Scaling measurement experiments to planet-scale: ethical, regulatory and cultural considerations
暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[2] Abe Singer. Conference Password Sniffing: Legal and Ethical Issues , 2005, login Usenix Mag..
[3] Charles Ess,et al. Ethical Approaches to Robotic Data Gathering in Academic Research , 2008 .
[4] Priscilla M. Regan. Safe Harbors or Free Frontiers? Privacy and Transborder Data Flows , 2003 .
[5] Rita Walczuch,et al. Implications of the new EU Directive on data protection for multinational corporations , 2001, Inf. Technol. People.
[6] Genevieve Bell,et al. The age of the thumb: A cultural reading of mobile technologies from Asia , 2005, Thumb Culture.
[7] Matthew Chalmers,et al. Shakra: Tracking and Sharing Daily Activity Levels with Unaugmented Mobile Phones , 2007, Mob. Networks Appl..
[8] Klemens Böhm,et al. Privacy2.0: Towards Collaborative Data-Privacy Protection , 2008, IFIPTM.
[9] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[10] Fehmi Ben Abdesslem,et al. Less is more: energy-efficient mobile sensing with senseless , 2009, MobiHeld '09.
[11] Feng Zhao,et al. Location and Mobility in a Sensor Network of Mobile Phones , 2007 .
[12] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[13] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[14] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[15] Jan Gulliksen,et al. User-centered System Design , 2011 .
[16] Tristan Henderson,et al. Measuring wireless network usage with the Experience Sampling Method , 2005 .
[17] Joachim Höflich,et al. The mobile phone and the dynamic between private and public communication: Results of an international exploratory study , 2005, Thumb Culture.
[18] Chris Schmandt,et al. WatchMe: Communication and Awareness Between Members of a Closely-Knit Group , 2004, UbiComp.
[19] Margaret Jackson,et al. Transborder Data Protection and the Effects on Business and Government , 2007, HCI.
[20] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[21] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[22] Anders Lindgren,et al. Opportunistic content distribution in an urban setting , 2006, CHANTS '06.
[23] Adam P. Warren,et al. Data protection legislation in the United Kingdom , 2005 .
[24] Tristan Henderson,et al. CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.