Sciweavers

251 search results - page 9 / 51
» Privacy and HCI: methodologies for studying privacy issues
Sort
View
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
15 years 2 months ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
NETWORKING
2007
14 years 11 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
84
Voted
WPES
2005
ACM
15 years 3 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 4 months ago
Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research
Increased Internet traffic and the sophistication of companies in tracking that traffic have made privacy a critical issue in electronic commerce (e-commerce). This has spawned a ...
J. Efrim Boritz, Won Gyun No, R. P. Sundarraj
CHI
2003
ACM
15 years 9 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey