-
4
-
-
84914126273
-
-
Accessed: Nov 11
-
"Facebook and Twitter Postings Cost CFO His Job," http://online.wsj.com/articles/SB10001424052702303505504577404542168061590, Accessed: Nov 11, 2013.
-
(2013)
Facebook and Twitter Postings Cost CFO His Job
-
-
-
7
-
-
84914094510
-
-
"Quora," http://quora.com/.
-
Quora
-
-
-
8
-
-
84914097373
-
-
Accessed: Nov 9
-
"Google Policies and Principles," http://www.google.com/policies/privacy/key-terms/#toc-terms-info, Accessed: Nov 9, 2013.
-
(2013)
Google Policies and Principles
-
-
-
9
-
-
84914126270
-
-
Accessed: Nov 10
-
"Microsoft Advertising Creative Acceptance Policy Guide," http://advertising.microsoft.com/en-uk/WWDocs/User/display/cl/content standard/2007/global/Microsoft-Advertising-Creative-Acceptance-Policy-Guide.pdf, Accessed: Nov 10, 2013.
-
(2013)
Microsoft Advertising Creative Acceptance Policy Guide
-
-
-
10
-
-
84914094397
-
-
Accessed: Nov 9
-
"Facebook Advertising Guidelines," https://www.facebook.com/ad guidelines.php, Accessed: Nov 9, 2013.
-
(2013)
Facebook Advertising Guidelines
-
-
-
11
-
-
84914126269
-
-
Accessed: Nov 10
-
"CNIL: Questionnaire to Google," http://www.cnil.fr/fileadmin/documents/La CNIL/actualite/questionnaire to Google-2012-03-16.pdf, Accessed: Nov 10, 2013.
-
(2013)
CNIL: Questionnaire to Google
-
-
-
12
-
-
84900546698
-
-
Accessed: Nov 11
-
"Google Consumer Surveys," http://www.google.com/insights/consumersurveys/home, Accessed: Nov 11, 2013.
-
(2013)
Google Consumer Surveys
-
-
-
13
-
-
84902595482
-
-
Accessed: Nov 9
-
"Google Privacy Policy," http://www.google.com/policies/privacy/, Accessed: Nov 9, 2013.
-
(2013)
Google Privacy Policy
-
-
-
15
-
-
84914126267
-
-
"CNIL," http://www.cnil.fr/english/the-cnil/constitution-and-composition.
-
CNIL
-
-
-
20
-
-
84862971583
-
I regretted the minute I pressed share: A qualitative study of regrets on Facebook
-
Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, "'I regretted the minute I pressed share': a qualitative study of regrets on Facebook," in Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS), 2011, pp. 10:1-10:16.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS)
, pp. 1-16
-
-
Wang, Y.1
Norcie, G.2
Komanduri, S.3
Acquisti, A.4
Leon, P.G.5
Cranor, L.F.6
-
24
-
-
84914126263
-
-
Accessed: Nov 4
-
C. Breen, "Why I left Facebook," http://www.pcworld.com/article/196237/article.html, Accessed: Nov 4, 2013.
-
(2013)
Why I Left Facebook
-
-
Breen, C.1
-
25
-
-
84914126262
-
-
Accessed: Nov 4
-
J. V. Grove, "Why teens are tiring of Facebook," http://news.cnet.com/8301-1023 3-57572154-93/why-teens-are-tiring-of-facebook/, Accessed: Nov 4, 2013.
-
(2013)
Why Teens Are Tiring of Facebook
-
-
Grove, J.V.1
-
26
-
-
84862075973
-
Talking in circles: Selective sharing in Google+
-
S. Kairam, M. Brzozowski, D. Huffaker, and E. Chi, "Talking in circles: selective sharing in Google+," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2012, pp. 1065-1074.
-
(2012)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)
, pp. 1065-1074
-
-
Kairam, S.1
Brzozowski, M.2
Huffaker, D.3
Chi, E.4
-
27
-
-
84882750204
-
An analysis of private browsing modes in modern browsers
-
G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh, "An analysis of private browsing modes in modern browsers," in Proceedings of the 19th USENIX Conference on Security, 2010, pp. 79-94.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
, pp. 79-94
-
-
Aggarwal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
29
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
-
Apr.
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments," Geoinformatica, vol. 15, no. 2, pp. 351-380, Apr. 2011.
-
(2011)
Geoinformatica
, vol.15
, Issue.2
, pp. 351-380
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
30
-
-
85132398985
-
4chan and/b: An analysis of anonymity and ephemerality in a large online community
-
M. S. Bernstein, A. Monroy-Hernández, D. Harry, P. André, K. Panovich, and G. G. Vargas, "4chan and/b: An analysis of anonymity and ephemerality in a large online community." in ICWSM, 2011.
-
(2011)
ICWSM
-
-
Bernstein, M.S.1
Monroy-Hernández, A.2
Harry, D.3
André, P.4
Panovich, K.5
Vargas, G.G.6
-
32
-
-
84865627016
-
Complete anonymity compromises the accuracy of self-reports
-
Y. Lelkes, J. A. Krosnick, D. M. Marx, C. M. Judd, and B. Park, "Complete anonymity compromises the accuracy of self-reports," Journal of Experimental Social Psychology, vol. 48, no. 6, pp. 1291-1299, 2012.
-
(2012)
Journal of Experimental Social Psychology
, vol.48
, Issue.6
, pp. 1291-1299
-
-
Lelkes, Y.1
Krosnick, J.A.2
Marx, D.M.3
Judd, C.M.4
Park, B.5
-
33
-
-
53349163767
-
The effects of anonymity on gdss group process with an idea-generating task
-
Sep.
-
L. M. Jessup, T. Connolly, and J. Galegher, "The effects of anonymity on gdss group process with an idea-generating task," MIS Q., vol. 14, no. 3, pp. 313-321, Sep. 1990.
-
(1990)
MIS Q.
, vol.14
, Issue.3
, pp. 313-321
-
-
Jessup, L.M.1
Connolly, T.2
Galegher, J.3
-
34
-
-
0035539138
-
Social influence in computer-mediated communication: The effects of anonymity on group behavior
-
T. Postmes, R. Spears, K. Sakhel, and D. de Groot, "Social influence in computer-mediated communication: The effects of anonymity on group behavior," Personality and Social Psychology Bulletin, vol. 27, no. 10, pp. 1243-1254, 2001.
-
(2001)
Personality and Social Psychology Bulletin
, vol.27
, Issue.10
, pp. 1243-1254
-
-
Postmes, T.1
Spears, R.2
Sakhel, K.3
De Groot, D.4
-
35
-
-
84877972249
-
Why do people seek anonymity on the internet?: Informing policy and design
-
R. Kang, S. Brown, and S. Kiesler, "Why do people seek anonymity on the internet?: informing policy and design," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2013, pp. 2657-2666.
-
(2013)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI)
, pp. 2657-2666
-
-
Kang, R.1
Brown, S.2
Kiesler, S.3
-
36
-
-
84884744786
-
-
"Yahoo! Answers," http://answers.yahoo.com/.
-
Yahoo! Answers
-
-
-
38
-
-
84914126260
-
-
Accessed: Mar 13
-
"How many anonymous answers have you posted on Quora," https://www.quora.com/Anonymity-on-Quora/How-many-Anonymousanswers-have-you-posted-on-Quora-And-if-tomorrow-due-to-someglitch-those-answers-are-posted-under-your-name-what-would-beyour-reaction, Accessed: Mar 13, 2014.
-
(2014)
How Many Anonymous Answers Have You Posted on Quora
-
-
-
41
-
-
84901830611
-
Who is authoritative? Understanding reputation mechanisms in Quora
-
S. A. Paul, L. Hong, and E. H. Chi, "Who is authoritative? Understanding reputation mechanisms in Quora," in Collective Intelligence, 2012.
-
(2012)
Collective Intelligence
-
-
Paul, S.A.1
Hong, L.2
Chi, E.H.3
-
42
-
-
84893143430
-
Wisdom in the social crowd: An analysis of Quora
-
G. Wang, K. Gill, M. Mohanlal, H. Zheng, and B. Y. Zhao, "Wisdom in the social crowd: an analysis of Quora," in Proceedings of the 22nd International Conference on World Wide Web (WWW), 2013.
-
(2013)
Proceedings of the 22nd International Conference on World Wide Web (WWW)
-
-
Wang, G.1
Gill, K.2
Mohanlal, M.3
Zheng, H.4
Zhao, B.Y.5
-
47
-
-
84856343452
-
Sentiment analysis of Twitter data
-
Association for Computational Linguistics
-
A. Agarwal, B. Xie, I. Vovsha, O. Rambow, and R. Passonneau, "Sentiment analysis of Twitter data," in Proceedings of the Workshop on Languages in Social Media (LSM). Association for Computational Linguistics, 2011, pp. 30-38.
-
(2011)
Proceedings of the Workshop on Languages in Social Media (LSM)
, pp. 30-38
-
-
Agarwal, A.1
Xie, B.2
Vovsha, I.3
Rambow, O.4
Passonneau, R.5
-
49
-
-
84914126254
-
-
Accessed: Mar 7
-
"Alexa - How popular is quora.com?" http://www.alexa.com/siteinfo/quora.com, Accessed: Mar 7, 2014.
-
(2014)
Alexa - How Popular is Quora.com?
-
-
-
50
-
-
84914126253
-
-
Accessed: Mar 7
-
"Compete - Quora site info," https://siteanalytics.compete.com/quora.com/#.UxmRj mSzpo, Accessed: Mar 7, 2014.
-
(2014)
Compete - Quora Site Info
-
-
-
52
-
-
84888177423
-
Automated decision support for human tasks in a collaborative system: The case of deletion in Wikipedia
-
B. Gelley and T. Suel, "Automated decision support for human tasks in a collaborative system: The case of deletion in Wikipedia." in WikiSym, 2013.
-
(2013)
WikiSym
-
-
Gelley, B.1
Suel, T.2
-
53
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
M. S. Ackerman, L. F. Cranor, and J. Reagle, "Privacy in e-commerce: Examining user scenarios and privacy preferences," in Proceedings of the 1st ACM Conference on Electronic Commerce (EC), 1999, pp. 1-8.
-
(1999)
Proceedings of the 1st ACM Conference on Electronic Commerce (EC)
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
54
-
-
77951135204
-
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
-
G. Bansal, F. Zahedi, and D. Gefen, "The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online," Decision Support Systems, vol. 49, no. 2, pp. 138-150, 2010.
-
(2010)
Decision Support Systems
, vol.49
, Issue.2
, pp. 138-150
-
-
Bansal, G.1
Zahedi, F.2
Gefen, D.3
-
55
-
-
84885226431
-
Privacy manipulation and acclimation in a location sharing application
-
S. Wilson, J. Cranshaw, N. Sadeh, A. Acquisti, L. F. Cranor, J. Springfield, S. Y. Jeong, and A. Balasubramanian, "Privacy manipulation and acclimation in a location sharing application," in Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2013, pp. 549-558.
-
(2013)
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)
, pp. 549-558
-
-
Wilson, S.1
Cranshaw, J.2
Sadeh, N.3
Acquisti, A.4
Cranor, L.F.5
Springfield, J.6
Jeong, S.Y.7
Balasubramanian, A.8
-
57
-
-
84864974894
-
Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice
-
S. Patil, G. Norcie, A. Kapadia, and A. J. Lee, "Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice," in Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS), 2012, pp. 5:1-5:15.
-
(2012)
Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS)
, pp. 1-15
-
-
Patil, S.1
Norcie, G.2
Kapadia, A.3
Lee, A.J.4
-
58
-
-
84889017426
-
The post anachronism: The temporal dimension of Facebook privacy
-
Nov.
-
L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur, "The post anachronism: The temporal dimension of Facebook privacy," in Proceedings of the 12th Annual Workshop on Privacy in the Electronic Society, Nov. 2013.
-
(2013)
Proceedings of the 12th Annual Workshop on Privacy in the Electronic Society
-
-
Bauer, L.1
Cranor, L.F.2
Komanduri, S.3
Mazurek, M.L.4
Reiter, M.K.5
Sleeper, M.6
Ur, B.7
-
59
-
-
82955190606
-
Analyzing Facebook privacy settings: User expectations vs reality
-
Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, "Analyzing Facebook privacy settings: user expectations vs. reality," in Proceedings of the 11th ACM Internet Measurement Conference (IMC), 2011.
-
(2011)
Proceedings of the 11th ACM Internet Measurement Conference (IMC)
-
-
Liu, Y.1
Gummadi, K.P.2
Krishnamurthy, B.3
Mislove, A.4
-
60
-
-
84979618542
-
-
Accessed on Nov 15th
-
L. Rainie, S. Kiesler, R. Kang, and M. Madden, "Anonymity, Privacy, and Security Online: Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data," http://pewinternet.org/Reports/2013/Anonymityonline/Main-Report/Part-4.aspx, Accessed on Nov 15th 2013.
-
(2013)
Anonymity, Privacy, and Security Online: Part 4: How Users Feel about the Sensitivity of Certain Kinds of Data
-
-
Rainie, L.1
Kiesler, S.2
Kang, R.3
Madden, M.4
-
61
-
-
84875078606
-
Tweets are forever: A large-scale quantitative analysis of deleted tweets
-
H. Almuhimedi, S. Wilson, B. Liu, N. Sadeh, and A. Acquisti, "Tweets are forever: a large-scale quantitative analysis of deleted tweets," in Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW), 2013, pp. 897-908.
-
(2013)
Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW)
, pp. 897-908
-
-
Almuhimedi, H.1
Wilson, S.2
Liu, B.3
Sadeh, N.4
Acquisti, A.5
-
63
-
-
84914112838
-
An examination of regret in bullying tweets
-
J.-M. Xu, B. Burchfiel, X. Zhu, and A. Bellmore, "An examination of regret in bullying tweets." in HLT-NAACL, 2013, pp. 697-702.
-
(2013)
HLT-NAACL
, pp. 697-702
-
-
Xu, J.-M.1
Burchfiel, B.2
Zhu, X.3
Bellmore, A.4
|