Data Is the New Currency
暂无分享,去创建一个
[1] Karl D. Belgum. Who Leads at Halftime?: Three Conflicting Visions of Internet Privacy Policy , 1999 .
[2] J. Rubenfeld. The Right of Privacy , 1989 .
[3] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[4] Jacqueline D. Lipton. The Law of Unintended Consequences: The Digital Millennium Copyright Act and Interoperability , 2005 .
[5] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[6] Karen McCullagh. Protecting ‘privacy’ through control of ‘personal’ data processing: A flawed approach , 2009 .
[7] Chaim Zins,et al. Conceptual approaches for defining data, information, and knowledge , 2007, J. Assoc. Inf. Sci. Technol..
[8] Milton L. Mueller,et al. Profiling the Profilers: Deep Packet Inspection and Behavioral Advertising in Europe and the United States , 2012 .
[9] Charles Duhigg,et al. How Companies Learn Your Secrets , 2012 .
[10] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[11] H. C. Darby,et al. THE DOMESDAY BOOK , 1972 .
[12] Chaim Zins. Conceptual approaches for defining data, information, and knowledge: Research Articles , 2007 .
[13] H. Sangani,et al. DO ANDROIDS DREAM OF ELECTRIC SHEEP? , 2020, Faculty Brat.
[14] Arthur D. Fisk,et al. Privacy and technology: folk definitions and perspectives , 2008, CHI Extended Abstracts.
[15] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[16] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).