Investigating the Value of Privacy within the Internet of Things
暂无分享,去创建一个
Damla Turgut | Ladislau Bölöni | Neda Hajiakhoond Bidoki | Sina Masnadi | Alex Mayle | Ladislau Bölöni | D. Turgut | N. Bidoki | Sina Masnadi | Alex Mayle
[1] Damla Turgut,et al. A pragmatic value-of-information approach for intruder tracking sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[2] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[3] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[4] Oliver Günther,et al. Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.
[5] Tansu Alpcan,et al. Trading privacy with incentives in mobile commerce: A game theoretic approach , 2013, Pervasive Mob. Comput..
[6] Damla Turgut,et al. Value of information based scheduling of cloud computing resources , 2017, Future Gener. Comput. Syst..
[7] Yu Pu,et al. Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios , 2015, ICIS.
[8] Mani B. Srivastava,et al. Building principles for a quality of information specification for sensor information , 2009, 2009 12th International Conference on Information Fusion.
[9] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[10] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[11] Emmanouil A. Panaousis,et al. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[12] Damla Turgut,et al. Scheduling data transmissions of underwater sensor nodes for maximizing value of information , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[13] Damla Turgut,et al. Value of Information and Cost of Privacy in the Internet of Things , 2017, IEEE Communications Magazine.
[14] George Danezis,et al. The Value of Location Information , 2006, Security Protocols Workshop.
[15] Christine Bauer,et al. Psychology of Ownership and Asset Defense: Why People Value Their Personal Information Beyond Privacy , 2012, ICIS.
[16] Jessica Staddon,et al. Indirect content privacy surveys: measuring privacy without asking about it , 2011, SOUPS.
[17] David J. Danelski,et al. Privacy and Freedom , 1968 .
[18] Laura A. Levit,et al. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Washington, DC: National Academies Press , 2009 .
[19] Damla Turgut,et al. IVE: Improving the value of information in energy-constrained intruder tracking sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).