Links gathered 8-2-2011: Difference between revisions

From XPUB & Lens-Based wiki
No edit summary
No edit summary
Line 1: Line 1:
*  here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet: [http://www10.cs.rose-hulman.edu/Papers/Jones.pdf].
*  here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet [http://www10.cs.rose-hulman.edu/Papers/Jones.pdf].




Line 5: Line 5:


*  both michelle and i recommend reading John McGrath's book "loving big brother" [http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed].
*  both michelle and i recommend reading John McGrath's book "loving big brother" [http://books.google.com/books?id=l1zaPL5a2RwC&lpg=PP1&ots=vEWRic0GtW&dq=loving%20big%20brother&pg=PP1&output=embed].
* alessandro acquisti does work on behavioral economics and how social networks use privacy defaults to make sure more information is revealed [http://www.heinz.cmu.edu/~acquisti/]
you can find a number of references to articles on privacy, security and social networks in these mendeley groups:
[http://www.mendeley.com/groups/666611/security-and-privacy-for-online-social-networks/] and [http://www.mendeley.com/groups/612761/sns-privacy-and-computer-science/]

Revision as of 16:02, 10 February 2011

  • here is an article that gives a short history of anonymizers that have been deployed or proposed by researchers, including an overview of attacks: Anonymous Communication on the Internet [1].


  • you can find the slides of my talk here: [2].
  • both michelle and i recommend reading John McGrath's book "loving big brother" [3].
  • alessandro acquisti does work on behavioral economics and how social networks use privacy defaults to make sure more information is revealed [4]

you can find a number of references to articles on privacy, security and social networks in these mendeley groups: [5] and [6]