Internet research

Results: 6941



#Item
971Security / Identity management / Social issues / Computer security / Research ethics / De-identification / Differential privacy / Netflix Prize / Internet privacy / Ethics / Data privacy / Privacy

Big Data and Consumer Privacy in the Internet Economy 79 Fed. RegJun. 6, 2014) Comment of Solon Barocas, Edward W. Felten, Joanna N. Huey, Joshua A. Kroll, and Arvind Narayanan Thank you for the opportunity to

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-08-18 13:19:48
972Routing protocols / Internet protocols / Internet standards / Computer network / Telecommunications engineering / Router / Border Gateway Protocol / Forwarding plane / Routing / Network architecture / Internet / Computing

1 Off by Default! Hitesh Ballani∗ , Yatin Chawathe† , Sylvia Ratnasamy† , Timothy Roscoe† , Scott Shenker‡ ∗ Cornell University † Intel-Research ‡ ICSI/UC Berkeley

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-10-27 13:52:54
973Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 13:31:35
974

SPIR NetMonitor Research on the Sociodemography of Internet Users in the Czech Republic Medium title: seznam.cz|pocasi.seznam.cz

Add to Reading List

Source URL: 1.im.cz

Language: English - Date: 2014-12-09 03:36:03
    975Computing / Marketing / Email marketing / Internet marketing / Market research / Mediabistro.com / Email / Internet / Spamming

    Email Marketing This is a sample syllabus. Actual course topics and assignments may vary by instructor and class. Week 1 Overview of email marketing: definitions, scope, trends, and goals to consider, including driving t

    Add to Reading List

    Source URL: www.mediabistro.com

    Language: English - Date: 2013-07-10 13:32:30
    976Computing / Web analytics / Marketing / Web design / Search engine marketing / Keyword research / Google Analytics / Canonicalization / Google Webmaster Tools / Internet marketing / Internet / Search engine optimization

    Bob Gladstein 72 Oxford Street Apt. 2 Somerville, MA 02143

    Add to Reading List

    Source URL: www.raisemyrank.com

    Language: English - Date: 2015-04-29 16:54:32
    977Anime and manga fandom / Internet memes / Subtitling / Fansub / Anime music video / Behavior / Anime / Science fiction fandom / E-learning / Fan fiction / Fandom / Education

    Amateur Cultural Production and Peer-to-Peer Learning Mizuko Ito University of Southern California A paper for the 2008 annual meeting of the American Educational Research Association For the past few years I have been l

    Add to Reading List

    Source URL: www.itofisher.com

    Language: English - Date: 2009-09-19 19:29:44
    978Software / Cryptographic software / Tor / Adversary model / Onion / Onion routing / Internet privacy / Horse racing / Computing

     Trust-­‐based  Anonymous  Communica4on:   Models  and  Rou4ng  Algorithms   Aaron  Johnson   U.S.  Naval  Research  Laboratory   Paul  Syverson   U.S.  Naval  Resea

    Add to Reading List

    Source URL: freehaven.net

    Language: English - Date: 2011-11-02 11:33:27
    979Behavioral addiction / Problem gambling / Online gambling / Casino / Unlawful Internet Gambling Enforcement Act / Problem Gambling Foundation of New Zealand / Video Lottery Terminal / Loto-Québec / Gaming Research Center / Gambling / Entertainment / Gaming

    Winter, 2006 FEATURE ARTICLE Packaging gambling with sex a risky combination for teens

    Add to Reading List

    Source URL: youthgambling.mcgill.ca

    Language: English - Date: 2008-11-10 12:49:17
    980Internet / Distributed hash table / Routing / Tree / Forwarding plane / Pastry / Chord / Distributed data storage / Network architecture / Computing

    Practical Data-Centric Storage Cheng Tien Ee UC Berkeley Sylvia Ratnasamy Intel Research, Berkeley

    Add to Reading List

    Source URL: www.eecs.berkeley.edu

    Language: English - Date: 2006-03-21 12:49:23
    UPDATE