-
3
-
-
84923547179
-
Data mining: An annotated bibliography
-
(Toronto, Canada: University of Toronto, 12-15 May
-
Solon Barocas, “Data Mining: An Annotated Bibliography,” Cyber-Surveillance in Everyday Life: An International Workshop (Toronto, Canada: University of Toronto, 12-15 May 2011), http://www.digitaliymediatedsurveillance.ca/wp content/uploads/2011/04/Barocas_Data_Mining_Annotated_Bibliography.pdf.
-
(2011)
Cyber-Surveillance in Everyday Life: An International Workshop
-
-
Barocas, S.1
-
6
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
(August)
-
Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” UCLA Law Review 57, no. 6 (August 2010): 1701-1777;
-
(2010)
UCLA Law Review
, vol.57
, Issue.6
, pp. 1701-1777
-
-
Ohm, P.1
-
7
-
-
84923597164
-
-
(presented at the Engaging Data: First International Forum on the Application and Management of Personal Electronic Information, Cambridge, MA
-
Solon Barocas and Helen Nissenbaum, “On Notice: The Trouble with Notice and Consent” (presented at the Engaging Data: First International Forum on the Application and Management of Personal Electronic Information, Cambridge, MA, 2009);
-
(2009)
On Notice: The Trouble with Notice and Consent
-
-
Barocas, S.1
Nissenbaum, H.2
-
8
-
-
84891111030
-
Necessary but not sufficient: Standardized mechanisms for privacy notice and choice
-
Summer
-
Lorrie Faith Cranor, “Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice,”Journal on Telecommunications and High Technology Law 10, no. 2 (Summer 2012): 273-445;
-
(2012)
Journal on Telecommunications and High Technology Law 10
, vol.2
, pp. 273-445
-
-
Cranor, L.F.1
-
9
-
-
14744275332
-
Privacy and rationality in individual decision making
-
January
-
Alessandro Acquisti and Jens Grossklags, “Privacy and Rationality in Individual Decision Making,” IEEE Security and Privacy Magazine 3, no. 1 (January 2005): 26-33, doi:10.1109/MSP2005.22;
-
(2005)
IEEE Security and Privacy Magazine 3
, vol.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
10
-
-
84877983179
-
Privacy self-management and the consent dilemma
-
May
-
Daniel J. Solove, “Privacy Self-Management and the Consent Dilemma,” Harvard Law Review 126, no. 7 (May 2013): 1880-1880.
-
(2013)
Harvard Law Review
, vol.126
, Issue.7
, pp. 1880
-
-
Solove, D.J.1
-
14
-
-
84923614205
-
-
http://bigdatasoc.blogspot.com/pZbig-data-and- society.html.
-
-
-
-
15
-
-
84923636155
-
-
Frontiers in Massive Data Analysis, Washington, DC: The National Academies Press
-
Tony Hey, Stewart Tansley, and Kristin Tolle, eds., The Fourth Paradigm: Data-Intensive Scientific Discovery (Redmond, WA: Microsoft Research, 2009); Frontiers in Massive Data Analysis (Washington, DC: The National Academies Press, 2013);
-
(2013)
The Fourth Paradigm: Data-Intensive Scientific Discovery (Redmond, WA: Microsoft Research, 2009)
-
-
Hey, T.1
Tansley, S.2
Tolle, K.3
-
16
-
-
84866349559
-
-
Sebastopol, CA: O’Reilly Media
-
Pete Warden, Big Data Glossary (Sebastopol, CA: O’Reilly Media, 2011).
-
(2011)
Big Data Glossary
-
-
Warden, P.1
-
18
-
-
84861974217
-
Critical questions for big data
-
danah boyd and Kate Crawford, “Critical Questions for Big Data,” Information, Communication & Society 15, no. 5 (June 2012): 662-679, doi:10.1080/1369118X.2012.678878;
-
(2012)
Information, Communication & Society
, vol.15
, Issue.5
, pp. 662-679
-
-
Boyd, D.1
Crawford, K.2
-
23
-
-
1642488037
-
The digital physics of data mining
-
Usama Fayyad, “The Digital Physics of Data Mining,” Communications of the ACM 44, no. 3 (March 1, 2001): 62-65, doi:10.1145/365181.365198;
-
(2001)
Communications of the ACM 44
, vol.3
, pp. 62-65
-
-
Fayyad, U.1
-
24
-
-
84856261742
-
The machine that would predict the future
-
David Weinberger, “The Machine That Would Predict the Future,” Scientific American 305, no. 6 (November 15, 2011): 52-57, doi:10.1038/scientificamerican1211- 52;
-
(2011)
Scientific American 305
, vol.6
, pp. 52-57
-
-
Weinberger, D.1
-
25
-
-
84991818987
-
Data science and its relationship to big data and data-driven decision making
-
Foster Provost and Tom Fawcett, “Data Science and Its Relationship to Big Data and Data-Driven Decision Making,” Big Data 1, no. 1 (March 2013): 51-59, doi:10.1089/big.2013.1508;
-
(2013)
Big Data
, vol.1
, Issue.1
, pp. 51-59
-
-
Provost, F.1
Fawcett, T.2
-
26
-
-
84888424872
-
Data science and prediction
-
Vasant Dhar, “Data Science and Prediction,” Communications of the ACM 56, no. 12 (December 1, 2013): 64-73, doi:10.1145/2500499.
-
(2013)
Communications of the ACM 56
, vol.12
, pp. 64-73
-
-
Dhar, V.1
-
28
-
-
84911923906
-
It’s not privacy, and it’s not fair
-
(September 3
-
Cynthia Dwork and Deirdre K. Mulligan, “It’s Not Privacy, and It’s Not Fair,” Stanford Law Review Online 66 (September 3, 2013): 35-40;
-
(2013)
Stanford Law Review Online 66
, pp. 35-40
-
-
Dwork, C.1
Mulligan, D.K.2
-
30
-
-
84921495826
-
Big data and its exclusions
-
(September 3
-
Jonas Lerman, “Big Data and Its Exclusions,” Stanford Law Review Online 66 (September 3, 2013): 55-63;
-
(2013)
Stanford Law Review Online 66
, pp. 55-63
-
-
Lerman, J.1
-
31
-
-
84906345567
-
Big data and due process: Toward a framework to redress predictive privacy harms
-
Kate Crawford and Jason Schultz, “Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms,” Boston College Law Review 55, no. 1 (2014).
-
(2014)
Boston College Law Review
, vol.1
, pp. 55
-
-
Crawford, K.1
Schultz, J.2
-
33
-
-
84923596733
-
How data mining discriminates
-
PhD dissertation, New York University (Ann Arbor, MI: ProQuest Dissertations and Theses
-
Solon Barocas, “How Data Mining Discriminates,” in Data Mining: Episteme, Ethos, and Ethics, PhD dissertation, New York University (Ann Arbor, MI: ProQuest Dissertations and Theses, 2014).
-
(2014)
Data Mining: Episteme, Ethos, and Ethics
-
-
Barocas, S.1
-
34
-
-
0003746860
-
-
(U.S. Department of Health, Education, and Welfare, July
-
Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens (U.S. Department of Health, Education, and Welfare, July 1973).
-
(1973)
Records, Computers and the Rights of Citizens
-
-
-
35
-
-
84923598085
-
-
Washington, DC, November 12
-
White House Office of Science and Technology Policy and the Networking and Information Technology R&D, Data to Knowledge to Action, Washington, DC, November 12, 2013, http://www.nitrd.gov/nitrdgroups/index.php?title=Data_ to_Knowledge_to_Action.
-
(2013)
Data to Knowledge to Action
-
-
-
36
-
-
78751647416
-
On the web’s cutting edge, anonymity in name only
-
August 4
-
Emily Steel and Julia Angwin, “On the Web’s Cutting Edge, Anonymity in Name Only,” The Wall Street Journal, August 4, 2010.
-
(2010)
The Wall Streetjournal
-
-
Steel, E.1
Angwin, J.2
-
37
-
-
34250017239
-
A face is exposed for aol searcher no. 4417749
-
August 9
-
Michael Barbaro and Tom Zeller, “A Face Is Exposed for AOL Searcher No. 4417749,” The New York Times, August 9, 2006.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
41
-
-
33746335051
-
-
(presented at the ICALP’06 Proceedings of the 33rd International Conference on Automata, Languages and Programming, Berlin: Springer
-
Cynthia Dwork, “Differential Privacy” (presented at the ICALP’06 Proceedings of the 33rd International Conference on Automata, Languages and Programming, Berlin: Springer, 2006), 1-12, doi:10.1007/11787006_1;
-
(2006)
Differential Privacy
, pp. 1-12
-
-
Dwork, C.1
-
44
-
-
84978045500
-
Defining privacy and utility in data sets
-
Felix T Wu, “Defining Privacy and Utility in Data Sets,” University of Colorado Law Review 84, no. 4 (2013): 1117-1177;
-
(2013)
University of Colorado Law Review
, vol.84
, Issue.4
, pp. 1117-1177
-
-
Felix, T.W.1
-
47
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Yves-Alexandre de Montjoye et al., “Unique in the Crowd: The Privacy Bounds of Human Mobility,” Scientific Reports 3 (2013): 1376, doi:10.1038/srep01376.
-
(2013)
Scientific Reports
, vol.3
, pp. 1376
-
-
de Montjoye, Y.-A.1
-
49
-
-
0033244312
-
The meaning of anonymity in an information age
-
Helen Nissenbaum, “The Meaning of Anonymity in an Information Age,” The Information Society 15, no. 2 (May 1999): 142, doi:10.1080/019722499128592.
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 142
-
-
Nissenbaum, H.1
-
50
-
-
84908407997
-
Google may ditch ‘cookies’ as online ad tracker
-
September 17
-
Alistair Barr, “Google May Ditch ‘Cookies’ as Online Ad Tracker,” USA Today, September 17, 2013.
-
(2013)
USA Today
-
-
Barr, A.1
-
51
-
-
84923553585
-
-
Ashkan Soltani, September 19, 2013
-
Ashkan Soltani, “Questions on the Google AdID,” Ashkan Soltani, September 19, 2013, http://ashkansoltani.org/2013/09/19/questions-on-the-google- adid/.
-
Questions on the Google Adid
-
-
Soltani, A.1
-
52
-
-
85065789254
-
Acxiom, the quiet giant of consumer database marketing
-
June 16, 2012
-
Natasha Singer, “Acxiom, the Quiet Giant of Consumer Database Marketing,” The New York Times, June 16, 2012.
-
The New York Times
-
-
Singer, N.1
-
53
-
-
0033244306
-
What’s in a name? Some reflections on the sociology of anonymity
-
Gary T. Marx, “What’s in a Name? Some Reflections on the Sociology of Anonymity,” The Information Society 15, no. 2 (May 1999): 99-112, doi:10.1080/019722499128565.
-
(1999)
The Information Society
, vol.15
, Issue.2
, pp. 99-112
-
-
Marx, G.T.1
-
55
-
-
84873463001
-
Behavioral targeting: A european legal perspective
-
Frederik Zuiderveen Borgesius, “Behavioral Targeting: A European Legal Perspective,” IEEE Security and Privacy Magazine 11, no. 1 (January 2013): 82-85, doi:10.1109/MSP.2013.5.
-
(2013)
IEEE Security and Privacy Magazine 11
, Issue.1
, pp. 82-85
-
-
Borgesius, F.Z.1
-
59
-
-
84923639297
-
-
Computer- world, November 4
-
Cindy Waxer, “Big Data Blues: The Dangers of Data Mining,” Computer- world, November 4, 2013, http://www.computerworld.com/s/article/print/ 9243719/Big_data_blues_The_dangers_of_data _mining.
-
(2013)
Big Data Blues: The Dangers of Data Mining
-
-
Waxer, C.1
-
60
-
-
67650342504
-
Regulating profiling in a democratic constitutional state
-
Mireille Hildebrandt and Serge Gutwirth (Dordrecht, Netherlands: Springer, 2008), 289
-
Serge Gutwirth and Paul Hert, “Regulating Profiling in a Democratic Constitutional State,” in Profiling the European Citizen: Cross-Disciplinary Perspectives, ed. Mireille Hildebrandt and Serge Gutwirth (Dordrecht, Netherlands: Springer, 2008), 289, doi:10.1007/978-1-4020-6914-7_14.
-
Profiling the European Citizen: Cross-Disciplinary Perspectives
-
-
Gutwirth, S.1
Hert, P.2
-
61
-
-
84923624945
-
-
Ad: Tech, July 30, 2013, “The Science of Privacy.”
-
Brian Dalessandro, “The Science of Privacy,” Ad: Tech, July 30, 2013, http://blog.ad-tech.com/the- science-of-privacy/Dalessandro, “The Science of Privacy.”
-
The Science of Privacy
-
-
Dalessandro, B.1
-
62
-
-
84923576578
-
Rethinking privacy in an era of big data
-
June 4
-
Quentin Hardy, “Rethinking Privacy in an Era of Big Data,” The New York Times, June 4, 2012, http://bits.blogs.nytimes.com/2012/06/04/rethinking- privacy-in-an-era-of-big-data/.
-
(2012)
The New York Times
-
-
Hardy, Q.1
-
63
-
-
84923600345
-
-
Data Mining: Episteme, Ethos, and Ethics
-
Solon Barocas, “Extending the Frontier of the Inferable: Proxies, Proximity, and Privacy,” in Data Mining: Episteme, Ethos, and Ethics.
-
Extending the Frontier Of the Inferable: Proxies, Proximity, and Privacy
-
-
Barocas, S.1
-
64
-
-
84878239671
-
Monitoring student internet patterns: Big brother or promoting mental health?
-
Frances H. Montgomery et al., “Monitoring Student Internet Patterns: Big Brother or Promoting Mental Health?” Journal of Technology in Human Services 31, no. 1 (January 2013): 61-70, doi:10.1080/15228835.2012.756600.
-
(2013)
Journal of Technology in Human Services
, vol.31
, Issue.1
, pp. 61-70
-
-
Montgomery, F.H.1
-
67
-
-
79751489738
-
Does anyone read the fine print? Testing a law and economics approach to standard form contracts
-
Yannis Bakos, Florencia Marotta-Wurgler, and David R. Trossen, “Does Anyone Read the Fine Print? Testing a Law and Economics Approach to Standard Form Contracts,” SSRN Electronic Journal (2009), doi:10.2139/ssrn.1443256;
-
(2009)
SSRN Electronic Journal
-
-
Bakos, Y.1
Marotta-Wurgler, F.2
Trossen, D.R.3
-
70
-
-
80053267657
-
A contextual approach to privacy online
-
4
-
Helen Nissenbaum, “A Contextual Approach to Privacy Online,” Daedalus, 140, no. 4 (Fall 2011): 32-48.
-
(2011)
Daedalus
, vol.140
, pp. 32-48
-
-
Nissenbaum, H.1
-
72
-
-
85071228514
-
Notice and consent in a world of big data
-
(May
-
Fred H. Cate and Viktor Mayer-Schonberger, “Notice and Consent in a World of Big Data,” International Data Privacy Law 3, no. 2 (May 20, 2013): 67-73, doi:10.1093/idpl/ipt005.
-
(2013)
International Data Privacy Law 3
, vol.2-20
, pp. 67-73
-
-
Cate, F.H.1
Mayer-Schonberger, V.2
-
73
-
-
84878319812
-
Who is profiling who? Invisible visibility
-
Serge Gutwirth et al. (Dordrecht, Netherlands: Springer
-
Mireille Hildebrandt, “Who Is Profiling Who? Invisible Visibility,” in Reinventing Data Protection? ed. Serge Gutwirth et al. (Dordrecht, Netherlands: Springer, 2009), 239-252, doi:10.1007/978-1-4020-9498-9_14;
-
(2009)
Reinventing Data Protection?
, pp. 239-252
-
-
Hildebrandt, M.1
-
74
-
-
84910629141
-
The challenge of ‘big data’ for data protection
-
April 23
-
Christopher Kuner et al., “The Challenge of ‘Big Data’ for Data Protection,” International Data Privacy Law 2, no. 2 (April 23, 2012): 47-49, doi:10.1093/idpl/ips003;
-
(2012)
International Data Privacy Law 2
, vol.2
, pp. 47-49
-
-
Kuner, C.1
-
77
-
-
85071226035
-
Big data: The end of privacy or a new beginning?
-
Ira Rubinstein, “Big Data: The End of Privacy or a New Beginning?” International Data Privacy Law 3, no. 2 (May 20, 2013): 74-87, doi:10.1093/idpl/ips036.
-
(2013)
International Data Privacy Law 3
, vol.2
, pp. 74-87
-
-
Rubinstein, I.1
-
78
-
-
84901438851
-
Informed consent
-
(Fall 2012 Edition), Edward N. Zalta
-
Nir Eyal, “Informed Consent,” in The Stanford Encyclopedia of Philosophy (Fall 2012 Edition), ed. Edward N. Zalta (ed.), http://plato.standford.edu/archives/ fall2012/entries/informed- consent/.
-
The Stanford Encyclopedia of Philosophy
-
-
Nir Eyal1
-
79
-
-
84859729351
-
Can users control online behavioral advertising effectively?
-
Lorrie Faith Cranor, “Can Users Control Online Behavioral Advertising Effectively?” IEEE Security and Privacy Magazine 10, no. 2 (n.d.): 93-96, doi:10.1109/MSP2012.32;
-
IEEE Security and Privacy Magazine 10
, vol.2
, pp. 93-96
-
-
Cranor, L.F.1
-
80
-
-
84869198814
-
-
(presented at the WPES‘12 Proceedings of the 2012 ACM workshop on Privacy in the electronic society, New York, NY: ACM Press
-
Pedro Giovanni Leon et al., “What Do Online Behavioral Advertising Privacy Disclosures Communicate to Users?” (presented at the WPES‘12 Proceedings of the 2012 ACM workshop on Privacy in the electronic society, New York, NY: ACM Press, 2012), 19-30, doi:10.1145/2381966.2381970;
-
(2012)
What Do Online Behavioral Advertising Privacy Disclosures Communicate to Users?
, pp. 19-30
-
-
Leon, P.G.1
-
81
-
-
84878870886
-
To track or ‘do not track’: Advancing transparency and individual control in online behavioral advertising
-
Winter
-
Omer Tene and Jules Polonetsky, “To Track or ‘Do Not Track’: Advancing Transparency and Individual Control in Online Behavioral Advertising,” Minnesota Journal of Law, Science & Technology 13, no. 1 (Winter 2012): 281-357;
-
(2012)
Minnesota Journal of Law, Science & Technology 13
, vol.1
, pp. 281-357
-
-
Tene, O.1
Polonetsky, J.2
-
82
-
-
84923568883
-
Consent to behavioural targeting in european law - what are the policy implications of insights from behavioural economics?
-
Frederik J. Zuiderveen Borgesius, “Consent to Behavioural Targeting in European Law - What Are the Policy Implications of Insights from Behavioural Economics?” SSRN Electronic Journal (2013), doi:10.2139/ssrn.2300969;
-
(2013)
SSRN Electronic Journal
-
-
Borgesius, F.J.Z.1
-
83
-
-
84923567138
-
Self-regulation and the construction of media harms: Notes on the battle over digital ‘privacy’
-
Monroe E Price, Stefaan Verhulst, and Libby Morgan (New York, NY: Routledge
-
Joseph Turow, “Self-Regulation and the Construction of Media Harms: Notes on the Battle over Digital ‘Privacy’,” in Routledge Handbook of Media Law, ed. Monroe E Price, Stefaan Verhulst, and Libby Morgan (New York, NY: Routledge, 2013).
-
(2013)
Routledge Handbook of Media Law
-
-
Turow, J.1
-
84
-
-
84923632983
-
Carnegie mellon leads nsf project to help people understand web privacy policies
-
(Pittsburgh, PA: Carnegie Mellon University, August 20, See Usable Privacy Policy Project
-
“Carnegie Mellon Leads NSF Project to Help People Understand Web Privacy Policies,” Carnegie Mellon News (Pittsburgh, PA: Carnegie Mellon University, August 20, 2013). See Usable Privacy Policy Project: http://www.usableprivacy.org/
-
(2013)
Carnegie Mellon News
-
-
-
86
-
-
80053267657
-
A contextual approach to privacy online
-
Helen Nissenbaum, “A Contextual Approach to Privacy Online,” Daedalus 140, no. 4 (October 2011): 32-48, doi:10.1162/DAED_a_00113.
-
(2011)
Daedalus 140
, vol.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
87
-
-
79957970960
-
-
December 19
-
Mireille Hildebrandt, “Profiling and the Rule of Law,” Identity in the Information Society 1, no. 1 (December 19, 2008): 55-70, doi:10.1007/s12394-008-0003-1.
-
(2008)
Profiling and the Rule of Law
, vol.1
, pp. 55-70
-
-
Hildebrandt, M.1
-
88
-
-
1542412446
-
O’leary, “some privacy issues in knowledge discovery: The oecd personal privacy guidelines
-
Daniel E. O’Leary, “Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines,” IEEE Expert: Intelligent Systems and Their Applications 10, no. 2 (1995): 48-59.
-
(1995)
IEEE Expert: Intelligent Systems and Their Applications
, vol.10
, Issue.2
, pp. 48-59
-
-
Daniel, E.1
-
89
-
-
0011064668
-
Kdd, data mining, and the challenge for normative privacy
-
Herman T. Tavani, “KDD, Data Mining, and the Challenge for Normative Privacy,” Ethics and Information Technology 1, no. 4 (1999): 265-273, doi:10.1023/A:1010051717305;
-
(1999)
Ethics and Information Technology 1
, vol.4
, pp. 265-273
-
-
Tavani, H.T.1
-
90
-
-
79957975634
-
Who is profiling who?”; mireille hildebrandt, “profiling and ami
-
Kai Rannenberg, Denis Royer, and Andre Deuker (Berlin: Springer
-
Mireille Hildebrandt, “Who Is Profiling Who?”; Mireille Hildebrandt, “Profiling and AmI,” in The Future of Identity in the Information Society, ed. Kai Rannenberg, Denis Royer, and Andre Deuker (Berlin: Springer, 2009), 273-310, doi:10.1007/978-3-642-01820-6_7;
-
(2009)
The Future of Identity in the Information Society
, pp. 273-310
-
-
Hildebrandt, M.1
-
91
-
-
84917464315
-
Some caveats on profiling
-
Serge Gutwirth, Yves Poullet, and Paul De Hert (Dordrecht, Netherlands: Springer
-
Serge Gutwirth and Mireille Hildebrandt, “Some Caveats on Profiling,” in Data Protection in a Profiled World, ed. Serge Gutwirth, Yves Poullet, and Paul De Hert (Dordrecht, Netherlands: Springer, 2010), 31-41, doi:10.1007/978-90-481-8865-9_2;
-
(2010)
Data Protection in a Profiled World
, pp. 31-41
-
-
Gutwirth, S.1
Hildebrandt, M.2
-
94
-
-
84923557110
-
Data mining and the privatization of accountability
-
Edward Tverdek, “Data Mining and the Privatization of Accountability,” Public Affairs Quarterly 20, no. 1 (2006): 67-94.
-
(2006)
Public Affairs Quarterly
, vol.20
, Issue.1
, pp. 67-94
-
-
Tverdek, E.1
-
95
-
-
79959279009
-
Unraveling privacy: The personal prospectus and the threat of a full disclosure future
-
Scott R. Peppet, “Unraveling Privacy: The Personal Prospectus and the Threat of a Full Disclosure Future,” Northwestern University Law Review 105, no. 3 (2011): 1153-1203.
-
(2011)
Northwestern University Law Review
, vol.105
, Issue.3
, pp. 1153-1203
-
-
Peppet, S.R.1
-
97
-
-
84923592245
-
-
(presented at the Personal Democracy Forum 2011, New York, NY
-
danah boyd, “Networked Privacy” (presented at the Personal Democracy Forum 2011, New York, NY, 2011).
-
(2011)
Networked Privacy
-
-
Boyd, D.1
-
98
-
-
77950886667
-
-
(presented at the WSDM‘10 Proceedings of the Third ACM International Conference on Web Search and Data Mining, New York, NY: ACM Press
-
Alan Mislove et al., “You Are Who You Know: Inferring User Profiles in Online Social Networks” (presented at the WSDM‘10 Proceedings of the Third ACM International Conference on Web Search and Data Mining, New York, NY: ACM Press, 2010), 251-260, doi:10.1145/1718487.1718519.
-
(2010)
You are Who You Know: Inferring User Profiles in Online Social Networks
, pp. 251-260
-
-
Mislove, A.1
-
99
-
-
71649097455
-
Gaydar: Facebook friendships expose sexual orientation
-
10, September 25
-
Carter Jernigan and Behram F. T. Mistree, “Gaydar: Facebook Friendships Expose Sexual Orientation,” First Monday 14, no. 10 (September 25, 2009), doi:10.5210/fm.v14i10.2611.
-
(2009)
First Monday 14
-
-
Jernigan, C.1
Mistree, B.F.T.2
-
100
-
-
84859487858
-
-
Sergio Gomez, PLoS ONE 7, 4 (April 6
-
Emoke-Agnes Horvat et al., “One Plus One Makes Three (for Social Networks),” ed. Sergio Gomez, PLoS ONE 7, no. 4 (April 6, 2012): e34740, doi:10.1371/journal.pone.0034740.s011.
-
(2012)
One plus One Makes Three (For Social Networks)
, pp. e34740
-
-
Horvat, E.-A.1
-
101
-
-
84893374768
-
How companies learn your secrets
-
February 16
-
Charles Duhigg, “How Companies Learn Your Secrets,” The New York Times Magazine, February 16, 2012.
-
(2012)
The New York Times Magazine
-
-
Duhigg, C.1
-
102
-
-
84909344883
-
Behind the cover story: How much does target know?
-
February 21
-
Rachel Nolan, “Behind the Cover Story: How Much Does Target Know?” The New York Times, February 21, 2012, http://6thfloor.blogs.nytimes.com/2012/ 02/21/behind-the-cover-story-how-much-does-target-know/.
-
(2012)
The New York Times
-
-
Nolan, R.1
-
103
-
-
10944246068
-
Kdd: The challenge to individualism
-
Anton Vedder, “KDD: the Challenge to Individualism,” Ethics and Information Technology 1, no. 4 (1999): 275-281, doi:10.1023/A:1010016102284.
-
(1999)
Ethics and Information Technology 1
, vol.4
, pp. 275-281
-
-
Vedder, A.1
-
104
-
-
84874265289
-
A market for unbiased private data: Paying individuals according to their privacy attitudes
-
Christina Aperjis and Bernardo A. Huberman, “A Market for Unbiased Private Data: Paying Individuals According to Their Privacy Attitudes,” First Monday 17, no. 5 (May 4, 2012), doi:10.5210/fm.v17i5.4013.
-
(2012)
First Monday 17
, vol.5
-
-
Aperjis, C.1
Huberman, B.A.2
-
114
-
-
33645796029
-
Some caveats on profiling”; talz. Zarsky, “‘mine your own business!’: Making the caseforthe implications of the data mining of personal information in the forum of public opinion
-
Gutwirth and Hildebrandt “Some Caveats on Profiling”; TalZ. Zarsky, “‘Mine Your Own Business!’: Making the Caseforthe Implications of the Data Mining of Personal Information in the Forum of Public Opinion,” Yale Journal of Law & Technology 5 (2004): 1-57.
-
(2004)
Yale Journal of Law & Technology
, vol.5
, pp. 1-57
-
-
Gutwirth1
Hildebrandt2
|