Engineering privacy

S Spiekermann, LF Cranor - IEEE Transactions on software …, 2008 - ieeexplore.ieee.org
In this paper we integrate insights from diverse islands of research on electronic privacy to
offer a holistic view of privacy engineering and a systematic structure for the discipline's …

[图书][B] Save as... digital memories

J Garde-Hansen, A Hoskins, A Reading - 2009 - books.google.com
Save as... digital memories Page 1 Page 2 Save As... Digital Memories Page 3 Also by Andrew
Hoskins TELEVISION AND TERROR: Conflicting Times and the Crisis of News Discourse …

[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.

R Geambasu, T Kohno, AA Levy, HM Levy - USENIX security symposium, 2009 - usenix.org
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …

Participatory personal data: An emerging research challenge for the information sciences

K Shilton - Journal of the American Society for Information …, 2012 - Wiley Online Library
Individuals can increasingly collect data about their habits, routines, and environment using
ubiquitous technologies. Running specialized software, personal devices such as phones …

Desvelando nuestra identidad digital

L Castañeda, M Camacho - Profesional de …, 2012 - revista.profesionaldelainformacion …
Dado el nuevo concepto de identidad, consecuencia de los cambios tecnológicos y de
comunicación actuales, se hace una aproximación crítica al concepto de identidad digital …

Network duality of social capital

RS Burt, VO Bartkus, JH Davis - Social capital: Reaching out …, 2009 - elgaronline.com
This chapter is about balance between brokerage and closure, the two primary mechanisms
by which social networks constitute social capital. Brokerage involves building connections …

Top 10 mistakes in system design from a privacy perspective and privacy protection goals

M Hansen - IFIP primelife international summer school on privacy …, 2011 - Springer
Privacy requirements are often not well considered in system design. The objective of this
paper is to help interested system designers in three ways: First, it is discussed how …

Minds online: The interface between Web science, cognitive science, and the philosophy of mind

P Smart, RW Clowes, R Heersmink - 2017 - philpapers.org
Alongside existing research into the social, political and economic impacts of the Web, there
is a need to study the Web from a cognitive and epistemic perspective. This is particularly so …

[图书][B] User control in ubiquitous computing: design alternatives and user acceptance

S Spiekermann - 2008 - academia.edu
All writers owe a debt to their colleagues, friends, family and other supporters. I am no
exception to this rule. This work would not exist without the kind support and intense …

[图书][B] Living in digital worlds: Designing the digital public space

N Jacobs, R Cooper - 2018 - taylorfrancis.com
Living in Digital Worlds investigates the relationship between human society and
technology, as our private and particularly our public lives are increasingly undertaken in …