Internet privacy

Results: 53994



#Item
731Young adult fiction / Proxies / Proxy servers / Internet privacy

Notification Proxies: update TC39 May 2013 Tom Van Cutsem with help from Mark S. Miller, based on idea by E. Dean Tribble Why Notification Proxies? • A simpler alternative to direct proxies

Add to Reading List

Source URL: soft.vub.ac.be

Language: English - Date: 2013-05-21 05:04:01
732Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Humancomputer interaction / Institute for Applied Information Processing and Communications / Computing

Internet of Things Devices Under Attack Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
733Computing / Digital media / Privacy / World Wide Web / Identity management / Law / Internet privacy / Email / AOL / Personally identifiable information / In re Gateway Learning Corp. / Information privacy

PowerNomics Corporation of America, Inc. Privacy Policy for www.pownermomics.com This privacy policy discloses the privacy practices for www.powernomics.com. This privacy policy applies only to information collected by t

Add to Reading List

Source URL: www.powernomics.com

Language: English - Date: 2016-01-13 19:20:50
734Internet privacy / Computing / Law / Privacy / Computer security / Identity management / Medical privacy / Personally identifiable information / HTTP cookie / Privacy concerns with social networking services / P3P

  DEXTERITY VENTURES PRIVACY POLICY Dexterity Ventures Inc. (“​ Dexterity​ ”/“​

Add to Reading List

Source URL: dexterityventures.com

Language: English - Date: 2016-03-24 13:33:27
735Privacy of telecommunications / Technology / Prevention / National security / Computer network / Telephone tapping / Electronic Communications Privacy Act / Surveillance / Privacy / Internet / Pen register / Lawful interception

IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-06-07 13:58:45
736Software / Computing / Technology / Social networking services / Universal Windows Platform apps / Social networks / Applied statistics / Twitter / Twitter usage / Internet privacy / Geotagging / Social media

Identification of Key Locations based on Online Social Network Activity Hariton Efstathiades, Demetris Antoniades, George Pallis and Marios D. Dikaiakos Dept. of Computer Science, University of Cyprus Nicosia, Cyprus Ema

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2015-10-13 11:15:56
737Security / Prevention / Misconduct / Identity theft / Crime prevention / Cybercrime / Identity documents / Computer network security / Computer security / Password / Internet fraud / Internet privacy

11 Ways to Protect Yourself Online Thanks to the Internet, life is easier than it used to be. Recent headlines remind us, however, that technological progress has also created new opportunities for fraud (and much worse)

Add to Reading List

Source URL: www.cnb.com

Language: English - Date: 2014-08-06 17:57:41
738Security / Prevention / National security / Mass surveillance / Crime prevention / Law enforcement / Surveillance / National Security Agency / Internet privacy / Cloud computing / Internet / Edward Snowden

On the Feasibility of a Technological Response to the Surveillance Morass Joan Feigenbaum and J´er´emie Koenig Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, jeremie.koenig}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-05-31 10:55:23
739Software / Computing / Crowdsourcing / Business / User interface techniques / Social information processing / Human-based computation / Web services / Amazon Mechanical Turk / Gamification / Internet privacy / CrowdFlower

An Empirical Study of Workers’ Behavior in Spatial Crowdsourcing Hien To∗ Rúben Geraldes∗

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2016-06-04 02:41:56
740Social networking services / Software / Anti-Counterfeiting Trade Agreement / Internet privacy / Blog hosting services / Computing / Technology / Photo sharing / Privacy concerns with social networking services

TERMS & CONDITIONS/USER AGREEMENT

Add to Reading List

Source URL: www.date-check.com

Language: English - Date: 2016-04-14 16:16:52
UPDATE