Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling
暂无分享,去创建一个
Bettina Berendt | Sören Preibusch | Seda Gürses | Bettina Hoser | Seda F. Gürses | Bettina Berendt | Sören Preibusch | Bettina Hoser
[1] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[2] Stanley Milgram,et al. An Experimental Study of the Small World Problem , 1969 .
[3] T. F. O'Higgins. Judgment of the Court , 1981 .
[4] Ian Sommerville,et al. Viewpoints: principles, problems and a practical approach to requirements engineering , 1997, Ann. Softw. Eng..
[5] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[6] M. KleinbergJon. Authoritative sources in a hyperlinked environment , 1999 .
[7] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[8] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[9] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[11] William N. Robinson,et al. Requirements interaction management , 2003, CSUR.
[12] Bettina Berendt,et al. SIMT - a privacy preserving Web metrics tool , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..
[13] Alfred Kobsa,et al. Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.
[14] Ramakrishnan Srikant,et al. XPref: a preference language for P3P , 2005, Comput. Networks.
[15] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[16] Jens H. Weber,et al. Modeling and reasoning for confidentiality requirements in software development , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).
[17] Sören Preibusch. Privacy Negotiations with P3P , 2006 .
[18] Seda F. Gürses,et al. Multilateral security requirements analysis for preserving privacy in ubiquitous environments , 2006 .
[19] Julita Vassileva,et al. A Usability Study of an Access Control System for Group Blogs , 2007, ICWSM.
[20] Danah Boyd,et al. Identity Production in a Networked Culture : Why Youth Heart MySpace , 2007 .
[21] Tsvi Kuflik,et al. Examining users' attitude towards privacy preserving collaborative filtering , 2007 .
[22] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[23] Georg Groh,et al. Groups and Group-Instantiations in Mobile Communities - Detection, Modeling and Applications , 2007, ICWSM.