Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,567,050 papers from all fields of science
Search
Sign In
Create Free Account
Internet privacy
Known as:
Privacy (internet)
, Privacy (disambiguation)
, Jason Fortuny prank
Expand
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Avast SecureLine
Computer forensics
Computer security
Cross-site scripting
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An efficient and privacy-preserving location sharing mechanism
Nan Shen
,
Jun Yang
,
Ke Yuan
,
Chuan Fu
,
Chunfu Jia
Comput. Stand. Interfaces
2016
Corpus ID: 43618713
2012
2012
Repackaging Android Applications for Auditing Access to Private Data
P. Berthomé
,
Thomas Fécherolle
,
N. Guilloteau
,
Jean-François Lalande
Seventh International Conference on Availability…
2012
Corpus ID: 12222085
One of the most important threats for Android users is the collection of private data by malware put on the market. Most of the…
Expand
Review
2011
Review
2011
Security Challenges and Approaches in Online Social Networks: A Survey
R. Ajami
,
Noha Ramadan
,
N. Mohamed
,
J. Al-Jaroodi
2011
Corpus ID: 18723476
Summary Social Networks (SN) Sites are becoming very popular and the number of users is increasing rapidly. However, with that…
Expand
2010
2010
Understanding the behavior of malicious applications in social networks
Andreas Makridakis
,
E. Athanasopoulos
,
S. Antonatos
,
Demetres Antoniades
,
S. Ioannidis
,
E. Markatos
IEEE Network
2010
Corpus ID: 26866374
The World Wide Web has evolved from a collection of static HTML pages to an assortment of Web 2.0 applications. Online social…
Expand
2009
2009
Linking Privacy Solutions to Developer Goals
Kim Wuyts
,
R. Scandariato
,
B. Decker
,
W. Joosen
ARES
2009
Corpus ID: 13110656
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security…
Expand
Review
2008
Review
2008
Designing Privacy into Online Communities
Catherine Dwyer
,
S. R. Hiltz
2008
Corpus ID: 154276721
Participation has exploded in online communities such as social networking sites, media sharing sites, and blogging sites. This…
Expand
2006
2006
Avoiding privacy violations caused by context-sensitive services
U. Hengartner
,
P. Steenkiste
Annual IEEE International Conference on Pervasive…
2006
Corpus ID: 8713961
Review
2006
Review
2006
Pseudonym Technology for E-Services
Ronggong Song
,
L. Korba
,
George Yee
2006
Corpus ID: 63417056
Pseudonym technology is attracting more and more attention and, together with privacy violations, is becoming a major issue in…
Expand
2006
2006
Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
C. Zou
,
D. Towsley
,
W. Gong
2006
Corpus ID: 17070432
As many people rely on email communications for business and everyday life, Internet email worms constitute one of the major…
Expand
2002
2002
Modelling online security and privacy to increase consumer purchasing intent
M. Milloy
,
D. Fink
,
R. Morris
2002
Corpus ID: 73656480
This paper investigates the concerns consumers have with respect to security and privacy when determining purchasing intent in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE