-
5
-
-
77957594024
-
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
-
Ohm, P.: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57, 1701-1765 (2010)
-
(2010)
UCLA Law Review
, vol.57
, pp. 1701-1765
-
-
Ohm, P.1
-
6
-
-
65449163899
-
Discrimination-aware Data Mining
-
ACMAugust
-
Pedreschi, D., Ruggieri, S., Turini, F.: Discrimination-aware Data Mining. In: 14th ACM International Conference on Knowledge Discovery and Data Mining (KDD 2008), pp. 560-568. ACM (August 2008)
-
(2008)
14Th ACM International Conference on Knowledge Discovery and Data Mining (KDD 2008)
, pp. 560-568
-
-
Pedreschi, D.1
Ruggieri, S.2
Turini, F.3
-
8
-
-
84856043672
-
The mathematical theory of communication
-
Shannon, C.E.: The mathematical theory of communication. Bell Systems Technology Journal 27, 379-423, 623-656 (1948)
-
(1948)
Bell Systems Technology Journal
, vol.27
-
-
Shannon, C.E.1
-
9
-
-
84890522850
-
Communications theory of secrecy systems
-
Shannon, C.E.: Communications theory of secrecy systems. Bell Systems Technology Journal 28, 656-715 (1949)
-
(1949)
Bell Systems Technology Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
11
-
-
27344448355
-
Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
-
December
-
Taipale, K.A.: Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd. Yale Journal of Law and Technology 7(123) (December 2004)
-
(2004)
Yale Journal of Law and Technology
, vol.7
, Issue.123
-
-
Taipale, K.A.1
-
12
-
-
78649284508
-
Audience Segregation in Social Network Sites
-
IEEE, Minneapolis
-
Van den Berg, B., Leenes, R.: Audience Segregation in Social Network Sites. In: Proceedings for SocialCom2010/PASSAT2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust), pp. 1111-1117. IEEE, Minneapolis (2010)
-
(2010)
Proceedings for Socialcom2010/Passat2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust)
, pp. 1111-1117
-
-
Van Den Berg, B.1
Leenes, R.2
-
13
-
-
10944246068
-
KDD: The Challenge to Individualism
-
Vedder, A.H.: KDD: The Challenge to Individualism. Ethics and Information Technology (1), 275-281 (1999)
-
(1999)
Ethics and Information Technology
, Issue.1
, pp. 275-281
-
-
Vedder, A.H.1
-
15
-
-
0000320829
-
The right to privacy; the implicit made explicit
-
Warren, S.D., Brandeis, L.D.: The right to privacy; the implicit made explicit. Harvard Law Review, 193-220 (1890)
-
(1890)
Harvard Law Review
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
18
-
-
33645796029
-
Mine Your Own Business!: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion
-
Zarsky, T.Z.: “Mine Your Own Business!”: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion. Yale Journal of Law & Technology 5, 56 (2003)
-
(2003)
Yale Journal of Law & Technology
, vol.5
, pp. 56
-
-
Zarsky, T.Z.1
|