Links gathered 8-2-2011: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
* here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet | * here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet [http://www10.cs.rose-hulman.edu/Papers/Jones.pdf]. | ||
Line 5: | Line 5: | ||
* both michelle and i recommend reading John McGrath's book "loving big brother" [http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed]. | * both michelle and i recommend reading John McGrath's book "loving big brother" [http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed]. | ||
* alessandro acquisti does work on behavioral economics and how social networks use privacy defaults to make sure more information is revealed [http://www.heinz.cmu.edu/~acquisti/] | |||
you can find a number of references to articles on privacy, security and social networks in these mendeley groups: | |||
[http://www.mendeley.com/groups/666611/security-and-privacy-for-online-social-networks/] and [http://www.mendeley.com/groups/612761/sns-privacy-and-computer-science/] |
Revision as of 16:02, 10 February 2011
- here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet [1].
- you can find the slides of my talk here: [2].
- both michelle and i recommend reading John McGrath's book "loving big brother" [3].
- alessandro acquisti does work on behavioral economics and how social networks use privacy defaults to make sure more information is revealed [4]
you can find a number of references to articles on privacy, security and social networks in these mendeley groups: [5] and [6]