Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information

Conference object English OPEN
Labitzke , Sebastian;
(2011)

Part 4: Privacy and Transparency in the Age of Cloud Computing; International audience; The risk involved when users publish information, which becomes available to an unintentional broad audience via online social networks is evident. It is especially difficult for use... View more
  • References (21)
    21 references, page 1 of 3

    1. A. Acquisti. Privacy in electronic commerce and the economics of immediate grati cation. In Proceedings of the 5th ACM conference on Electronic commerce, EC '04, pages 21{29, New York, NY, USA, 2004. ACM.

    2. B. Berg, S. Potzsch, R. Leenes, K. Borcea-P tzmann, and F. Beato. Privacy in social software. In J. Camenisch, S. Fischer-Hubner, and K. Rannenberg, editors, Privacy and Identity Management for Life, pages 33{60. Springer Berlin Heidelberg, 2011.

    3. M. Bergmann, M. Rost, and J. S. Pettersson. Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology. In Proceedings of the Fourteenth International Conference on Information Systems Development (ISD2005), pages 437{448, Karlstad, Sweden, 2005. Springer Verlag.

    4. A. Bhargav-Spantzel, J. Camenisch, T. Gross, and D. Sommer. User centricity: A taxonomy and open issues. J. Comput. Secur., 15:493{527, October 2007.

    5. R. Dunbar. Coevolution of neocortex size, group size and language in humans. Behavioral and Brain Sciences, 16(4):681{735, 1993.

    6. S. Fischer-Huebner, H. Hedbom, and E. Waestlund. Trust and assurance HCI. In J. Camenisch, S. Fischer-Hubner, and K. Rannenberg, editors, Privacy and Identity Management for Life, pages 245{260. Springer Berlin Heidelberg, 2011.

    7. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, WPES '05, pages 71{80, New York, NY, USA, 2005. ACM.

    8. H. Hedbom, T. Pulls, and M. Hansen. Transparency tools. In J. Camenisch, S. Fischer-Hubner, and K. Rannenberg, editors, Privacy and Identity Management for Life, pages 135{143. Springer Berlin Heidelberg, 2011.

    9. T. Hollrigl, H. Kuehner, J. Dinger, and H. Hartenstein. User-controlled automated identity delegation. In Proceedings of the 6th IEEE/IFIP International Conference on Network and Service Management, 2010.

    10. C. Kahl, K. Boettcher, M. Tschersich, S. Heim, and K. Rannenberg. How to enhance privacy and identity management for mobile communities: Approach and user driven concepts of the picos project. In Proceedings of 25th IFIP International Information Security Conference Security & Privacy { Silver Linings in the Cloud (IFIP SEC 2010), 2010.

  • Metrics
Share - Bookmark