Sciweavers

478 search results - page 25 / 96
» Privacy and pricing personal information
Sort
View
ITSSA
2006
132views more  ITSSA 2006»
13 years 9 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh
WSDM
2010
ACM
236views Data Mining» more  WSDM 2010»
14 years 7 months ago
Personalized Click Prediction in Sponsored Search
Sponsored search is a multi-billion dollar business that generates most of the revenue for search engines. Predicting the probability that users click on ads is crucial to sponsor...
Erick Cantú-Paz, Haibin Cheng
IDTRUST
2009
ACM
14 years 4 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
CSREASAM
2008
13 years 11 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
CCS
2008
ACM
13 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal