Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CHB
2011
158views more  CHB 2011»
11 years 13 days ago
Factors mediating disclosure in social network sites
In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behavio...
Frederic Stutzman, Robert Capra, Jamila Thompson
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
11 years 5 months ago
Ranking Privacy Policy
Almost all company websites collect some information about the user in some form. The information may be a simple IP address of the host to extensive personal information about th...
Rajeev Agrawal, William I. Grosky, Farshad Fotouhi
ESORICS
2003
Springer
11 years 10 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
VLDB
2004
ACM
138views Database» more  VLDB 2004»
11 years 10 months ago
Limiting Disclosure in Hippocratic Databases
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semanti...
Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Ra...
ERCIMDL
2004
Springer
137views Education» more  ERCIMDL 2004»
11 years 10 months ago
Managing a Paradigm Shift - Aligning Management, Privacy Policy, Technology and Standards
It is argued that we are experiencing a paradigm shift from a user perspective to a client perspective in library and information science. The paradigm shift is brought about by re...
Jonas Holmström
NORDICHI
2006
ACM
11 years 11 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
11 years 11 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
OTM
2007
Springer
11 years 11 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional bene...
Sören Preibusch
IEEEIAS
2007
IEEE
11 years 11 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
CSFW
2007
IEEE
11 years 11 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
books