Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,326,101 papers from all fields of science
Search
Sign In
Create Free Account
Internet privacy
Known as:
Privacy (internet)
, Privacy (disambiguation)
, Jason Fortuny prank
Expand
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Avast SecureLine
Computer forensics
Computer security
Cross-site scripting
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Maximising influence in sensed heterogeneous social network with privacy preservation
Meng Han
,
Qilong Han
,
Lijie Li
,
Ji Li
,
Yingshu Li
Int. J. Sens. Networks
2018
Corpus ID: 67735876
Maximising influence to improve marketing performance has a significant impact on targeted advertisements and viral product…
Expand
2016
2016
An efficient and privacy-preserving location sharing mechanism
Nan Shen
,
Jun Yang
,
Ke Yuan
,
Chuan Fu
,
Chunfu Jia
Comput. Stand. Interfaces
2016
Corpus ID: 43618713
2013
2013
Countering overlapping rectangle privacy attack for moving kNN queries
T. Hashem
,
Lars Kulik
,
Rui Zhang
Information Systems
2013
Corpus ID: 17422629
2012
2012
Repackaging Android Applications for Auditing Access to Private Data
P. Berthomé
,
Thomas Fécherolle
,
N. Guilloteau
,
Jean-François Lalande
Seventh International Conference on Availability…
2012
Corpus ID: 12222085
One of the most important threats for Android users is the collection of private data by malware put on the market. Most of the…
Expand
2010
2010
Understanding the behavior of malicious applications in social networks
Andreas Makridakis
,
E. Athanasopoulos
,
S. Antonatos
,
Demetres Antoniades
,
S. Ioannidis
,
E. Markatos
IEEE Network
2010
Corpus ID: 26866374
The World Wide Web has evolved from a collection of static HTML pages to an assortment of Web 2.0 applications. Online social…
Expand
2009
2009
Linking Privacy Solutions to Developer Goals
Kim Wuyts
,
R. Scandariato
,
B. Decker
,
W. Joosen
ARES
2009
Corpus ID: 13110656
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security…
Expand
2006
2006
Avoiding privacy violations caused by context-sensitive services
U. Hengartner
,
P. Steenkiste
Annual IEEE International Conference on Pervasive…
2006
Corpus ID: 8713961
Review
2006
Review
2006
Pseudonym Technology for E-Services
Ronggong Song
,
L. Korba
,
George Yee
2006
Corpus ID: 63417056
Pseudonym technology is attracting more and more attention and, together with privacy violations, is becoming a major issue in…
Expand
2006
2006
Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
C. Zou
,
D. Towsley
,
W. Gong
2006
Corpus ID: 17070432
As many people rely on email communications for business and everyday life, Internet email worms constitute one of the major…
Expand
2002
2002
Modelling online security and privacy to increase consumer purchasing intent
M. Milloy
,
D. Fink
,
R. Morris
2002
Corpus ID: 73656480
This paper investigates the concerns consumers have with respect to security and privacy when determining purchasing intent in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE