The Digital Aggregated Self: A Literature Review
暂无分享,去创建一个
[1] Mary Walker,et al. Lessons learned: A case study using data mining in the newspaper industry , 2007 .
[2] S. Deva. 'Yahoo! For Good' and the Right to Privacy of Internet Users: A Critique , 2008 .
[3] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[4] Lynne Y. Williams. Catch Me If You Can: A Taxonomically Structured Approach to Cybercrime , 2008 .
[5] Sumit Sarkar,et al. Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..
[6] Stuart E. Madnick,et al. An Economic Analysis of Policies for the Protection and Reuse of Noncopyrightable Database Contents , 2008, J. Manag. Inf. Syst..
[7] Theo Röhle. Desperately seeking the consumer: Personalized search engines and the commercial exploitation of user data , 2007, First Monday.
[8] V. Goel,et al. The privacy paradox: laying Orwell's ghost to rest. , 2001, CMAJ : Canadian Medical Association journal = journal de l'Association medicale canadienne.
[9] Daniela Godoy. Learning user interests for user profiling in personal information agents , 2006, AI Commun..
[10] R. Kelly Rainer,et al. Business intelligence: an analysis of the literature , 2008, IEEE Engineering Management Review.
[11] L. Floridi. Information Technology and Moral Philosophy: Information Ethics: Its Nature and Scope , 2008 .
[12] Luciano Floridi,et al. Information ethics, its nature and scope , 2006, CSOC.
[13] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[14] Susan Landau. Security and Privacy Landscape in Emerging Technologies , 2008, IEEE Security & Privacy.
[15] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[16] Michael Friedewald,et al. The illusion of security , 2008, CACM.
[17] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[18] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[19] Radcliff Stewart,et al. Commentary: Legal Effect of Revealing Private Information in the US and Abroad , 2007, Inf. Syst. Manag..
[20] Ryan West,et al. The psychology of security , 2008, CACM.
[21] Jonathan A. Poritz,et al. Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines , 2007, Inf. Soc..
[22] Marcin Gorawski,et al. Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[23] Allen Stone. Natural-Language Processing for Intrusion Detection , 2007, Computer.
[24] Virginia W. Kupritz,et al. Privacy matters , 1998, Nature Genetics.
[25] Eve Maler,et al. The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.
[26] Krzysztof J. Cios,et al. Uniqueness of medical data mining , 2002, Artif. Intell. Medicine.
[27] Raj Bhatnagar,et al. Agents for Integrating Distributed Data for Complex Computations , 2006, Comput. Informatics.
[28] Daniel P. Hillyard,et al. Issues Around the Protection or Revelation of Personal Information , 2007 .
[29] Orin S. Kerr. A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it , 2003 .
[30] Corey A Ciocchetti. E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors , 2007 .
[31] David S. Wall,et al. Crime and the Internet , 2001 .
[32] Alessandro Acquisti,et al. Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.
[33] Robert J. Aalberts,et al. Trespass, nuisance, and spam: 11th century common law meets the internet , 2007, CACM.
[34] David Satola,et al. Legal aspects of Internet governance reform , 2007, Inf. Polity.
[35] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[36] Jianer Chen,et al. Theory and Applications of Models of Computation , 2014, Lecture Notes in Computer Science.
[37] James A. Hendler,et al. Information accountability , 2008, CACM.
[38] Lawrence O Gostin,et al. Health information privacy. , 1995, Cornell law review.
[39] Josep Domingo-Ferrer,et al. Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[40] Alfred Kobsa,et al. Privacy-enhanced personalization , 2006, FLAIRS.
[41] Shivendu Shivendu,et al. An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization , 2006, J. Manag. Inf. Syst..
[42] YongSeog Kim. Streaming association rule (SAR) mining with a weighted order-dependent representation of Web navigation patterns , 2009, Expert Syst. Appl..
[43] Philip S. Yu,et al. On static and dynamic methods for condensation-based privacy-preserving data mining , 2008, TODS.
[44] Sanjay Kumar Madria,et al. Approximate Query Processing Using Multilayered Data Model to Handle Environmental Constraints, Privacy and Avoiding Inferences , 2007, Int. J. Cooperative Inf. Syst..
[45] Alfred Kobsa,et al. Privacy-Enhanced Web Personalization , 2007, The Adaptive Web.
[46] Kai Lung Hui,et al. Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..
[47] Robert LaRose,et al. Promoting personal responsibility for internet safety , 2008, CACM.
[48] Elisa Bertino,et al. Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.
[49] Kimberly F. Balsam Ms. Nowhere to Hide , 2007 .
[50] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly , 2008, IEEE Security & Privacy.
[51] Donn B. Parker. Possession as an Element of Information Security , 1995, Inf. Secur. J. A Glob. Perspect..