use of plagiarism detection systems. Science and Engineering Ethics, 19, 3, 1255-1266.
-
(2012)
Science and Engineering Ethics
, vol.19
, Issue.3
, pp. 1255-1266
-
-
Brinkman, B.1
-
4
-
-
85013624586
-
Student models that invite the learner in: The SMILI:() open learner modelling framework
-
Bull, S., &, Kay, J., (2007). Student models that invite the learner in: the SMILI:() open learner modelling framework. International Journal of Artificial Intelligence in Education, 17, 2, 89-120.
-
(2007)
International Journal of Artificial Intelligence in Education
, vol.17
, Issue.2
, pp. 89-120
-
-
Bull, S.1
Kay, J.2
-
5
-
-
71549141667
-
Academic analytics
-
EDUCAUSE White Paper.
-
Campbell, J. P., DeBlois, P. B., &, Oblinger, D. G., (2007). Academic analytics. Educause Review, 42, 1-24. EDUCAUSE White Paper.
-
(2007)
Educause Review
, vol.42
, pp. 1-24
-
-
Campbell, J.P.1
Deblois, P.B.2
Oblinger, D.G.3
-
6
-
-
0005927431
-
-
Canadian Standards Association. Ontario: Canadian Standards Association. (No. CAN/CSA-Q830-96).
-
Canadian Standards Association (2001). Model code for the protection of personal information (pp. 7-8). Ontario: Canadian Standards Association. (No. CAN/CSA-Q830-96).
-
(2001)
Model Code for the Protection of Personal Information
, pp. 7-8
-
-
-
8
-
-
84874566936
-
The risks of absolute medical confidentiality
-
Crook, M. A., (2011). The risks of absolute medical confidentiality. Science and Engineering Ethics, 19, 1, 107-122.
-
(2011)
Science and Engineering Ethics
, vol.19
, Issue.1
, pp. 107-122
-
-
Crook, M.A.1
-
9
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., &, Joosen, W., (2010). A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering, 16, 1, 3-32.
-
(2010)
Requirements Engineering
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
10
-
-
61049562232
-
The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
-
Elgesem, D., (1999). The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. Ethics and Information Technology, 1, 283-293.
-
(1999)
Ethics and Information Technology
, vol.1
, pp. 283-293
-
-
Elgesem, D.1
-
12
-
-
0034566648
-
The surveillant assemblage
-
Haggerty, K. D., &, Ericson, R. V., (2000). The surveillant assemblage. British Journal of Sociology, 51, 4, 605-622.
-
(2000)
British Journal of Sociology
, vol.51
, Issue.4
, pp. 605-622
-
-
Haggerty, K.D.1
Ericson, R.V.2
-
13
-
-
84898823234
-
-
Ipsos MediaCT. Germany: Ipsos MediaCT.
-
Ipsos MediaCT. (2011). Mobile internet & smartphone adoption Vol. 2011 (pp. 1-12). Germany: Ipsos MediaCT.
-
(2011)
Mobile Internet & Smartphone Adoption
, vol.2011
, pp. 1-12
-
-
-
14
-
-
84876470686
-
Legal, risk and ethical aspects of analytics in higher education
-
Kay, D., Korn, N., &, Oppenheim, C., (2012). Legal, risk and ethical aspects of analytics in higher education. CETIS Analytics Series, 1, 6, 1-30.
-
(2012)
CETIS Analytics Series
, vol.1
, Issue.6
, pp. 1-30
-
-
Kay, D.1
Korn, N.2
Oppenheim, C.3
-
16
-
-
67650337565
-
Exploring privacy concerns about personal sensing
-
H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush & Y. Tobe (Eds). Berlin: Springer Verlag.
-
Klasnja, P., Consolvo, S., &, Choudhury, T., (2009). Exploring privacy concerns about personal sensing. In, H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, &, Y. Tobe, (Eds). International conference pervasive (pp. 176-183). Berlin: Springer Verlag.
-
(2009)
International Conference Pervasive
, pp. 176-183
-
-
Klasnja, P.1
Consolvo, S.2
Choudhury, T.3
-
19
-
-
0347301554
-
The nature of and conditions for online trust
-
DOI 10.1023/A:1022950813386
-
Koehn, D., (2003). The nature of and conditions for online trust. Journal of Business Ethics, 43, 1/2, 3-19. (Pubitemid 38097380)
-
(2003)
Journal of Business Ethics
, vol.43
, Issue.1-2
, pp. 3-19
-
-
Koehn, D.1
-
21
-
-
81055142557
-
Privacy by design: A matter of choice
-
S. Gutwirth, Y. Poullet & P. De Hert (Eds). Berlin: Springer Verlag.
-
Le Métayer, D., (2010). Privacy by design: a matter of choice. In, S. Gutwirth, Y. Poullet, &, P. De Hert, (Eds). Data Protection in a Profiled World (pp. 1-6). Berlin: Springer Verlag.
-
(2010)
Data Protection in A Profiled World
, pp. 1-6
-
-
Le Métayer, D.1
-
22
-
-
56649104920
-
The taste for privacy: An analysis of college student privacy settings in an online social network
-
Lewis, K., Kaufman, J., &, Christakis, N., (2008). The taste for privacy: an analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14, 1, 79-100.
-
(2008)
Journal of Computer-Mediated Communication
, vol.14
, Issue.1
, pp. 79-100
-
-
Lewis, K.1
Kaufman, J.2
Christakis, N.3
-
23
-
-
84891893652
-
TMI (too much information): The role of friction and familiarity in disclosing information
-
Martin, K. E., (2011). TMI (too much information): the role of friction and familiarity in disclosing information. Business & Professional Ethics Journal, 30, 1-2.
-
(2011)
Business & Professional Ethics Journal
, vol.30
, pp. 1-2
-
-
Martin, K.E.1
-
24
-
-
77953213147
-
Myths and fallacies of "personally identifiable information."
-
Narayanan, A., &, Shmatikov, V., (2010). Myths and fallacies of "personally identifiable information.". Communications of the ACM, 53, 6, 24.
-
(2010)
Communications of the ACM
, vol.53
, Issue.6
, pp. 24
-
-
Narayanan, A.1
Shmatikov, V.2
-
25
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H., (2004). Privacy as contextual integrity. Washington Law Review, 79, 1, 101-139.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 101-139
-
-
Nissenbaum, H.1
-
26
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
Ohm, P., (2010). Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701-1777.
-
(2010)
UCLA Law Review
, vol.57
, pp. 1701-1777
-
-
Ohm, P.1
-
28
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
G. Cockton & P. Korhonen (Eds). (p.). New York: ACM Press. doi: 10.1145/642633.642635.
-
Palen, L., &, Dourish, P., (2003). Unpacking "privacy" for a networked world. In, G. Cockton, &, P. Korhonen, (Eds). Proceedings of the conference on Human factors in computing systems-CHI '03 (p. 129). New York: ACM Press. doi: 10.1145/642633.642635.
-
(2003)
Proceedings of the Conference on Human Factors in Computing Systems - CHI '03
, pp. 129
-
-
Palen, L.1
Dourish, P.2
-
29
-
-
79957974421
-
About the e-privacy directive: Towards a third generation of data protection legislation?
-
Berlin: Springer Verlag.
-
Poullet, Y., (2010). About the e-privacy directive: towards a third generation of data protection legislation? Data Protection in a Profiled World (pp. 3-30). Berlin: Springer Verlag.
-
(2010)
Data Protection in A Profiled World
, pp. 3-30
-
-
Poullet, Y.1
-
30
-
-
84898823460
-
-
Privacy Rights Clearinghouse. (p.). New York: Harper Perennial.
-
Privacy Rights Clearinghouse (1999). Privacy rights handbook (p. 335). New York: Harper Perennial.
-
(1999)
Privacy Rights Handbook
, pp. 335
-
-
-
31
-
-
76649093048
-
Privacy, data protection, and the unprecedented challenges of ambient intelligence
-
Rouvroy, A., (2008). Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies in Ethics, Law, and Technology, 2, 1, 1-54.
-
(2008)
Studies in Ethics, Law, and Technology
, vol.2
, Issue.1
, pp. 1-54
-
-
Rouvroy, A.1
-
32
-
-
79957607728
-
Privacy, ethics, and analytics
-
Schwartz, P. M., (2011). Privacy, ethics, and analytics. IEEE Security & Privacy, 9, 3, 66-69.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 66-69
-
-
Schwartz, P.M.1
-
33
-
-
81355163763
-
Penetrating the fog: Analytics in learning and education
-
Siemens, G., &, Long, P., (2011). Penetrating the fog: analytics in learning and education. Educause Review, 48, 5, 31-40.
-
(2011)
Educause Review
, vol.48
, Issue.5
, pp. 31-40
-
-
Siemens, G.1
Long, P.2
-
34
-
-
84921819821
-
E-tailer customization: Convenient or creepy?
-
New York
-
Singer, N., (2012). E-tailer customization: convenient or creepy? New York Times, New York.
-
(2012)
New York Times
-
-
Singer, N.1
-
35
-
-
84876460204
-
Learning analytics: Ethical issues and dilemmas
-
Slade, S., &, Prinsloo, P., (2013). Learning analytics: ethical issues and dilemmas. American Behavioral Scientist, 57, 10, 1510-1529.
-
(2013)
American Behavioral Scientist
, vol.57
, Issue.10
, pp. 1510-1529
-
-
Slade, S.1
Prinsloo, P.2
-
36
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
Smith, H. J., Dinev, T., &, Xu, H., (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35, 4, 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
37
-
-
64849113360
-
-
Cambridge, MA: Harvard University Press.
-
Solove, D., (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
-
(2008)
Understanding Privacy
-
-
Solove, D.1
-
40
-
-
77950672457
-
Sun on privacy: Get over it
-
Retrieved March 24, 2014
-
Sprenger, P., (1999). Sun on privacy: "get over it". Wired Magazine. Retrieved March 24, 2014, from http://www.wired.com/politics/law/news/ 1999/01/17538
-
(1999)
Wired Magazine
-
-
Sprenger, P.1
-
41
-
-
34548738978
-
Protecting people in research: A comparison between biomedical and traffic research
-
Svensson, S., &, Hansson, S. O., (2007). Protecting people in research: a comparison between biomedical and traffic research. Science and Engineering Ethics, 13, 1, 99-115.
-
(2007)
Science and Engineering Ethics
, vol.13
, Issue.1
, pp. 99-115
-
-
Svensson, S.1
Hansson, S.O.2
-
42
-
-
52149113254
-
Philosophical theories of privacy: Implications for an adequate online privacy policy
-
Tavani, H. T., (2007). Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy, 38, 1, 1-22.
-
(2007)
Metaphilosophy
, vol.38
, Issue.1
, pp. 1-22
-
-
Tavani, H.T.1
-
43
-
-
84898835816
-
Anonymizing and sharing corpora of online training courses
-
Teutsch, P., Piat, F., &, Reffay, C., (2009). Anonymizing and sharing corpora of online training courses. Workshop interaction analysis and visualization for asynchronous communication (pp. 1-6).
-
(2009)
Workshop Interaction Analysis and Visualization for Asynchronous Communication
, pp. 1-6
-
-
Teutsch, P.1
Piat, F.2
Reffay, C.3
-
44
-
-
84898770337
-
Consent 2.0. A better way of signing up for studies of your genes
-
(April 28). The Economist. New York
-
The Economist. (2012, April 28). Consent 2.0. A better way of signing up for studies of your genes. The Economist. New York.
-
(2012)
The Economist
-
-
-
45
-
-
84861393010
-
-
The White House. (p.). Washington: US Government, The White House.
-
The White House (2012). Consumer data privacy in a networked world (p. 62). Washington: US Government, The White House.
-
(2012)
Consumer Data Privacy in A Networked World
, pp. 62
-
-
-
46
-
-
84862777858
-
Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems
-
Toch, E., Wang, Y., &, Cranor, L. F., (2012). Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-adapted Interaction, 22, 1-2, 203-220.
-
(2012)
User Modeling and User-adapted Interaction
, vol.22
, Issue.12
, pp. 203-220
-
-
Toch, E.1
Wang, Y.2
Cranor, L.F.3
-
47
-
-
84869755088
-
Dataset-driven research to support learning and knowledge analytics
-
Verbert, K., Manouselis, N., Drachsler, H., &, Duval, E., (2012). Dataset-driven research to support learning and knowledge analytics. Educational Technology & Society, 15, 3, 133-148.
-
(2012)
Educational Technology & Society
, vol.15
, Issue.3
, pp. 133-148
-
-
Verbert, K.1
Manouselis, N.2
Drachsler, H.3
Duval, E.4
-
48
-
-
84883769033
-
Gaming, texting, learning? Teaching engineering ethics through students' lived experiences with technology
-
Voss, G., (2012). Gaming, texting, learning? Teaching engineering ethics through students' lived experiences with technology. Science and Engineering Ethics, 19, 3, 1375-1393.
-
(2012)
Science and Engineering Ethics
, vol.19
, Issue.3
, pp. 1375-1393
-
-
Voss, G.1
|