[PDF][PDF] Networks of control

W Christl, S Spiekermann - A report on corporate surveillance, digital …, 2016 - academia.edu
In his book “How Our Days Became Numbered” historian Dan Bouk looks into how life
insurers started to predict people's lives and their relative risk of death at the end of the …

The general data protection regulation in the age of surveillance capitalism

J Andrew, M Baker - Journal of Business Ethics, 2021 - Springer
Clicks, comments, transactions, and physical movements are being increasingly recorded
and analyzed by Big Data processors who use this information to trace the sentiment and …

[PDF][PDF] Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art

G Kambourakis - International Journal of u-and e-Service, Science and …, 2013 - Citeseer
Mobile learning is constantly evolving, following the shift of mobile technologies from laptops
to handheld devices and smartphones. Indeed, the opportunities for innovation in this area …

A survey on solutions and main free tools for privacy enhancing Web communications

A Ruiz-Martínez - Journal of network and computer applications, 2012 - Elsevier
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …

[HTML][HTML] The problem with the internet: An affordance-based approach for psychological research on networked technologies

O Brown, LGE Smith, BI Davidson, DA Ellis - Acta Psychologica, 2022 - Elsevier
The internet is often viewed as the source of a myriad of benefits and harms. However, there
are problems with using this notion of “the internet” and other high-level concepts to explain …

Trust, privacy, and security in electronic business: the case of the GCC countries

Z Karake Shalhoub - Information Management & Computer Security, 2006 - emerald.com
Purpose–The lack of trust in online transactions is one of the main reasons for the relatively
low electronic commerce adoption, especially in developing and emerging economies such …

BlindIdM: A privacy-preserving approach for identity management as a service

D Nuñez, I Agudo - International Journal of Information Security, 2014 - Springer
Identity management is an almost indispensable component of today's organizations and
companies, as it plays a key role in authentication and access control; however, at the same …

A vision for global privacy bridges: Technical and legal measures for international data markets

S Spiekermann, A Novotny - Computer Law & Security Review, 2015 - Elsevier
From the early days of the information economy, personal data has been its most valuable
asset. Despite data protection laws and an acknowledged right to privacy, trading personal …

The public, the private and the secret: Thoughts on privacy in central bank digital currencies

D Ballaschk, J Paulick - Journal of Payments Strategy & …, 2021 - ingentaconnect.com
This paper discusses the issues surrounding privacy and anonymity in the context of central
bank digital currency (CBDC). Most notably, central banks calibrating the design criteria for …

Multidimensional big data analytics over big web knowledge bases: models, issues, research trends, and a reference architecture

A Cuzzocrea - 2022 IEEE Eighth International Conference on …, 2022 - ieeexplore.ieee.org
This paper focuses the attention on the problem of supporting multidimensional big data
analytics tools over Big Web Knowledge Bases. These big data repositories are generated …