An AOL researcher inadverntly released a database of 21 million search queries to the Web. It's been snagged and is providing a valuable trove of sociological search behavior ... and potential privacy intrusion if the ID numbers are ever associated with u
Privacy International (PI) is a human rights group formed in 1990 as a watchdog on surveillance and privacy invasions by governments and corporations. PI is based in London, England, and has an office in Washington, D.C. PI has conducted campaigns and res
J. Lamla, B. Büttner, C. Ochs, F. Pittroff, and M. Uhlmann. Die Zukunft von Privatheit und Selbstbestimmung. Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt, Springer Vieweg, Wiesbaden, (2021)
K. Caine, S. Sabanovic, and M. Carter. Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction - HRI \textquotesingle12, ACM Press, (2012)
S. Najafian, A. Delic, M. Tkalcic, and N. Tintarev. Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, page 14-23. ACM, (June 2021)
K. Marky, A. Voit, A. Stöver, K. Kunze, S. Schröder, and M. Mühlhäuser. Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, New York, NY, USA, Association for Computing Machinery, (2020)
S. Yagli, A. Dytso, and H. Poor. (2020)cite arxiv:2005.02503Comment: Accepted for publication in Proceedings of 21st IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2020. arXiv version is 10pt font, 6 Pages. This is the same document as the SPAWC version, except that the conference version is written with 9pt font to meet the strict page margin requirements.
S. Fahl, Y. Acar, H. Perl, and M. Smith. ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security, ACM, (2014)
B. Henne, C. Kater, and M. Smith. 7th International Conference on Trust and Trustworthy Computing, volume 8564 of Lecture Notes in Computer Science, page 74-82. Springer, (2014)
S. Fahl, M. Harbach, H. Perl, M. Koetter, and M. Smith. Proceedings of the 2013 ACM SIGSAC Conference on Computer &\#38; Communications Security, page 49-60. New York, NY, USA, ACM, (2013)
S. Fahl, M. Harbach, Y. Acar, and M. Smith. Proceedings of the Ninth Symposium on Usable Privacy and Security, page 13:1--13:13. New York, NY, USA, ACM, (2013)
B. Henne, C. Kater, M. Smith, and M. Brenner. Privacy, Security and Trust PST, 2013 Eleventh Annual International Conference on, IEEE, (2013)Implementation: http://bhenne.github.io/android-location-privacy/.
B. Henne, C. Szongott, and M. Smith. Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, page 95--106. New York, NY, USA, ACM, (April 2013)
S. Fahl, M. Harbach, M. Oltrogge, T. Muders, and M. Smith. Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)