Links gathered 8-2-2011: Difference between revisions
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
you can find a number of references to articles on privacy, security and social networks in these mendeley groups: | you can find a number of references to articles on privacy, security and social networks in these mendeley groups: | ||
[http://www.mendeley.com/groups/666611/security-and-privacy-for-online-social-networks/] and [http://www.mendeley.com/groups/612761/sns-privacy-and-computer-science/] | [http://www.mendeley.com/groups/666611/security-and-privacy-for-online-social-networks/] and [http://www.mendeley.com/groups/612761/sns-privacy-and-computer-science/] | ||
wanda orlikowski work on what it means to search can be read here: [http://www3.unitn.it/rucola/download/ds/Orlikowski_fb.pdf] | |||
those interested in sybil attacks on search engines may want to start with this article here, but there are also many others: [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.89.3812&rep=rep1&type=pdf] |
Latest revision as of 13:15, 11 February 2011
- here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet [1].
- you can find the slides of my talk here: [2].
- both michelle and i recommend reading John McGrath's book "loving big brother" [3].
- alessandro acquisti does work on behavioral economics and how social networks use privacy defaults to make sure more information is revealed [4]
you can find a number of references to articles on privacy, security and social networks in these mendeley groups: [5] and [6]
wanda orlikowski work on what it means to search can be read here: [7]
those interested in sybil attacks on search engines may want to start with this article here, but there are also many others: [8]