Browse by Subject "privacy"

  • Zimmer, Michael; Thiele, Jennifer; Kapusniak, Renee (iSchools, 2013-02)
    Privacy issues are not well understood by the general user. A common perception is that the younger computer user is less informed or concerned with privacy issues than the older user. However, recent studies have been ...

    application/pdf

    application/pdfPDF (12Kb)
  • Romanosky, Sasha; Hoffman, David; Acquisti, Alessandro (iSchools, 2013-02)
    The surge in popularity of social media, cloud computing, and mobile services has created an unprecedented opportunity for the collection, use and sale of personal consumer information. While these services clearly provide ...

    application/pdf

    application/pdfPDF (583Kb)
  • Ginger, Jeff (2008-07)
    In recent years an impressive number of youth have taken to joining popular online social networking service (SNS) websites. One of the most famous and prosperous of these within the US college student community is ...

    application/pdf

    application/pdfPDF (1Mb)
  • Ho, Shuyuan Mary; Treglia, Joseph Vincent (2009-02-08)
    The purpose of this panel is to identify and discuss high-level parameters and social issues regarding the implementation of a national behavioral anomaly detection platform. This platform would provide a “statistical ...

    application/pdf

    application/pdfPDF (94Kb)
  • Rubel, Alan; Biava, Ryan (iSchools, 2013-02)
    This paper offers a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework ...

    application/pdf

    application/pdfPDF (375Kb)
  • Mathiesen, Kay (2008-02-28)
    Using the methods of philosophical analysis and concepts from moral and political philosophy Indigenous Peoples’ human right to control access to their cultural information is defended. The concept of a “right” is delineated ...

    application/msword

    application/mswordMicrosoft Word (152Kb)
  • McPhail, Brenda; Ferenbok, Joseph; Dehghan, Roxanna; Clement, Andrew (iSchools, 2013-02)
    The growth of video surveillance systems and their augmentation by biometric and smart algorithms has significant implications for personal privacy. The growth of ICT networks and technologies such as face recognition make ...

    application/pdf

    application/pdfPDF (212Kb)
  • Kapadia, Apu C.; Sampemane, Geetanjali (2004-02)
    We examine the problem of providing useful feedback to users who are denied access to resources, while controlling the disclosure of the system security policies. High-quality feedback enhances the usability of a system, ...

    application/pdf

    application/pdfPDF (2Mb)
  • Newell, Bryce Clayton; Tennis, Joseph T. (iSchools, 2014-03-01)
    After Edward Snowden leaked classified intelligence records to the press in June 2013, government metadata surveillance programs - and the risk that large-scale metadata collection poses to personal information privacy ...

    application/pdf

    application/pdfPDF (154Kb)
  • Thomas, Kurt A. (2010-06-22)
    As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social networks allow users to restrict access to their personal ...

    application/pdf

    application/pdfPDF (1Mb)
  • Josten, Nick; Kift, Jonathan; Trumble, Allison; Winter, Brigid (iSchools, 2013-02)
    This study argues the need for So.cl to identify and promote information gurus within their online learning communities to aid informal learning and foster communication between communities.

    application/pdf

    application/pdfPDF (401Kb)
  • Clement, Andrew (iSchools, 2014-03-01)
    The National Security Agency's various surveillance programs recently revealed by Edward Snowden are collectively arguably the largest personal data collection and analysis operation in history. While the foremost exemplar ...

    application/pdf

    application/pdfPDF (2Mb)
  • Randall, David P.; Newell, Bryce Clayton (iSchools, 2014-03-01)
    Libraries have long maintained strong protections for patron privacy and intellectual freedom. However, the increasing prevalence of sophisticated surveillance systems in public libraries potentially threatens these core ...

    application/pdf

    application/pdfPDF (234Kb)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1Mb)
  • Shilton, Katie; Burke, Jeff; Estrin, Deborah; Hansen, Mark; Srivastava, Mani (2008-02-28)
    Ubiquitious information systems hold increasing promise for widespread participation in data collection and dissemination. Common and abundant devices such as mobile phones can sense and record data such as location, ...

    application/pdf

    application/pdfPDF (277Kb)
  • Lenhart, Laura R. (iSchools, 2013-02)
    This poster will present the early stages of research on privacy and the aggregation of personal information that draws on Michael Walzer’s seminal Spheres of Justice to develop a eudaimonistic approach to social policy ...

    application/pdf

    application/pdfPDF (128Kb)
  • Nicol, Thomas (2011-05-25)
    Advanced techniques of Non-Intrusive Load Monitoring (NILM) can provide power consumers with opportunities to easily and accurately track their own energy usage. However, as with any other powerful technology, there is ...

    application/pdf

    application/pdfPDF (593Kb)
  • Lahoti, Gaurav (2014-09-16)
    Motor fuel taxes form a great part of the total revenue collected for the development and maintenance of surface transportation. Gasoline tax payments are becoming a matter of concern as the share of Battery Vehicles (BVs) ...

    application/pdf

    application/pdfPDF (9Mb)Restricted to U of Illinois
  • Wang, Qiyan (2013-08-22)
    A key challenge in censorship circumvention is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. In this thesis, ...

    application/pdf

    application/pdfPDF (2Mb)
  • Kadloor, Sachin (2014-01-16)
    Traditionally, scheduling policies have been optimized to perform well on metrics such as throughput, delay, and fairness. In the context of shared event schedulers, where a common processor is shared among multiple users, ...

    application/pdf

    application/pdfPDF (2Mb)