Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
© 2018 Springer Science+Business Media, LLC, part of Springer Nature. Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting...
| Main Authors: | Kim, J., Baskerville, Richard, Ding, Y. |
|---|---|
| Format: | Journal Article |
| Published: |
Springer
2018
|
| Online Access: | http://hdl.handle.net/20.500.11937/69189 |
Similar Items
Privacy under threats: an analysis on the online risks and legal measures in protecting privacy of children online
by: Abd. Jalil, Juriah
Published: (2014)
by: Abd. Jalil, Juriah
Published: (2014)
Authentication groups with privacy-protection of machine in LTE/LTE-A networks
by: Ismail, Haqi Khalid, et al.
Published: (2017)
by: Ismail, Haqi Khalid, et al.
Published: (2017)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
Children's online privacy protection: a comparative study between the acts in Malaysia with the Children's Online Privacy Protection Act (COPPA) 1998 / Nur Fasihah Shahrol Azam, Nur Izzati Mohd Hamdi and Nabila Abdullah.
by: Shahrol Azam, Nur Fasihah, et al.
Published: (2013)
by: Shahrol Azam, Nur Fasihah, et al.
Published: (2013)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
A guideline to enforce privacy and data protection regulation in Indonesia
by: Lubis, Muharman, et al.
Published: (2013)
by: Lubis, Muharman, et al.
Published: (2013)
Privacy and personal data protection in electronic voting: factors and measures
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
A guideline to enforce privacy and data protection regulation in Indonesia
by: Lubis, Muharman, et al.
Published: (2013)
by: Lubis, Muharman, et al.
Published: (2013)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015)
by: Jin, Zhe
Published: (2015)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Understanding Consumers’ Privacy Concerns in Online Shopping: Antecedents and Consequences
by: Zhang, Kexin
Published: (2013)
by: Zhang, Kexin
Published: (2013)
The privacy concerns in location based services: protection approaches and remaining challenges
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
Security and density: A paradox of public protection at the expense of personal privacy
by: Jonescu, Emil
Published: (2017)
by: Jonescu, Emil
Published: (2017)
Bioinformatics and genetic privacy: the impact of the Personal Data Protection Act 2010
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2011)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
A relook at visual privacy: definition and factors influencing Muslim visual privacy (MVP)
by: Abd Manaf, Azhani, et al.
Published: (2019)
by: Abd Manaf, Azhani, et al.
Published: (2019)
Privacy Impact Assessment (PIA): From management tools towards a privacy culture
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Privacy in the Converged Communications Platform
by: Gita, Radhakrishna
Published: (2008)
by: Gita, Radhakrishna
Published: (2008)
Techno-Legal Implications Of Privacy
by: Min, Chee Fee
Published: (2002)
by: Min, Chee Fee
Published: (2002)
Cognitive privacy for personal clouds
by: Radenkovic, Milena
Published: (2016)
by: Radenkovic, Milena
Published: (2016)
Technology and the deterioration of right to privacy
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
by: Wan Mohd Nor, Murni, et al.
Published: (2011)
Privacy and technology: implications and challenges
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
Privacy and technology: implications and challenges
by: Shuriye, Abdi Omar, et al.
Published: (2008)
by: Shuriye, Abdi Omar, et al.
Published: (2008)
ICT omnipresence and the rights to privacy
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
by: Abdulkadir, Abdulkadir Bolaji, et al.
Published: (2023)
Dynamic privacy in public surveillance
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Similar Items
-
Privacy under threats: an analysis on the online risks and legal measures in protecting privacy of children online
by: Abd. Jalil, Juriah
Published: (2014) -
Authentication groups with privacy-protection of machine in LTE/LTE-A networks
by: Ismail, Haqi Khalid, et al.
Published: (2017) -
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012) -
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)