-
1
-
-
59849122652
-
Life in the network: The coming age of computational social science
-
Lazer D, Pentland AS, Adamic L, Aral S, Barabasi AL, et al. (2009) Life in the network: the coming age of computational social science. Science (New York, NY) 323: 721.
-
(2009)
Science (New York, NY)
, vol.323
, pp. 721
-
-
Lazer, D.1
Pentland, A.S.2
Adamic, L.3
Aral, S.4
Barabasi, A.L.5
-
3
-
-
84867325145
-
Quantifying the impact of human mobility on malaria
-
Wesolowski A, Eagle N, Tatem AJ, Smith DL, Noor AM, et al. (2012) Quantifying the impact of human mobility on malaria. Science 338: 267-270.
-
(2012)
Science
, vol.338
, pp. 267-270
-
-
Wesolowski, A.1
Eagle, N.2
Tatem, A.J.3
Smith, D.L.4
Noor, A.M.5
-
4
-
-
77953058692
-
Network diversity and economic development
-
Eagle N, Macy M, Claxton R (2010) Network diversity and economic development. Science 328: 1029-1031.
-
(2010)
Science
, vol.328
, pp. 1029-1031
-
-
Eagle, N.1
Macy, M.2
Claxton, R.3
-
8
-
-
84896624238
-
On the trusted use of large-scale personal data
-
de Montjoye YA, Wang SS, Pentland A, Anh DTT, Datta A, et al. (2012) On the trusted use of large-scale personal data. IEEE Data Eng Bull 35: 5-8.
-
(2012)
IEEE Data Eng Bull
, vol.35
, pp. 5-8
-
-
De Montjoye, Y.A.1
Wang, S.S.2
Pentland, A.3
Anh, D.T.T.4
Datta, A.5
-
9
-
-
82755165171
-
Better data for a better internet
-
Palfrey J, Zittrain J (2011) Better data for a better internet. Science 334: 1210-1211.
-
(2011)
Science
, vol.334
, pp. 1210-1211
-
-
Palfrey, J.1
Zittrain, J.2
-
12
-
-
0002244627
-
A personal digital store
-
Bell G (2001) A personal digital store. Communications of the ACM 44: 86-91.
-
(2001)
Communications of the ACM
, vol.44
, pp. 86-91
-
-
Bell, G.1
-
13
-
-
0141502168
-
The personal server: Changing the way we think about ubiquitous computing
-
Want R, Pering T, Danneels G, Kumar M, Sundar M, et al. (2002) The personal server: Changing the way we think about ubiquitous computing. Ubicomp 2002: Ubiquitous Computing: 223-230.
-
(2002)
Ubicomp 2002: Ubiquitous Computing
, pp. 223-230
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
-
14
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
ACM
-
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review. ACM, volume 39, pp. 135-146.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
15
-
-
79951609419
-
Personal data vaults: A locus of control for personal data streams
-
ACM
-
Mun M, Hao S, Mishra N, Shilton K, Burke J, et al. (2010) Personal data vaults: a locus of control for personal data streams. In: Proceedings of the 6th International Conference. ACM, p. 17.
-
(2010)
Proceedings of the 6th International Conference
, pp. 17
-
-
Mun, M.1
Hao, S.2
Mishra, N.3
Shilton, K.4
Burke, J.5
-
16
-
-
84870510126
-
Virtual individual servers as privacypreserving proxies for mobile devices
-
ACM
-
Cáceres R, Cox L, Lim H, Shakimov A, Varshavsky A (2009) Virtual individual servers as privacypreserving proxies for mobile devices. In: Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds. ACM, pp. 37-42.
-
(2009)
Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds
, pp. 37-42
-
-
Cáceres, R.1
Cox, L.2
Lim, H.3
Shakimov, A.4
Varshavsky, A.5
-
18
-
-
84904115700
-
-
website. Accessed 2014 May
-
Higgins website. URL http://www.eclipse.org/higgins/. Accessed 2014 May.
-
Higgins
-
-
-
19
-
-
84904123301
-
-
website. Accessed 2014 May
-
Mydex website. URL http://mydex.org/. Accessed 2014 May.
-
-
-
-
20
-
-
84904098433
-
-
website. Accessed 2014 May
-
Azigo website. URL https://www.azigo.com/. Accessed 2014 May.
-
-
-
-
21
-
-
84904131498
-
NSA tracking cellphone locations worldwide, snowden documents show
-
Gellman B, Soltani A (2013) NSA tracking cellphone locations worldwide, snowden documents show. The Washington Post.
-
(2013)
The Washington Post
-
-
Gellman, B.1
Soltani, A.2
-
22
-
-
84892743636
-
NSA prism program taps in to user data of apple, google and others
-
Greenwald G, MacAskill E (2013) NSA prism program taps in to user data of apple, google and others. The Guardian.
-
(2013)
The Guardian
-
-
Greenwald, G.1
MacAskill, E.2
-
26
-
-
84859931806
-
-
Accessed 2014 May
-
International Strategy for Cyberspace. URL http://www.whitehouse.gov/ sites/default/files/rss-viewer/internationalstrategy-cyberspace.pdf. Accessed 2014 May.
-
International Strategy for Cyberspace
-
-
-
27
-
-
36049042922
-
Property, privacy, and personal data
-
Schwartz P (2003) Property, privacy, and personal data. Harv L Rev 117: 2056.
-
(2003)
Harv L Rev
, vol.117
, pp. 2056
-
-
Schwartz, P.1
-
28
-
-
84904102830
-
-
website. Accessed 2014 May
-
Dropbox website. URL http://www.dropbox.com/. Accessed 2014 May.
-
-
-
-
29
-
-
84904091210
-
-
website. Accessed 2014 May
-
Carbonite Backup website. URL http://www.carbonite.com/en/. Accessed 2014 May.
-
Carbonite Backup
-
-
-
30
-
-
84983587906
-
Creating personalized systems that people can scrutinize and control: Drivers, principles and experience
-
Kay J, Kummerfeld B (2012) Creating personalized systems that people can scrutinize and control: Drivers, principles and experience. ACM Transactions on Interactive Intelligent Systems (TiiS) 2: 24.
-
(2012)
ACM Transactions on Interactive Intelligent Systems (TiiS)
, vol.2
, pp. 24
-
-
Kay, J.1
Kummerfeld, B.2
-
31
-
-
38049085243
-
Personisad: Distributed, active, scrutable model framework for context-aware services
-
Springer
-
Assad M, Carmichael DJ, Kay J, Kummerfeld B (2007) Personisad: Distributed, active, scrutable model framework for context-aware services. In: Pervasive Computing, Springer. pp. 55-72.
-
(2007)
Pervasive Computing
, pp. 55-72
-
-
Assad, M.1
Carmichael, D.J.2
Kay, J.3
Kummerfeld, B.4
-
32
-
-
84857711817
-
Uniqueness and how it impacts privacy in health-related social science datasets
-
ACM
-
Solomon A, Hill R, Janssen E, Sanders SA, Heiman JR (2012) Uniqueness and how it impacts privacy in health-related social science datasets. In: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. ACM, pp. 523-532.
-
(2012)
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
, pp. 523-532
-
-
Solomon, A.1
Hill, R.2
Janssen, E.3
Sanders, S.A.4
Heiman, J.R.5
-
33
-
-
35748946323
-
Data sharing threatens privacy
-
Butler D (2007) Data sharing threatens privacy. Nature 449: 644.
-
(2007)
Nature
, vol.449
, pp. 644
-
-
Butler, D.1
-
35
-
-
84904094838
-
-
website. Accessed 2014 May
-
The App Genome Project Lookout website. URL http://blog.myLookout.com/. Accessed 2014 May.
-
The App Genome Project Lookout
-
-
-
38
-
-
84874800284
-
Predicting personality using novel mobile phone-based metrics
-
Springer
-
de Montjoye YA, Quoidbach J, Robic F, Pentland AS (2013) Predicting personality using novel mobile phone-based metrics. In: Social Computing, Behavioral-Cultural Modeling and Prediction, Springer. pp. 48-55.
-
(2013)
Social Computing, Behavioral-Cultural Modeling and Prediction
, pp. 48-55
-
-
De Montjoye, Y.A.1
Quoidbach, J.2
Robic, F.3
Pentland, A.S.4
-
41
-
-
78751575843
-
Sabre: A sensitive attribute bucketization and redistribution framework for t-closeness
-
Cao J, Karras P, Kalnis P, Tan K (2011) Sabre: a sensitive attribute bucketization and redistribution framework for t-closeness. The VLDB Journal 20: 59-81.
-
(2011)
The VLDB Journal
, vol.20
, pp. 59-81
-
-
Cao, J.1
Karras, P.2
Kalnis, P.3
Tan, K.4
-
44
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Fung B, Wang K, Chen R, Yu P (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR) 42: 1-53.
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, pp. 1-53
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
46
-
-
2942524994
-
Location privacy in pervasive computing
-
IEEE
-
Beresford A, Stajano F (2003) Location privacy in pervasive computing. Pervasive Computing, IEEE 2: 46-55.
-
(2003)
Pervasive Computing
, vol.2
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
49
-
-
79960453927
-
Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies
-
Mascetti S, Freni D, Bettini C, Wang X, Jajodia S (2011) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The VLDB JournalThe International Journal on Very Large Data Bases 20: 541-566.
-
(2011)
The VLDB JournalThe International Journal on Very Large Data Bases
, vol.20
, pp. 541-566
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.4
Jajodia, S.5
-
50
-
-
77951200610
-
Finite state machines: Preserving privacy when data-mining cellular phone networks
-
Reades J (2010) Finite state machines: preserving privacy when data-mining cellular phone networks. Journal of Urban Technology 17: 29-40.
-
(2010)
Journal of Urban Technology
, vol.17
, pp. 29-40
-
-
Reades, J.1
-
51
-
-
78650868674
-
Movement data anonymity through generalization
-
Monreale A, Andrienko G, Andrienko N, Giannotti F, Pedreschi D, et al. (2010) Movement data anonymity through generalization. Transactions on Data Privacy 3: 91-121.
-
(2010)
Transactions on Data Privacy
, vol.3
, pp. 91-121
-
-
Monreale, A.1
Andrienko, G.2
Andrienko, N.3
Giannotti, F.4
Pedreschi, D.5
-
54
-
-
84857647532
-
Limiting disclosure of sensitive data in sequential releases of databases
-
Shmueli E, Tassa T, Wasserstein R, Shapira B, Rokach L (2012) Limiting disclosure of sensitive data in sequential releases of databases. Information Sciences 191: 98-127.
-
(2012)
Information Sciences
, vol.191
, pp. 98-127
-
-
Shmueli, E.1
Tassa, T.2
Wasserstein, R.3
Shapira, B.4
Rokach, L.5
-
59
-
-
84893250704
-
Dp-where: Differentially private modeling of human mobility
-
IEEE
-
Mir DJ, Isaacman S, Cáceres R, Martonosi M, Wright RN (2013) Dp-where: Differentially private modeling of human mobility. In: Big Data, 2013 IEEE International Conference on. IEEE, pp. 580-588.
-
(2013)
Big Data, 2013 IEEE International Conference on
, pp. 580-588
-
-
Mir, D.J.1
Isaacman, S.2
Cáceres, R.3
Martonosi, M.4
Wright, R.N.5
-
61
-
-
44849122540
-
Understanding individual human mobility patterns
-
DOI 10.1038/nature06958, PII NATURE06958
-
Gonzalez MC, Hidalgo CA, Barabasi AL (2008) Understanding individual human mobility patterns. Nature 453: 779-782. (Pubitemid 351793783)
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
63
-
-
84904111139
-
-
website. Accessed 2014 May
-
FunF website. URL http://www.funf.org/. Accessed 2014 May.
-
-
-
-
66
-
-
84904095263
-
-
Behav.io website. Accessed 2014 May
-
Behav.io website. URL http://behav.io/. Accessed 2014 May.
-
-
-
-
72
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
-
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decision support systems 43: 618-644. (Pubitemid 46216533)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
73
-
-
84865546068
-
Cloudpolice: Taking access control out of the network
-
ACM
-
Popa L, Yu M, Ko S, Ratnasamy S, Stoica I (2010) Cloudpolice: taking access control out of the network. In: Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, p. 7.
-
(2010)
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks
, pp. 7
-
-
Popa, L.1
Yu, M.2
Ko, S.3
Ratnasamy, S.4
Stoica, I.5
|