Big data's end run around anonymity and consent

S Barocas, H Nissenbaum - Privacy, big data, and the public …, 2014 - books.google.com
Big data promises to deliver analytic insights that will add to the stock of scientific and social
scientific knowledge, significantly improve decision makinginboththepublicandprivatesector …

[图书][B] How to build a digital library

IH Witten, D Bainbridge, DM Nichols - 2009 - books.google.com
How to Build a Digital Library reviews knowledge and tools to construct and maintain a
digital library, regardless of the size or purpose. A resource for individuals, agencies, and …

Legal issues surrounding monitoring during network research

DC Sicker, P Ohm, D Grunwald - Proceedings of the 7th ACM SIGCOMM …, 2007 - dl.acm.org
This work was motivated by a discussion that two of the coauthors (computer science
professors) had with the other coauthor (a law professor and a former computer crime Trial …

[图书][B] Global survey on internet privacy and freedom of expression

T Mendel, A Puddephatt, B Wagner, D Hawtin, N Torres - 2016 - books.google.com
此书/期刊为开放获取出版物, 授权为 Attribution-NonCommercial-ShareAlike 3.0 IGO (CC-
BYNC-SA 3.0 IGO)(http://creativecommons. org/licenses/by-nc-sa/3.0/igo/) …

How Google Perceives Customer Privacy, Cyber, E-Commerce, Political and Regulatory Compliance Risks

LJ Trautman - Wm. & Mary Bus. L. Rev., 2018 - HeinOnline
By now, almost every business has an Internet presence. What are the major risks perceived
by those engaged in the universe of Internet businesses? What potential risks, if they …

Optimized query forgery for private information retrieval

D Rebollo-Monedero, J Forné - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We present a mathematical formulation for the optimization of query forgery for private
information retrieval, in the sense that the privacy risk is minimized for a given traffic and …

Query profile obfuscation by means of optimal query exchange between users

D Rebollo-Monedero, J Forne… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We address the problem of query profile obfuscation by means of partial query exchanges
between two users, in order for their profiles of interest to appear distorted to the information …

Web search query privacy: Evaluating query obfuscation and anonymizing networks

ST Peddinti, N Saxena - Journal of Computer Security, 2014 - content.iospress.com
Web Search is one of the most rapidly growing applications on the internet today. However,
the current practice followed by most search engines–of logging and analyzing users' …

On the self-adjustment of privacy safeguards for query log streams

D Pàmies-Estrems, J Garcia-Alfaro - Computers & Security, 2023 - Elsevier
Internet-based services process and store numerous search queries around the globe. The
use of web search engines, such as Bing and Google, as well as personal assistants (eg …

An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers

D Rebollo-Monedero, J Forné, M Soriano - Data & Knowledge Engineering, 2011 - Elsevier
We present a multidisciplinary solution to the problems of anonymous microaggregation and
clustering, illustrated with two applications, namely privacy protection in databases, and …