Introducing privacy to undergraduate computing students
暂无分享,去创建一个
Zachary N. J. Peterson | Bruce DeBruhl | Maximilian Zinkus | Marina Moore | Nathan Lemay | Maximilian Zinkus | Bruce DeBruhl | Marina Moore | Nathan Lemay
[1] J. Pratt. Remarks on Zeros and Ties in the Wilcoxon Signed Rank Procedures , 1959 .
[2] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[3] Robert F. Dugan,et al. Writing for computer science: a taxonomy of writing tasks and general advice , 2006 .
[4] J. C. Cannon. Privacy: What Developers and IT Professionals Should Know , 2004 .
[5] Omer Tene,et al. Big Data for All: Privacy and User Control in the Age of Analytics , 2012 .
[6] Sahana Murthy,et al. Effect of think-pair-share in a large CS1 class: 83% sustained engagement , 2013, ICER.
[7] Latanya Sweeney,et al. Matching Known Patients to Health Records in Washington State Data , 2013, ArXiv.
[8] Jules Polonetsky,et al. To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .
[9] William Newhouse,et al. NICE Cybersecurity Workforce Framework (NCWF): National Initiative for Cybersecurity Education , 2016 .
[10] Delores J. Knipp,et al. 4: The Knowledge Survey: A Tool for All Reasons , 2003 .
[11] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[13] Lorrie Faith Cranor,et al. P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..
[14] Steven C. Bennett,et al. The "Right to Be Forgotten": Reconciling EU and US Perspectives , 2012 .
[15] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[16] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[17] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[18] M. Calo. The Boundaries of Privacy Harm , 2010 .