A Framework for Web Science
- Tim Berners-Lee, W. Hall, J. Hendler, K. O’Hara, N. Shadbolt, D. Weitzner
- Computer ScienceFoundations and Trends® in Web Science
- 2006
This text sets out a series of approaches to the analysis and synthesis of the World Wide Web, and other web-like information structures. A comprehensive set of research questions is outlined,…
Web science: an interdisciplinary approach to understanding the web
- J. Hendler, N. Shadbolt, W. Hall, T. Berners-Lee, D. Weitzner
- ArtCACM
- 1 July 2008
The Web must be studied as an entity in its own right to ensure it keeps flourishing and prevent unanticipated social effects.
Creating a Science of the Web
- Tim Berners-Lee, W. Hall, J. Hendler, N. Shadbolt, D. Weitzner
- PhysicsScience
- 11 August 2006
Understanding and fostering the growth of the World Wide Web, both in engineering and societal terms, will require the development of a new interdisciplinary field.
Information accountability
- D. Weitzner, H. Abelson, Tim Berners-Lee, J. Feigenbaum, J. Hendler, G. Sussman
- Political ScienceCACM
- 1 June 2008
With access control and encryption no longer capable of protecting privacy, laws and systems are needed that hold people accountable for the misuse of personal information, whether public or secret.
Privacy Tipping Points in Smartphones Privacy Preferences
- Fuming Shih, I. Liccardi, D. Weitzner
- PsychologyInternational Conference on Human Factors in…
- 18 April 2015
The results show that participants shared the most when no information about data access or purpose was given, and shared the least when both of these details were specified, while the purpose for data access was solely beneficial to developers.
Using Semantic Web Technologies for Policy Management on the Web
- Lalana Kagal, Tim Berners-Lee, D. Connolly, D. Weitzner
- Computer Science, Political ScienceAAAI Conference on Artificial Intelligence
- 16 July 2006
Rein, a policy framework grounded in Semantic Web technologies, is proposed, which leverages the distributed nature and linkability of the Web to provide Web-based policy management and provides an engine for reasoning over these descriptions, both of which can be used to develop domain and policy language specific security systems.
Privacy in Context
- M. Ackerman, Trevor Darrell, D. Weitzner
- Computer ScienceHum. Comput. Interact.
- 1 December 2001
It is argued that privacy in context-aware computing, especially those with perceptually aware environments, will be quite complex, and future research will need to consider how regulatory and technical solutions might be co-designed to form a public good.
Privacy-Preserving Automated Exposure Notification
- R. Canetti, Y. Kalai, D. Weitzner
- Computer ScienceIACR Cryptology ePrint Archive
- 9 July 2020
This work is among the first to focus on the privacy aspects of automated exposure notification, and introduces two privacy-preserving exposure notification schemes based on proximity detection that provide strong privacy for non-diagnosed individuals and some privacy for diagnosed individuals.
Transparent Accountable Data Mining: New Strategies for Privacy Protection
- D. Weitzner, H. Abelson, K. K. Waterman
- Computer ScienceAAAI Spring Symposium: Semantic Web Meets…
- 27 January 2006
This paper presents a technology infrastructure -- the Policy Aware Web -- that supports transparent and accountable data use on the World Wide Web, and elements of a new legal and regulatory regime that supports privacy through provable accountability to usage rules rather than merely data access restrictions.
No technical understanding required: helping users make informed choices about access to their personal data
- I. Liccardi, J. Pato, D. Weitzner, H. Abelson, D. D. Roure
- Computer ScienceInternational Conference on Mobile and Ubiquitous…
- 2 December 2014
The Google Play permissions interface was modified to include a quantitative measure (sensitivity score) of an app's ability to disclose personal information and to highlight the relevant permissions that contributed to this score in order to focus the user's attention on permissions that have the ability to access personal data.
...
...