Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,861,751 papers from all fields of science
Search
Sign In
Create Free Account
Internet privacy
Known as:
Privacy (internet)
, Privacy (disambiguation)
, Jason Fortuny prank
Expand
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Avast SecureLine
Computer forensics
Computer security
Cross-site scripting
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An efficient and privacy-preserving location sharing mechanism
Nan Shen
,
Jun Yang
,
Ke Yuan
,
Chuan Fu
,
Chunfu Jia
Comput. Stand. Interfaces
2016
Corpus ID: 43618713
Review
2012
Review
2012
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Ting Yu
,
N. Borisov
Conference on Computer and Communications…
2012
Corpus ID: 62176855
It is my great pleasure to welcome you to the 2012 ACM Workshop on Privacy in the Electronic Society -- WPES'12. The purpose of…
Expand
2012
2012
Smart meter technology tradeoffs
Marcus R. Wigan
IEEE Conference on Technology and Society in Asia…
2012
Corpus ID: 31626087
Smart meters have become a matter of concern for many populations, although the technology is as always politically neutral. The…
Expand
2011
2011
Computer use monitoring and privacy at work
Kathy Eivazi
Computer Law and Security Review
2011
Corpus ID: 60622395
2011
2011
Sherlock holmes' evil twin: on the impact of global inference for online privacy
G. Friedland
,
Gregor Maier
,
Robin Sommer
,
N. Weaver
New Security Paradigms Workshop
2011
Corpus ID: 446678
User-supplied content--in the form of photos, videos, and text--is a crucial ingredient to many web sites and services today…
Expand
Review
2011
Review
2011
Security Challenges and Approaches in Online Social Networks: A Survey
R. Ajami
,
Noha Ramadan
,
N. Mohamed
,
J. Al-Jaroodi
2011
Corpus ID: 18723476
Summary Social Networks (SN) Sites are becoming very popular and the number of users is increasing rapidly. However, with that…
Expand
2010
2010
Understanding the behavior of malicious applications in social networks
Andreas Makridakis
,
E. Athanasopoulos
,
S. Antonatos
,
Demetres Antoniades
,
S. Ioannidis
,
E. Markatos
IEEE Network
2010
Corpus ID: 26866374
The World Wide Web has evolved from a collection of static HTML pages to an assortment of Web 2.0 applications. Online social…
Expand
2009
2009
Linking Privacy Solutions to Developer Goals
Kim Wuyts
,
R. Scandariato
,
B. Decker
,
W. Joosen
ARES
2009
Corpus ID: 13110656
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security…
Expand
2006
2006
Avoiding privacy violations caused by context-sensitive services
U. Hengartner
,
P. Steenkiste
Annual IEEE International Conference on Pervasive…
2006
Corpus ID: 8713961
2002
2002
Modelling online security and privacy to increase consumer purchasing intent
M. Milloy
,
D. Fink
,
R. Morris
2002
Corpus ID: 73656480
This paper investigates the concerns consumers have with respect to security and privacy when determining purchasing intent in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE