Small Fish in a Big Pond: An Architectural Approach to Users Privacy, Rights and Security in the Age of Big Data
暂无分享,去创建一个
Derek McAuley | Richard Mortier | Spyros Angelopoulos | Yasmin Merali | Dominic Price | R. Mortier | Y. Merali | Derek McAuley | S. Angelopoulos | Dominic Price
[1] Shion Guha,et al. Can you see me now?: location, visibility and the management of impressions on foursquare , 2013, MobileHCI '13.
[2] Katherine A. Karl,et al. A Facebook ‘friend’ request from the boss: Too close for comfort? , 2013 .
[3] D. Boyd. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications , 2010 .
[4] M. Lynne Markus,et al. Power, politics, and MIS implementation , 1987, CACM.
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Jeffrey T. Hancock,et al. Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.
[7] Spyros Angelopoulos,et al. Bridging the Divide between Virtual and Embodied Spaces: Exploring the Effect of Offline Interactions on the Sociability of Participants of Topic-Specific Online Communities , 2015, 2015 48th Hawaii International Conference on System Sciences.
[8] Fotis Kitsios,et al. From E to U: Towards an Innovative Digital Era , 2009 .
[9] R. Baumeister,et al. The need to belong: desire for interpersonal attachments as a fundamental human motivation. , 1995, Psychological bulletin.
[10] L. Manovich,et al. Trending: The Promises and the Challenges of Big Social Data , 2012 .
[11] Julie E. Cohen. The Surveillance-Innovation Complex: The Irony of the Participatory Turn , 2014 .
[12] Galit Shmueli,et al. Predictive Analytics in Information Systems Research , 2010, MIS Q..
[13] M. Leary,et al. Self-esteem as an interpersonal monitor: The sociometer hypothesis. , 1995 .
[14] Katherine A. Karl,et al. “Friending” Professors, Parents and Bosses: A Facebook Connection Conundrum , 2011 .
[15] Christine Neylon O'Brien. The Top Ten NLRB Cases on Facebook Firings and Employer Social Media Policies , 2014 .
[16] Brendan Smoker. A matter of trust. , 2002, Health management technology.
[17] Jennifer Golbeck,et al. Linking Social Networks on the Web with FOAF: A Semantic Web Case Study , 2008, AAAI.
[18] G. N. Gilbert. Computational Social Science , 2010 .
[19] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.
[20] Suzanne Rivard,et al. A Multilevel Model of Resistance to Information Technology Implementation , 2005, MIS Q..
[21] Sathish S. Vadhiyar,et al. A divide and conquer strategy for scaling weather simulations with multiple regions of interest , 2012, HiPC 2012.
[22] V. Marx. Biology: The big challenges of big data , 2013, Nature.
[23] Declan Butler. Data sharing threatens privacy , 2007, Nature.
[24] David Waitzman. Standard for the transmission of IP datagrams on avian carriers , 1990, RFC.
[25] Cameron D. Palmer,et al. Association Testing of Previously Reported Variants in a Large Case-Control Meta-analysis of Diabetic Nephropathy , 2011, Diabetes.
[26] Erik Brynjolfsson,et al. Big data: the management revolution. , 2012, Harvard business review.
[27] Viswanath Venkatesh,et al. Enterprise System Implementation and Employee Job Performance: Understanding the Role of Advice Networks , 2014, MIS Q..
[28] J. Manyika. Big data: The next frontier for innovation, competition, and productivity , 2011 .
[29] Heather Richter Lipford,et al. +Your circles: sharing behavior on Google+ , 2012, SOUPS.
[30] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[31] Peter Thomas,et al. "Hey World, Take a Look at Me!": Appreciating the Human Body on Social Network Sites , 2008, PERSUASIVE.
[32] David J. Leinweber,et al. Stupid Data Miner Tricks , 2007 .
[33] N. Christakis,et al. and Tastes, ties, and time: A new social network dataset using Facebook. , 2008 .
[34] T. Davenport,et al. Data scientist: the sexiest job of the 21st century. , 2012, Harvard business review.
[35] Barry Friedman,et al. Commentary: The impact of social networking tools on political change in Egypt's "Revolution 2.0" , 2011, Electron. Commer. Res. Appl..
[36] J. V. Gurp,et al. Separation of Concerns : A Case Study , 2001 .
[37] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[38] Alessandro Acquisti,et al. Predicting Social Security numbers from public data , 2009, Proceedings of the National Academy of Sciences.
[39] Adam Jacobs,et al. The pathologies of big data , 2009, Commun. ACM.
[40] Alessandra Talamo,et al. Strategic Identities in Cyberspace , 2001, Cyberpsychology Behav. Soc. Netw..
[41] Khaled El Emam,et al. “Not all my friends need to know”: a qualitative study of teenage patients, privacy, and social media , 2013, J. Am. Medical Informatics Assoc..
[42] Will Venters,et al. A Trichordal Temporal Approach to Digital Coordination: The Sociomaterial Mangling of the CERN Grid , 2014, MIS Q..
[43] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[44] Bruno Latour,et al. Tarde's idea of quantification , 2010 .