Sciweavers

AAAI
2011
12 years 4 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
MKTSCI
2011
354views Multimedia» more  MKTSCI 2011»
12 years 7 months ago
Online Display Advertising: Targeting and Obtrusiveness
We use data from a large-scale field experiment to explore what influences the effectiveness of online advertising. We find that matching an ad to website content and increasing a...
Avi Goldfarb, Catherine Tucker
JTAER
2010
139views more  JTAER 2010»
12 years 11 months ago
Sharing Reputation Across Virtual Communities
This paper outlines the privacy concerns in the CrossCommunity Reputation (CCR) model for sharing reputation knowledge across communities. These privacy concerns are discussed and...
Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes
IEEESP
2010
115views more  IEEESP 2010»
13 years 3 months ago
How Internet Users' Privacy Concerns Have Evolved since 2002
In 2002, we established a baseline for Internet users’ online privacy values. Through a survey we found that information transfer, notice/awareness, and information storage were...
Annie I. Antón, Julia Brande Earp, Jessica ...
AI
2005
Springer
13 years 4 months ago
Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving
Because of privacy concerns, agents may not want to reveal information that could be of use in problem solving. As a result, there are potentially important tradeoffs between main...
Richard J. Wallace, Eugene C. Freuder
ICIS
2004
13 years 6 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
INTERACT
2007
13 years 6 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu
CSFW
2010
IEEE
13 years 7 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
PET
2010
Springer
13 years 8 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
UM
2001
Springer
13 years 9 months ago
Tailoring Privacy to Users' Needs
This article discusses how the deployment of personalized systems is affected by users’ privacy concerns and by privacy legislation. It shows that these impacts are substantial a...
Alfred Kobsa