Preliminary Analysis of Google+'s Privacy
- Published: 15 Nov 2011
- 1
- 2
[1] Circle hack. http://www.circlehack.com, 2011.
[2] P. Adams. The real life social network v2. http://www.slideshare.net/padday/the-real-life-socialnetwork-v2, 2010.
[3] R. J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.). Wiley, 2008.
[4] D. Barret and M. H. Saul. "weiner now says he sent photos". The Wall Street Journal, June 7, 2011.
[5] H. Berghel. Identity Theft, Social Security Numbers, and the Web. Commun. ACM, 43(2):17{21, 2000.
[6] J. Bonneau. New facebook photo hacks. 2009. http://www.lightbluetouchpaper.org/2009/02/11/newfacebook-photo-hacks/
[7] T. Bradshaw. The rst google+ privacy aw. The Financial Times, June 6, 2011.
[8] A. Dhingra. Where you did sleep last night? ...thank you, i already know! iSChannel, 3(1), 2008.
[9] A. M. Donald and L. F. Cranor. "how technology drives vehicular privacy". The Journal of Law and Policy for the Information Society, 2, 2006.
[10] A. Felt. Defacing facebook: A security case study. http://www.cs.virginia.edu/felt/fbook/facebookxss.pdf, 2007.
[11] R. Gross, A. Acquisti, and H. J. H. III. Information revelation and privacy in online social networks. In WPES, pages 71{80, 2005. [OpenAIRE]
[12] N. Hotler and M. Seganish. Using identity theft to teach enterprise risk management - make it personal! Journal of Business Case Studies, 4(6), 2008. [OpenAIRE]
[13] T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94{100, 2007.
[14] M. McGee. Facebook hits 750 million users; zuckerberg yawns. http://searchengineland.com/facebook-hits750-million-users-84439.
[15] D. L. Michael Henderson, Melissa de Zwart and M. Phillips. Will u friend me? Legal Risks of Social Networking Sites. Monash University, 2011.
- 1
- 2