Cognitive Cities, Big Data and Citizen Participation: The Essentials of Privacy and Security
暂无分享,去创建一个
[1] Michael Friedewald,et al. Seven Types of Privacy , 2013, European Data Protection.
[2] Arnold Roosendaal,et al. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes , 2013, European Data Protection.
[3] Hamed Haddadi,et al. Human-Data Interaction: The Human Face of the Data-Driven Society , 2014, ArXiv.
[4] S. Gritzalis,et al. Privacy Enhancing Technologies: A Review , 2003, EGOV.
[5] Anind K. Dey,et al. Context-Awareness and Mobile Devices , 2008 .
[6] Daniel J. Solove. The Digital Person , 2022 .
[7] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[8] Inman Harvey. SmartData : privacy meets evolutionary robotics , 2013 .
[9] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[10] B. Schwartz. The Social Psychology of Privacy , 1968, American Journal of Sociology.
[11] George J. Tomko. SmartData: The Need, the Goal and the Challenge , 2013 .
[12] A. Cavoukian. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .
[13] D. Brin. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .
[14] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[15] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[16] Sara D'Onofrio,et al. Applying the fuzzy analytical hierarchy process in cognitive cities , 2014, ICEGOV.
[17] Hon C. Kwan,et al. SmartData: Make the data “think” for itself , 2010 .
[18] Jonathan L. Zittrain,et al. The Future of the Internet - And How to Stop It , 2008 .
[19] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[20] Josep Domingo-Ferrer,et al. Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.
[21] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[22] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[23] Judith Hurwitz,et al. Cognitive Computing and Big Data Analytics , 2015 .
[24] Danielle Keats Citron,et al. The Right to Quantitative Privacy , 2013 .