Privacy as a Currency: Un-regulated?
暂无分享,去创建一个
[1] Balachander Krishnamurthy,et al. For sale : your data: by : you , 2011, HotNets-X.
[2] Apurv Jain. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy , 2017, Business Economics.
[3] Saikat Guha,et al. Privad: Practical Privacy in Online Advertising , 2011, NSDI.
[4] Ari Juels,et al. Targeted Advertising ... And Privacy Too , 2001, CT-RSA.
[5] Landon P. Cox,et al. SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.
[6] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[7] Balachander Krishnamurthy,et al. Beyond CPM and CPC: determining the value of users on OSNs , 2014, COSN '14.
[8] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[9] Frank M. Shipman,et al. Who owns the social web? , 2017, Commun. ACM.
[10] Ran Dubin,et al. I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title Classification , 2016, IEEE Transactions on Information Forensics and Security.
[11] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[12] Hui Ding,et al. TAO: Facebook's Distributed Data Store for the Social Graph , 2013, USENIX Annual Technical Conference.
[13] R. K. Shyamasundar,et al. A Complete Generative Label Model for Lattice-Based Access Control Models , 2017, SEFM.
[14] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[15] Saikat Guha,et al. Serving Ads from localhost for Performance, Privacy, and Profit , 2009, HotNets.
[16] Suman Nath,et al. Privacy-aware personalization for mobile advertising , 2012, CCS.
[17] R. K. Shyamasundar,et al. Undoing of Privacy Policies on Facebook , 2017, DBSec.
[18] Charles Duhigg,et al. How Companies Learn Your Secrets , 2012 .
[19] Vitaly Shmatikov,et al. 2011 IEEE Symposium on Security and Privacy “You Might Also Like:” Privacy Risks of Collaborative Filtering , 2022 .
[20] A. W. Roscoe,et al. Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.
[21] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[22] Woodrow Hartzog,et al. The anonymization debate should be about risk, not perfection , 2017, Commun. ACM.
[23] Vitaly Shmatikov,et al. πBox: A Platform for Privacy-Preserving Apps , 2013 .
[24] Ariel Ezrachi,et al. Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy , 2016 .
[25] Abed Ali,et al. Data as the new currency: Government's role in facilitating the exchange , 2013 .
[26] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[27] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[28] Karl N. Levitt,et al. Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[29] Aniket Kittur,et al. Bridging the gap between physical location and online social networks , 2010, UbiComp.
[30] Jeffrey T. Hancock,et al. Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.