Abstract is missing.
- Influence of the "Internet of Things" on Legislation Regarding the Protection of Individual PrivacyJean-Francois Henrotte. [doi]
- Selective Privacy in a Web-Based World: Challenges of Representing and Inferring ContextK. Krasnow Waterman, Deborah L. McGuinness, Li Ding. [doi]
- Privacy and International Compliance: When Differences Become an IssueDennys Marcelo Antonialli. [doi]
- The Web as a Privacy LabRichard Chow, Ji Fang, Philippe Golle, Jessica Staddon. [doi]
- Privacy in Cross-System PersonalizationYang Wang 0005, Alfred Kobsa. [doi]
- Geospatial Information Services: Balancing Privacy and InnovationNathaniel Jurist Gleicher, Jong Sung Hwang. [doi]
- Position and Perspective of Privacy Laws in IndiaBijan Jyotindrakumar Brahmbhatt. [doi]
- Engineering Privacy in an Age of Information AbundanceBetsy Masiello, Alma Whitten. [doi]
- Self-Regulation and Policy in the Spanish Audiovisual Sector: The Catalan Code of Best PracticesEmma Teodoro, Núria Galera, Pompeu Casanovas. [doi]
- The Distinction between "Privacy" and "Personal Information" - Issues of Personal Information Protection Act in JapanYeyoung Chang. [doi]
- Search Query Privacy: The Problem of AnonymizationRon Dolin. [doi]
- Privacy and TransparencyGregory Randolph Mayes. [doi]
- Ontological Semantics for Data Privacy Compliance: The NEURONA ProjectNuria Casellas, Juan-Emilio Nieto, Albert Meroño, Antoni Roig, Sergi Torralba, Mario Reyes, Pompeu Casanovas. [doi]
- Towards Territorial Privacy in Smart EnvironmentsBastian Könings, Florian Schaub, Michael Weber 0001, Frank Kargl. [doi]
- Wrap Contracts and PrivacyNancy S. Kim. [doi]
- Mobile Networks and Conflict Management: Farewell to Privacy?Marta Poblet, Sergi Torralba. [doi]
- Reasoning about the Appropriate Use of Private Data through Computational WorkflowsYolanda Gil, Christian Fritz. [doi]
- Information Privacy and its ValueSabah Saleh Al-Fedaghi. [doi]
- Combining Privacy and Security Risk Assessment in Security Quality Requirements EngineeringSaeed Abu-Nimeh, Nancy R. Mead. [doi]
- Privacy and Social Networks: From Data Protection to Pervasive ComputingAntoni Roig. [doi]
- Privacy in Online Social LendingRainer Böhme, Stefanie Pötzsch. [doi]
- Preprocessing Legal Text: Policy Parsing and Isomorphic Intermediate RepresentationK. Krasnow Waterman. [doi]
- The Right to DeleteChris Conley. [doi]
- Modeling Privacy Requirements for Quality Manipulation of Information on Social Networking SitesShan Chen, Mary-Anne Williams. [doi]
- conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy RisksGirma Nigusse, Bart De Decker. [doi]
- Forensic DNA Profiles: Database Expansion, Familial Search, and a Radical SolutionMichael R. Seringhaus. [doi]
- How Teenagers Deal with their Privacy on Social Network Sites? Results from a National Survey in FranceThomas Stenger, Alexandre Coutant. [doi]
- Protecting Reader Privacy in Digital BooksNicole A. Ozer, Jennifer A. Lynch. [doi]
- The Privacy ParadoxRaffaele Zallone. [doi]
- Mandatory Enforcement of Privacy Policies using Trusted Computing PrinciplesFrank Kargl, Florian Schaub, Stefan Dietzel. [doi]
- Flash Cookies and PrivacyAshkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle. [doi]
- Privacy Classification Systems: Recall and Precision Optimization as Enabler of Trusted Information SharingChristopher Hogan, Robert S. Bauer. [doi]
- Personalized Privacy Policies: Challenges for Data Loss PreventionNathan Gnanasambandam, Jessica Staddon. [doi]
- Consumers: The Missing Piece in a Piecemeal Approach to PrivacyClark Douglas Asay. [doi]
- Enabling Privacy-Awareness in Social NetworksTed Kang, Lalana Kagal. [doi]
- The Problem of Onward Transfers Under U.S. LawRaghu Bryan Seshadri. [doi]
- Cloud Privacy: Normative Standards for Information Privacy Management Within Cloud ComputingRobert Sprague. [doi]
- Protecting Information Privacy on the Internet: Legal Framework in the EUFaye Fangfei Wang. [doi]
- Application of an Autonomous Intelligent Cyber Entity as a Veiled Identity AgentEran Kahana. [doi]
- Radio Frequency Identification Tags, Memory Spots, and the Processing of Personally Identifiable Information, and Sensitive Data: When There Is No Balance Between Right and WrongLuca Escoffier. [doi]