메뉴 건너뛰기




Volumn 7, Issue 12, 2014, Pages 2728-2742

Privacy in the internet of things: Threats and challenges

Author keywords

Internet of things; Legislation; Privacy; Privacy enhancing technology; Threats

Indexed keywords

DATA PRIVACY; LAWS AND LEGISLATION; PRIVACY BY DESIGN;

EID: 84911900606     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.795     Document Type: Article
Times cited : (434)

References (97)
  • 1
    • 84877727033 scopus 로고    scopus 로고
    • The Internet of Things-how the next evolution of the internet is changing everything
    • Evans D. The Internet of Things-how the next evolution of the internet is changing everything. CISCO White Paper 2011.
    • (2011) CISCO White Paper
    • Evans, D.1
  • 2
    • 84871374016 scopus 로고    scopus 로고
    • Wireless visions: a look to the future by the fellows of the wwrf
    • David K, Jefferies N. Wireless visions: a look to the future by the fellows of the wwrf. IEEE Vehicular Technology Magazine 2012; 7(4): 26-36, doi:10.1109/MVT.2012.2218433.
    • (2012) IEEE Vehicular Technology Magazine , vol.7 , Issue.4 , pp. 26-36
    • David, K.1    Jefferies, N.2
  • 3
    • 78650501473 scopus 로고    scopus 로고
    • From the internet of computers to the internet of things
    • Sachs K, Petrov I, Guerrero P (eds). Springer-Verlag: Berlin, Heidelberg
    • Mattern F, Floerkemeier C. From the internet of computers to the internet of things. In From Active Data Management to Event-Based Systems and More, Sachs K, Petrov I, Guerrero P (eds). Springer-Verlag: Berlin, Heidelberg, 2010; 242-259.
    • (2010) From Active Data Management to Event-Based Systems and More , pp. 242-259
    • Mattern, F.1    Floerkemeier, C.2
  • 4
    • 84911869403 scopus 로고    scopus 로고
    • IOT-I: Internet of Things Initiative: public deliverables-D2.1: initial report on IoT applications of strategic interest
    • Presser M, Krco S. IOT-I: Internet of Things Initiative: public deliverables-D2.1: initial report on IoT applications of strategic interest, 2010.
    • (2010)
    • Presser, M.1    Krco, S.2
  • 5
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: a survey
    • Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Computer Networks 2010; 54(15): 2787-2805, doi:10.1016/j.comnet.2010.05.010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 6
    • 84860076265 scopus 로고    scopus 로고
    • Benetton to Tag 15 Million Items
    • (Accessed 2012-09-25).
    • Benetton to Tag 15 Million Items. RFID Journal, 2003. Available at: http://bit.ly/XXe4Wi (Accessed 2012-09-25).
    • (2003) RFID Journal
  • 7
    • 84911874821 scopus 로고    scopus 로고
    • Boycott Benetton-no RFID tracking chips in clothing!
    • Press Release, (Accessed 2012-09-25).
    • Albrecht K. Boycott Benetton-no RFID tracking chips in clothing! Press Release, 2003. Available at: http://bit.ly/49yTca (Accessed 2012-09-25).
    • (2003)
    • Albrecht, K.1
  • 8
    • 84865333358 scopus 로고    scopus 로고
    • No to mandatory smart metering does not equal privacy!
    • Tilburg Institute for Law, Technology, and Society: Webblog
    • Cuijpers C. No to mandatory smart metering does not equal privacy! Tilburg Institute for Law, Technology, and Society: Webblog, 2009.
    • (2009)
    • Cuijpers, C.1
  • 9
    • 84911903592 scopus 로고    scopus 로고
    • INDECT project, (Accessed 2012-10-12).
    • The INDECT Consortium. INDECT project, 2009. Available at: http://www.indect-project.eu/ (Accessed 2012-10-12).
    • (2009)
  • 10
    • 84911928740 scopus 로고    scopus 로고
    • STOPP INDECT, (Accessed 2012-10-12).
    • Münch V. STOPP INDECT, 2012. Available at: http://www.stopp-indect.info (Accessed 2012-10-12).
    • (2012)
    • Münch, V.1
  • 11
    • 78149487947 scopus 로고    scopus 로고
    • Privacy: aspects, definitions and a multi-faceted privacy preservation approach
    • Information Security for South Africa (ISSA), 2010
    • Renaud K, Gáandlvez Cruz D. Privacy: aspects, definitions and a multi-faceted privacy preservation approach, Information Security for South Africa (ISSA), 2010, 2010; 1-8, doi:10.1109/ISSA.2010.5588297.
    • (2010) , pp. 1-8
    • Renaud, K.1    Gáandlvez Cruz, D.2
  • 13
    • 84964614826 scopus 로고    scopus 로고
    • Towards a model for security and privacy in the internet of things
    • 1st International Workshop on the Security of the Internet of Things, Tokyo, Japan
    • Radomirovic S. Towards a model for security and privacy in the internet of things, 1st International Workshop on the Security of the Internet of Things, Tokyo, Japan, 2010; 1-487.
    • (2010) , pp. 1-487
    • Radomirovic, S.1
  • 16
    • 33646771783 scopus 로고    scopus 로고
    • The Internet of Things. ITU Internet Reports
    • International Telecommunication Union (ITU). The Internet of Things. ITU Internet Reports, 2005.
    • (2005)
  • 18
    • 84911896438 scopus 로고    scopus 로고
    • IOT-I: Internet of Things Initiative: Public Deliverables - D1.2 First Reference Model White Paper
    • Bauer M, Carrez F, Egan R, et al.IOT-I: Internet of Things Initiative: Public Deliverables - D1.2 First Reference Model White Paper, 2011.
    • (2011)
    • Bauer, M.1    Carrez, F.2    Egan, R.3
  • 19
    • 84911877027 scopus 로고    scopus 로고
    • IOT-A Consortium. Internet of Things architecture. (Accessed 2012-10-12).
    • IOT-A Consortium. Internet of Things architecture, 2011. Available at: http://bit.ly/124jw0M (Accessed 2012-10-12).
    • (2011)
  • 20
    • 84911875131 scopus 로고    scopus 로고
    • IP for smart objects. Ipso alliance white paper
    • Dunkels A, Vasseur J. IP for smart objects. Ipso alliance white paper, 2008.
    • (2008)
    • Dunkels, A.1    Vasseur, J.2
  • 21
    • 84911921744 scopus 로고
    • Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data
    • Organisation for Economic Co-operation and Development (OECD). Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data, 1980.
    • (1980)
  • 22
    • 84911879378 scopus 로고
    • Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • The European Parliament and the Council of the European Union. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data, 1995.
    • (1995)
  • 23
    • 84911912137 scopus 로고    scopus 로고
    • The U.S.-EU & U.S.-Swiss Safe Harbor Frameworks (Accessed 2012-10-12).
    • US Department of Commerce. The U.S.-EU & U.S.-Swiss Safe Harbor Frameworks, 2012. Available at: http://export.gov/safeharbor/ (Accessed 2012-10-12).
    • (2012)
  • 24
    • 84911898729 scopus 로고    scopus 로고
    • Chronology of Data Breaches 2005-present (Accessed: 2012-10-12).
    • Privacy Rights Clearinghouse. Chronology of Data Breaches 2005-present, 2012. Available at: http://bit.ly/bHHODz (Accessed: 2012-10-12).
    • (2012)
  • 25
  • 26
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • Roman R, Najera P, Lopez J. Securing the Internet of Things. Computer 2011; 44(9): 51-58, doi:10.1109/MC.2011.291.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 27
    • 84911924682 scopus 로고    scopus 로고
    • Hewlett Packard - CENSE (Accessed 2013-01-31).
    • Hewlett Packard - CENSE, 2013. Available at: http://bit.ly/7N763 (Accessed 2013-01-31).
    • (2013)
  • 28
    • 84911886067 scopus 로고    scopus 로고
    • IBM-making markets: smarter planet, (Accessed 2013-01-31).
    • Jon Iwata. IBM-making markets: smarter planet, 2012. Available at: http://ibm.co/X8warV (Accessed 2013-01-31).
    • (2012)
    • Iwata, J.1
  • 29
    • 67349277665 scopus 로고    scopus 로고
    • Building the internet of things using RFID: the RFID ecosystem experience
    • Welbourne E, Battle L, Cole G, et al. Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computing 2009; 13(3): 48-55.
    • (2009) IEEE Internet Computing , vol.13 , Issue.3 , pp. 48-55
    • Welbourne, E.1    Battle, L.2    Cole, G.3
  • 30
    • 84911903516 scopus 로고    scopus 로고
    • Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012-2017. CISCO white paper
    • Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012-2017. CISCO white paper, 2013.
    • (2013)
  • 31
    • 84911909178 scopus 로고    scopus 로고
    • Intel: xhips in brains will control computers by 2020
    • Computerworld (Accessed: 2013-01-31).
    • Gaudin S. Intel: xhips in brains will control computers by 2020. Computerworld, 2009. Available at: http://bit.ly/yYyoF (Accessed: 2013-01-31).
    • (2009)
    • Gaudin, S.1
  • 35
    • 84911862744 scopus 로고    scopus 로고
    • Google will pay $22.5 million to settle ftc charges it misrepresented privacy assurances to users of Apple's Safari Internet Browser, Available at: (Accessed 2012-10-12].
    • Federal Trade Commission. Google will pay $22.5 million to settle ftc charges it misrepresented privacy assurances to users of Apple's Safari Internet Browser, 2005. Available at: http://1.usa.gov/MkXMqe (Accessed 2012-10-12].
    • (2005)
  • 36
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser M. The computer for the 21st century. Scientific American 1991; 265(3): 94-104.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 38
    • 84866034380 scopus 로고    scopus 로고
    • The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization
    • Atzori L, Iera A, Morabito G, Nitti M. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization. Computer Networks 2012; 56(16): 3594-3608.
    • (2012) Computer Networks , vol.56 , Issue.16 , pp. 3594-3608
    • Atzori, L.1    Iera, A.2    Morabito, G.3    Nitti, M.4
  • 39
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 2006; 24(2): 381-394, doi:10.1109/JSAC.2005.861395.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 40
    • 67650674080 scopus 로고    scopus 로고
    • A survey of RFID privacy approaches
    • Langheinrich M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing 2009; 13(6): 413-421, doi:10.1007/s00779-008-0213-4.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 413-421
    • Langheinrich, M.1
  • 41
    • 79958007947 scopus 로고    scopus 로고
    • 50 ways to break RFID privacy
    • IFIP Advances in Information and Communication Technology. Springer: Boston
    • van Deursen T. 50 ways to break RFID privacy. In Privacy and Identity Management for Life, vol.352, IFIP Advances in Information and Communication Technology. Springer: Boston, 2011; 192-205, doi:10.1007/978-3-642-20769-3 16.
    • (2011) Privacy and Identity Management for Life , vol.352 , pp. 192-205
    • van Deursen, T.1
  • 42
    • 84911932177 scopus 로고    scopus 로고
    • ZigBee Alliance. ZigBee specification
    • ZigBee Alliance. ZigBee specification, 2006.
    • (2006)
  • 43
    • 84911911575 scopus 로고    scopus 로고
    • Z-Wave Alliance. The Z-Wave Alliance (Accessed 2012-10-12).
    • Z-Wave Alliance. The Z-Wave Alliance, 2012. Available at: http://www.z-wavealliance.org/ (Accessed 2012-10-12).
    • (2012)
  • 44
    • 84911948087 scopus 로고    scopus 로고
    • (Accessed 2012-10-12).
    • ANT wireless-Dynastream Innovations Inc. Availabe at: http://www.thisisant.com/ (Accessed 2012-10-12).
  • 45
    • 84911880707 scopus 로고    scopus 로고
    • Bluetooth SIG. Specification of the Bluetooth system, (Accessed 2012-10-12).
    • Bluetooth SIG. Specification of the Bluetooth system, 2001. Available at: http://www.bluetooth.com (Accessed 2012-10-12).
    • (2001)
  • 46
    • 49149125693 scopus 로고    scopus 로고
    • GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution), Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. PERCOM 2008, Hong Kong, China
    • Zhang W, Wang C, Feng T. GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution), Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. PERCOM 2008, Hong Kong, China, 2008; 179-184.
    • (2008) , pp. 179-184
    • Zhang, W.1    Wang, C.2    Feng, T.3
  • 47
    • 79952493402 scopus 로고    scopus 로고
    • A security framework for privacy-preserving data aggregation in wireless sensor networks
    • Chan ACF, Castelluccia C. A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2011; 7(4): 1-45. doi:10.1145/1921621.1921623.
    • (2011) ACM Transactions on Sensor Networks (TOSN) , vol.7 , Issue.4 , pp. 1-45
    • Chan, A.C.F.1    Castelluccia, C.2
  • 48
    • 48049100992 scopus 로고    scopus 로고
    • 4th Annual IEEE Communications Society Conference on Sensor, Mesh and ad Hoc Communications and Networks, 2007. SECON '07, San Diego, CA, USA
    • Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks, 4th Annual IEEE Communications Society Conference on Sensor, Mesh and ad Hoc Communications and Networks, 2007. SECON '07, San Diego, CA, USA, 2007; 203-212, doi:10.1109/SAHCN.2007.4292832.
    • (2007) Query privacy in wireless sensor networks , pp. 203-212
    • Carbunar, B.1    Yu, Y.2    Shi, L.3    Pearce, M.4    Vasudevan, V.5
  • 49
    • 84863522640 scopus 로고    scopus 로고
    • Distributed privacy-preserving access control in sensor networks
    • Zhang R, Zhang Y, Ren K. Distributed privacy-preserving access control in sensor networks. IEEE Transactions on Parallel and Distributed Systems 2012; 23(8): 1427-1438, doi:10.1109/TPDS.2011.299.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.8 , pp. 1427-1438
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 51
    • 32644437991 scopus 로고    scopus 로고
    • Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
    • Special Issue on Security in Wireless Mobile Computing Systems. Elsevier Science Publishers B.V.: Amsterdam, The Netherlands
    • Deng J, Han R, Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. In Elsevier Pervasive and Mobile Computing Journal, vol.2, Special Issue on Security in Wireless Mobile Computing Systems. Elsevier Science Publishers B.V.: Amsterdam, The Netherlands, 2006; 159-186.
    • (2006) Elsevier Pervasive and Mobile Computing Journal , vol.2 , pp. 159-186
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 52
    • 84865603465 scopus 로고    scopus 로고
    • Robust probabilistic fake packet injection for receiver-location privacy in WSN
    • LNCS. Springer: Berlin, Heidelberg
    • Rios R, Cuellar J, Lopez J. Robust probabilistic fake packet injection for receiver-location privacy in WSN. In 17th European Symposium on Research in Computer Security (ESORICS 2012), vol.7459, LNCS. Springer: Berlin, Heidelberg, 2012; 163-180, doi:10.1007/978-3-642-33167-1 10.
    • (2012) 17th European Symposium on Research in Computer Security (ESORICS 2012) , vol.7459 , pp. 163-180
    • Rios, R.1    Cuellar, J.2    Lopez, J.3
  • 53
    • 84911938513 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse. Privacy in the age of the smartphone,(Accessed 2012-10-12).
    • Privacy Rights Clearinghouse. Privacy in the age of the smartphone, 2005. Available at: http://bit.ly/NkNlyM (Accessed 2012-10-12).
    • (2005)
  • 54
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford A, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing 2003; 2(1): 46-55, doi:10.1109/MPRV.2003.1186725.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 56
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm J. A survey of computational location privacy. Personal Ubiquitous Computing 2009; 13(6): 391-399, doi:10.1007/s00779-008-0212-5.
    • (2009) Personal Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 60
    • 80052696161 scopus 로고    scopus 로고
    • A survey on privacy in mobile participatory sensing applications
    • Christin D, Reinhardt A, Kanhere SS, Hollick M. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 2011; 84(11): 1928-1946, doi:10.1016/j.jss.2011.06.073.
    • (2011) Journal of Systems and Software , vol.84 , Issue.11 , pp. 1928-1946
    • Christin, D.1    Reinhardt, A.2    Kanhere, S.S.3    Hollick, M.4
  • 61
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, Chicago, IL, USA
    • Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, Chicago, IL, USA, 2009; 199-212, doi:10.1145/1653662.1653687.
    • (2009) , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 62
    • 77957933159 scopus 로고    scopus 로고
    • Preventing information leakage from indexing in the cloud, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, Florida, USA
    • Squicciarini A, Sundareswaran S, Lin D. Preventing information leakage from indexing in the cloud, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, Florida, USA, 2010; 188-195, doi:10.1109/CLOUD.2010.82.
    • (2010) , pp. 188-195
    • Squicciarini, A.1    Sundareswaran, S.2    Lin, D.3
  • 63
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA
    • Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing, 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 2010; 1-9, doi:10.1109/INFCOM.2010.5462173.
    • (2010) , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 64
    • 77950587463 scopus 로고    scopus 로고
    • Privacy as a service: privacy-aware data storage and processing in cloud computing architectures
    • Eighth IEEE international Conference on Dependable, Autonomic and Secure Computing, 2009. DASC '09, Changzhou, China
    • Itani W, Kayssi A, Chehab A. Privacy as a service: privacy-aware data storage and processing in cloud computing architectures, Eighth IEEE international Conference on Dependable, Autonomic and Secure Computing, 2009. DASC '09, Changzhou, China, 2009; 711-716, doi:10.1109/DASC.2009.139.
    • (2009) , pp. 711-716
    • Itani, W.1    Kayssi, A.2    Chehab, A.3
  • 65
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • HotSec'10. USENIX Association: Berkeley, CA, USA
    • VanDijk M, Juels A. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec'10. USENIX Association: Berkeley, CA, USA, 2010; 1-8.
    • (2010) Proceedings of the 5th USENIX Conference on Hot Topics in Security , pp. 1-8
    • VanDijk, M.1    Juels, A.2
  • 66
    • 84911933782 scopus 로고    scopus 로고
    • COSM-connect to your world, (Accessed 2013-01-30).
    • COSM-connect to your world, 2013. Available at: https://cosm.com/ (Accessed 2013-01-30).
    • (2013)
  • 67
    • 84911875734 scopus 로고    scopus 로고
    • ARRAYENT-the platform for connected products (Accessed 2013-01-30).
    • ARRAYENT-the platform for connected products, 2013. Available at: http://www.arrayent.com/ (Accessed 2013-01-30).
    • (2013)
  • 68
    • 84911896255 scopus 로고    scopus 로고
    • Auto-ID Labs. Architecting the Internet of things (Accessed 2013-02-04).
    • Auto-ID Labs. Architecting the Internet of things, 2013. Available at: http://www.autoidlabs.org/ (Accessed 2013-02-04).
    • (2013)
  • 69
    • 70349286554 scopus 로고    scopus 로고
    • A capacitive touch interface for passive RFID tags
    • 2009 IEEE International Conference on RFID
    • Sample A, Yeager D, Smith J. A capacitive touch interface for passive RFID tags, 2009 IEEE International Conference on RFID, 2009; 103-109, doi:10.1109/RFID.2009.4911212.
    • (2009) , pp. 103-109
    • Sample, A.1    Yeager, D.2    Smith, J.3
  • 70
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: measuring individuals' concerns about organizational practices
    • Smith H, Milberg S, Burke S. Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 1996: 167-196.
    • (1996) MIS Quarterly , pp. 167-196
    • Smith, H.1    Milberg, S.2    Burke, S.3
  • 73
    • 84911940069 scopus 로고    scopus 로고
    • Facedeals lets you check in to venues with your face
    • WIRED Magazine (Accessed 2012-10-12).
    • Solon O. Facedeals lets you check in to venues with your face. WIRED Magazine, 2012. Available at: http://bit.ly/Pdgsry (Accessed 2012-10-12).
    • (2012)
    • Solon, O.1
  • 74
    • 84911891566 scopus 로고    scopus 로고
    • Siris großer Bruder. Technology Review (Accessed 2012-10-12).
    • Talbot D. Siris großer Bruder. Technology Review, 2012. Avaible at: http://bit.ly/RUyLBS (Accessed 2012-10-12).
    • (2012)
    • Talbot, D.1
  • 77
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: a survey of recent developments
    • 14:1-14:53
    • Fung B, Wang K, Chen R, Yu P. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys 2010; 42(4): 14:1-14:53, doi:10.1145/1749603.1749605.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.1    Wang, K.2    Chen, R.3    Yu, P.4
  • 80
    • 84911947752 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher no. 4417749. New York Times (Accessed 2012-10-12).
    • Barbaro M, Zeller T. A face is exposed for AOL searcher no. 4417749. New York Times, 2006. Available at: http://nyti.ms/H6vd2 (Accessed 2012-10-12).
    • (2006)
    • Barbaro, M.1    Zeller, T.2
  • 81
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of "personally identifiable information"
    • Narayanan A, Shmatikov V. Myths and fallacies of "personally identifiable information". Communications of the ACM 2010; 53: 24-26, doi:10.1145/1743546.1743558.
    • (2010) Communications of the ACM , vol.53 , pp. 24-26
    • Narayanan, A.1    Shmatikov, V.2
  • 82
    • 82555187188 scopus 로고    scopus 로고
    • A systematic review of re-identification attacks on health data
    • ElEmam K, Jonker E, Arbuckle L, Malin B. A systematic review of re-identification attacks on health data. PLoS ONE 2011; 6(12), doi:10.1371/journal.pone.0028071.
    • (2011) PLoS ONE , vol.6 , Issue.12
    • ElEmam, K.1    Jonker, E.2    Arbuckle, L.3    Malin, B.4
  • 83
    • 85008013311 scopus 로고    scopus 로고
    • Stalked by satellite-an alarming rise in GPS-enabled harassment
    • Voelcker J. Stalked by satellite-an alarming rise in GPS-enabled harassment. IEEE Spectrum 2006; 43(7): 15-16, doi:10.1109/MSPEC.2006.1652998.
    • (2006) IEEE Spectrum , vol.43 , Issue.7 , pp. 15-16
    • Voelcker, J.1
  • 84
    • 78650620182 scopus 로고    scopus 로고
    • Privacy in location-based services: a system architecture perspective
    • Chow C, Mokbel M. Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 2009; 1(2): 23-27, doi:10.1145/1567253.1567258.
    • (2009) SIGSPATIAL Special , vol.1 , Issue.2 , pp. 23-27
    • Chow, C.1    Mokbel, M.2
  • 85
    • 84862777858 scopus 로고    scopus 로고
    • Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
    • Toch E, Wang Y, Cranor LF. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction 2012; 22(1): 203-220, doi:10.1007/s11257-011-9110-z.
    • (2012) User Modeling and User-Adapted Interaction , vol.22 , Issue.1 , pp. 203-220
    • Toch, E.1    Wang, Y.2    Cranor, L.F.3
  • 86
    • 84911943657 scopus 로고    scopus 로고
    • Path Intelligence. Pedestrian measurement (Accessed 2013-01-31).
    • Path Intelligence. Pedestrian measurement, 2012. Available at: http://www.pathintelligence.com/ (Accessed 2013-01-31).
    • (2012)
  • 87
    • 84911915590 scopus 로고    scopus 로고
    • Nearbuy. Nearbuy micro location (Accessed 2013-02-04).
    • Nearbuy. Nearbuy micro location, 2013. Available at: http://bit.ly/14XgkE6 (Accessed 2013-02-04).
    • (2013)
  • 88
    • 78650620182 scopus 로고    scopus 로고
    • Privacy in location-based services: a system architecture perspective
    • Chow C, Mokbel M. Privacy in location-based services: a system architecture perspective. Sigspatial Special 2009; 1(2): 23-27.
    • (2009) Sigspatial Special , vol.1 , Issue.2 , pp. 23-27
    • Chow, C.1    Mokbel, M.2
  • 89
    • 1142268161 scopus 로고    scopus 로고
    • Privacy, economics, and price discrimination on the internet
    • ICEC '03. ACM: New York, NY, USA
    • Odlyzko A. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03. ACM: New York, NY, USA, 2003; 355-366, doi:10.1145/948005.948051.
    • (2003) Proceedings of the 5th International Conference on Electronic Commerce , pp. 355-366
    • Odlyzko, A.1
  • 90
    • 84911885405 scopus 로고    scopus 로고
    • Apple-nutzer zahlen mehr für hotelzimmer (Accessed 2012-10-12).
    • Kwasniewski N. Apple-nutzer zahlen mehr für hotelzimmer, 2012. Availabe at: http://bit.ly/MRBTwT (Accessed 2012-10-12).
    • (2012)
    • Kwasniewski, N.1
  • 91
    • 23944463649 scopus 로고    scopus 로고
    • The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
    • CITC5 '04. ACM: New York, NY, USA
    • Orgill G, Romney G, Bailey M, Orgill P. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In Proceedings of the 5th Conference on Information Technology Education, CITC5 '04. ACM: New York, NY, USA, 2004; 177-181, doi:10.1145/1029533.1029577.
    • (2004) Proceedings of the 5th Conference on Information Technology Education , pp. 177-181
    • Orgill, G.1    Romney, G.2    Bailey, M.3    Orgill, P.4
  • 92
    • 84911865789 scopus 로고    scopus 로고
    • Social networks scan for sexual predators, with uneven results. Reuters (Accessed 2013-02-07).
    • Menn J. Social networks scan for sexual predators, with uneven results. Reuters, 2012. Available at: http://reut.rs/Nnejb7 (Accessed 2013-02-07).
    • (2012)
    • Menn, J.1
  • 93
    • 38849161575 scopus 로고    scopus 로고
    • Privacy-enhanced web personalization
    • Springer-Verlag: Berlin, Heidelberg
    • Kobsa A. Privacy-enhanced web personalization. In The Adaptive Web. Springer-Verlag: Berlin, Heidelberg, 2007; 628-670.
    • (2007) The Adaptive Web , pp. 628-670
    • Kobsa, A.1
  • 95
    • 84911920239 scopus 로고    scopus 로고
    • Woman finds disturbing nude photos on 'new' smartphone (Accessed 2012-10-12).
    • Woman finds disturbing nude photos on 'new' smartphone, 2012. Available at: http://nbcnews.to/Qpqg0w (Accessed 2012-10-12).
    • (2012)
  • 97
    • 84911924986 scopus 로고    scopus 로고
    • Most burglars using Facebook and Twitter to target victims, survey suggests
    • The Telegraph (Accessed 2013-02-07).
    • Bloxham A. Most burglars using Facebook and Twitter to target victims, survey suggests. The Telegraph, 2011. Available at: http://bit.ly/pOL8MX (Accessed 2013-02-07).
    • (2011)
    • Bloxham, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.