Advertisement

State of Online Privacy: A Technical Perspective

  • Florian Kelbert
  • Fatemeh Shirazi
  • Hervais Simo
  • Tobias Wüchner
  • Johannes Buchmann
  • Alexander Pretschner
  • Michael Waidner
Part of the acatech Studie book series (ACATECHSTUD)

Zusammenfassung

Internetbasierte Anwendungen und Angebote haben in den vergangenen Jahren enorme Verbreitung gefunden und prägen heutzutage sowohl die Lebensgestaltung Einzelner als auch Vorgänge in Unternehmen und öffentlichen Einrichtungen. Diese Anwendungen gehen einher mit umfassender Datensammlung, langjähriger Datenspeicherung sowie gezielter Datenweitergabe zwischen Einzelpersonen, Partnerunternehmen und Wissenschaftlern. Hierdurch entstehen noch nie dagewesene Datenschutzprobleme. Beispielsweise ermöglichen internetbasierte Anwendungen und die hierin genutzten Technologien die Profilbildung und Verfolgung einzelner Nutzer über mehrere Internetzonen hinweg - oftmals ohne Wissen oder Einverständnis der Nutzer. In diesem Abschnitt gehen wir auf den aktuellen Stand der Technik im Hinblick auf Privatsphäre und Datenschutz im Internet ein. Hierzu werden die gegenwärtigen Bedrohungen im Hinblick auf Privatsphäre sowie existierende Gegenmaßnahmen beschrieben und analysiert. Die Analyse basiert auf fünf neuartigen internetbasierten Anwendungen: personalisierte Web- und E-Commerce-Angebote, soziale Online-Netzwerke, Cloud Computing, Cyber-Physical Systems und Big Data. Nach Beschreibung dieser Anwendungen werden zunächst die Privatsphäre-bedrohenden Techniken, die verstärkt im Internet eingesetzt werden, erläutert. Anschließend werden Technologien erörtert, die bei entsprechendem Einsatz den Bedrohungen entgegenwirken können und somit Privatsphäre im Internet fördern.

Abstract

Recentyears have seen an unprecedented growth of Internet-based applications and offerings that have a huge impact on individuals’ daily lives and organisations’ (businesses and governments) practices. These applications are bound to bring large-scale data collection, long-term storage, and systematic sharing of data across various data controllers i.e., individuals, partner organizations, and scientists. This creates new privacy issues. For instance, emerging Internet-based applications and the underlying technologies provide new ways to track and profile individual users across multiple Internet domains, often without their knowledge or consent. In this section, we present the current state of privacy on the Internet. The section proposes a review and analysis of current threats to individual privacy on the Internet as well as existing countermeasures. Our analysis considers five emerging Internet-based applications, namely personalized web and E-commerce services, online social networks, cloud computing applications, cyber-physical systems, and Big data. It outlines privacy-threatening techniques, with a focus on those applications. We conclude with a discussion on technologies that could help address different types of privacy threats and thus support privacy on the Web.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. AbuHmed/Mohaisen/Nyang 2008.
    AbuHmed, Tamer/ Mohaisen, Abedelaziz/ Nyang, DaeHun: Magazine of Korea Telecommunication Society, Vol. 24, No. 11:25–36, 2007.Google Scholar
  2. acatech 2011.
    acatech (Hrsg.): Cyber-Physical Systems-Innovationsmotor für Mobilität, Gesundheit, Energie und Produktion (acatech POSITION), Heidelberg u.a.: Springer Verlag 2011. http://www.acatech.de/fileadmin/use_upload/Baumstruktu_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/cps/acatech_POSITION_CPS_web.pdf Google Scholar
  3. Acquisti/Gross/Stutzman 2011.
    Acquisti, Alessandro/ Gross, Ralph/ Stutzman, Fred: Face Recognition Study, 2011. URL: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/
  4. Acquisti/Gross 2009.
    Acquisti, Alessandro/ Gross, Ralph: Predicting Social Security Numbers from Public Data, 106 PROC. NAT’L, ACAD, SCI. 10975-80, 2009.Google Scholar
  5. Abdul-Rahman 1997.
    Abdul-Rahman, Alfarez: The pgp trust model, EDI-Forum, the Journal of Electronic: 1–6. 1997.Google Scholar
  6. Albanesius 2012.
    Albanesius, Chloe: Web Surfing Activity Vulnerable to ‘History Sniffing’, Report Says. PCMAC, 2010. Alsaid/martin 2002Google Scholar
  7. Alsaid, Adil/ Martin, David: Detecting web bugs with Bugnosis: Privacy advocacy through education, Proceedings of Workshop on Privacy Enhancing Technologies, Springer-Verlag, 2002.Google Scholar
  8. Andersen/Balakrishnan/Feamster/Koponen/Moon/Shenker 2008.
    Andersen, David G./ Balakrishnan, Hari/ Feamster, Nick/ Koponen, Teemu/ Moon, Daekyeong/ Shenker, Scott: Accountable Internet Protocol (AIP), Proceedings of the ACM SIGCOMM conference on Data communication SIGCOMM 08 38(4): 339–350, 2008.Google Scholar
  9. Anderson/Brusa/Price/Jerell/Jo 2011.
    Anderson, Matt/Brusa, Jennifer/ Price, Jerell/ Sims, Jo: Turning “Like” to “Buy”: Social Media Emerges as a Commerce Channel, 2011. URL: http://www.booz.com/global/home/what_we_think/reports_and_white_papers/ic-display/49009342 http://www.booz.com/media/uploads/BaC-Turning_Like_to_Buy.pdf
  10. Anderson/Fuloria 2010.
    Anderson, Ross/ Fuloria, Shailendra: Who controls the off switch?, First IEEE International Conference Smart Grid Communications (SmartGridComm): 96–101, 2010. URL: http://www.cl.cam.ac.uk/_rja14/Papers/meters-offswitch.pdf
  11. Ansari/Rajeev/Chandrashekar 2002/2003.
    Ansari, Sabeel/ Rajeev, S. G./ Chandrashekar, H. S.: Packet sniffing: a brief introduction, Potentials, IEEE, Vol. 21, No. 5: 17–19, Dec 2002/Jan 2003.Google Scholar
  12. Arshad 2004.
    Arshad, Fahd: Privacy Fox-A JavaScript-based P3P Agent for Mozilla Firefox, 2004.Google Scholar
  13. Adolphs/Winkelmann 2010.
    Adolphs, Christoph/ Winkelmann, Axel: A rigorous literature review on personalization research in e-commerce (2000–2008), In Journal of Electronic Commerce Research, Vol. 11: 326–341, 2010.Google Scholar
  14. Adomavicius/Tuzhilin 2005.
    Adomavicius, Gediminas/ Tuzhilin, Alexander: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions, Knowledge and Data Engineering, IEEE, Vol. 17, No. 6: 734–749, 2005.CrossRefGoogle Scholar
  15. Badrul/Karypis/Konstan/Riedl 2000.
    Sarwar, Badrul/ Karypis, George/ Konstan, Joseph/ Riedl, John: Analysis of Recommendation Algorithms for E-Commerce, Proceedings of the 2nd ACM conference on Electronic commerce (EC,00): 158–167, 2000.Google Scholar
  16. Baker/Shah/Rosenthal/Roussopoulos/Maniatis/Giuli/Bungale 2006 Baker, Mary/ Shah, Mehul/ Rosenthal, David S. H./ Rousso-poulos, Mema/ Maniatis, Petros/ Giuli, TJ/Bungale, Prashanth: A Fresh Look at the Reliability of Long-term Digital Storage, Proceedings of Computer systems (Euro-Sys): 221–234, 2006.Google Scholar
  17. Barbaro/Zeller 2006.
    Barbaro, Michael/ Zeller, Tom Jr.: A Face Is Exposed for AOL Searcher No. 4417749, The New York Times, 09/08/2006. URL: http://www.nytimes.com/2006/08/09/technology/09aol.html?pagewanted=all
  18. Bender/Spring/Levin/Bhattacharjee 2007.
    Bender, Adam/ Spring, Neil/ Levin, Dave/ Bhattacharjee, Bobby: Accountability as a service, Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, USENIX Association, Article 5, 2007.Google Scholar
  19. Bermann 2006.
    Bermann, S.: Privacy and Access to Public Records in the Information Age, Bepress Legal Series, page 1303, 2006.Google Scholar
  20. Besmer/watson/lipford 2010.
    Besmer, Andrew/ Watson, Jason/ Lipford, Heather Richter: The Impact of Social Navigation on Privacy Policy Configuration, Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS 2010), 2010.Google Scholar
  21. Bittau/Hamburg/Handley/Mazieres/Boneh 2010.
    Bittau, Andrea/ Hamburg, Michael/ Handley, Mark/ Mazieres, David/ Boneh, Dan: The case for ubiquitous transport-level encryption, Proceedings of the 19th USENIX conference on Security, 2010.Google Scholar
  22. Bollier 2010.
    Bollier, D.: The Promise and Peril of Big Data, Program: 1–66, 2010. URL: http://www.aspeninstitute.org/sites/default/files/content/docs/pu bs/I nfoTech09.pdf
  23. Boutin 2006.
    Boutin, Paul: You Are What You Search-AOL’s data leak reveals the seven ways people search the Web, 2006. URL: http://www.slate.com/articles/technology/technology/2006/08/you_are_what_you_search.html
  24. boyd/Ellison2007.
    boyd, danah M./ Ellison, Nicole: Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, Vol. 13, No. 1: 210–230, 2007.CrossRefGoogle Scholar
  25. boyd/Crawford 2011.
    boyd, d, Crawford, K.: Six Provocations for Big Data, Computer: 1–17, 2011. URL: http://ssrn.com/paper=1926431.
  26. Bradley 2012.
    Bradley, Tony: Introduction to Packet Sniffing. URL: http://netsecurity.about.com/cs/hackertools/a/aa121403.htm/ [12/1/2012].
  27. Breese/Heckerman/Kadie 1998.
    Breese, J. S., Heckerman, D., and Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering, Proceedings of the Fourteenth Conference on University in Artificial Intelligence, Madison, WI, 1998.Google Scholar
  28. Brueckner/Voss 2005.
    Brueckner, Lars/ Voss, Marco: MozPETs-a privacy enhanced Web Browser, Conference on Privacy, Security and Trust, 2005.Google Scholar
  29. BSI 2011.
    Federal Office for Information Security (BSI): White Paper Security Recommendations for Cloud Computing Providers (Minimum information security requirements), 22/06/2011. URL: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Minimum_information/SecurityRecommendationsCloudComputingProviders.pdf?__blob=publicationFile
  30. Buchegger/Schiöberg/Vu/Datta 2009.
    S. Buchegger/ D. Schiöberg/ L.H. Vu/ A. Datta: PeerSoN: P2P Social Networking-Early Experiences and Insights, Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems, 2009.Google Scholar
  31. Buchmann/may/Vollmer 2006.
    Buchmann, Johannes / May, Alexander/ Vollmer, Ulrich: Perspectives for cryptographic long-term security, Commun. ACM, Vol. 49, Issue 9: 50–55, 2006.Google Scholar
  32. Calandrino/Kilzer/Narayanan/Felten/Shmatikov 2011.
    Calandrino, Joseph A./ Kilzer, Ann/ Narayanan, Arvind/ Felten, Edward W./ Shmatikov, Vitaly: “You Might Also Like:“ Privacy Risks of Collaborative Filtering, Proceedings of the IEEE Symposium on Security and Privacy (SP’11, 2011.Google Scholar
  33. Callas/Donnerhacke/Finney/Shaw/Thayer 2007.
    Callas, J./ Donnerhacke, L./ Finney, H./ Shaw, D./ Thayer, R.: RFC 4880: OpenPGP Message Format, The Internet Engineering Task Force, 2007.Google Scholar
  34. Canetti 2004.
    Canetti, Ran: Universally Composable Signature, Certification, and Authentication, Proceedings of the 17th IEEE workshop on Computer Security Foundations: 219–233, IEEE Computer Society, Washington, DC, USA, 2004.Google Scholar
  35. Carneiro/Mylonakis 2009.
    Carneiro, Herman Anthony/ Mylonakis, Eleftherios: Google Trends: A Web-Based Tool for Real-Time Surveillance of Disease Outbreaks, 2009/11/15. URL: http://cid.oxfordjournals.org/content/49/10/1557. abstract
  36. Cashmore 2010.
    Cashmore, P.: Should Facebook add a dislike button?, CNN.com, 22/07/2010. URL:http://edition.cnn.com/2010/TECH/social.media/07/22/facebook.dislike.cashmore/
  37. Castelluccia 2012.
    Castelluccia, Claude: Behavioural Tracking on the Internet: A Technical Perspective, book chapter of European Data Protection: In Good Health?, Springer Netherlands, 2012.Google Scholar
  38. Castelluccia/Cristofaro/Perito 2010.
    Castelluccia, Claude/ De Cristofaro, Emiliano/ Perito, Daniele: Private Information Disclosure from Web Searches, PETS’10 Proceedings of the 10th international conference on Privacy enhancing technologies Springer-Verlag Berlin, 2010.Google Scholar
  39. Castellucia/Druschel/Fischer Hübner/Pasic/Preneel/Tschofenig2010.
    Castellucia, Claude/ Druschel, Peter/ Fischer Hübner, Simone/ Pasic, Aljosa/ Preneel, Bart / Tschofenig, Hannes: Privacy, Accountability and Trust — Challenges and Opportunities, European Network and information Security Agency (ENISA), 2010.Google Scholar
  40. Caviglione/Coccoli 2011.
    Caviglione, L./ Coccoli, M.: Privacy problems with Web 2.0, Computer Fraud Security: 19–16, 2011.Google Scholar
  41. Chaum 1981.
    Chaum, David L.: Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, Vol. 24 Issue 2: 84–90, 1981.CrossRefGoogle Scholar
  42. Chapple 2011.
    Chapple, Mike: Data Mining: An Introduction. URL: http://databases.about.com/od/datamining/a/datamining.htm/ [11/12/2011].
  43. Chellappa/Sin 2005.
    Chellappa, Ramnath K./ Sin, Raymond G.: Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma, Inf. Technol. and Management, Vol. 6: 181–202,2005.CrossRefGoogle Scholar
  44. Chen/Rahman 2008.
    G. Chen and F. Rahman. Analysing Privacy Designs of Mobile Social Networking Applications, Proc. Int’l. Symp. Trust, Security and Privacy for Pervasive Applications, 2008.Google Scholar
  45. Clarke/Miller/Hong/Sandberg/Wiley 2002.
    Clarke, Ian/ Miller, Scott G./ Hong, Theodore W./ Sandberg Oskar/ Wiley, Brandon: Protecting Free Expression Online with Freenet. In: IEEE Internet Computing, Vol. 6 Issue 1: 40–49, 2002.CrossRefGoogle Scholar
  46. Clauss/Koehntopp 2001.
    Clauss, Sebastian/ Koehntopp, Marit: Identity management and its support of multilateral security, Computer Networks, Vol. 37, Issue 2: 205–219, 2001.CrossRefGoogle Scholar
  47. Clifton 2008.
    Clifton, Brian: Web Analiytics-Web Traffic Data Sources & Vendor Comparison, White paper in conjunction with Omega Digital Media Ltd, 2008.Google Scholar
  48. Computerwoche 2011.
    Cloer, Thomas: E-Commerce wird mobiler und sozialer, Computerwoche, 20/10/2011. URL:http://www.computerwoche.de/netzwerke/web/2498237/
  49. Constantin 2011.
    Constantin, Lucian: Facebook Spam Worm Propagates via Persistent XSS Vulnerability, Softpedia, 10/03/2011. URL http://news.softpedia.com/news/Facebook-Spam-Worm-Propagates-via-Persistent-XSS-Vulnerability-188934.shtml/ [23/05/2012].
  50. Cranor/Arjula/Guduru 2002.
    Cranor, Lorrie Faith/ Arjula, Manjula/ Guduru, Praveen: Use of a P3P user agent by early adopters, Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society: 1–10, ACM, 2002.Google Scholar
  51. Cranor 2003.
    Cranor, Lorrie Faith: I didn’t buy it for myself’ privacy and ecommerce personalization, In Proceedings of ACM workshop on Privacy in the electronic society (WPES 03): 111–117, 2003.Google Scholar
  52. Cranor/McDonald/Egelman/Sheng 2007.
    Cranor, Lorrie Faith/ McDonald, Aleecia M./ Egelman, Serge/ Sheng, Steve: Privacy Policy Trends Report, CyLab Privacy Interest Group, 2007.Google Scholar
  53. CRR2011.
    Center for Retail Research: Online Retailing: Britain and Europe 2012, 2012. URL: http://www.retailresearch.org/onlineretailing.php, [30/01/2012]
  54. CSA 2009.
    Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, 12/2009. URL: http://www.cloudsecurityalliance.org/csaguide.pdf
  55. CSA 2010.
    Cloud Security Alliance: Top Threats to Cloud Computing, 03/2010. URL:http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
  56. Cutillo/Molva/Strufe 2009.
    Cutillo, Leucio/ Molva, Refik/ Strufe, Thorsten: Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, Vol. 47,: 94–101, 2009.CrossRefGoogle Scholar
  57. Cubrilovic 2011.
    Cubrilovic, Nik: URL: https://plus.google.com/105854725972317368943/posts/ [30/05/2012].
  58. Daemen/Rijmen 2002.
    Daemen, Joan/ Rijmen, Vincent: The Design of Rijndael: AES-The Advanced Encryption Standard, Springer-Verlag New York, Inc., Secaucus, 2002.zbMATHCrossRefGoogle Scholar
  59. Daly 2010.
    Daly, Angela: The Legality of Deep Packet Inspection, 2010. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1628024.
  60. David/Zwerdling/Guy/Ofek-Koifman/Har’el/Ronen/ Uziel/Yogev/Chernov 2009.
    Carmel, David/ Zwerdling, Naama/ Guy, Ido/ Ofek-Koifman, Shila/ Har’el, Nadav /Ronen, Inbal/ Uziel, Erel/ Yogev, Sivan/ Chernov, Sergey: Personalized social search based on the user’s social network, Proceedings of the 18th ACM conference on Information and knowledge management (CIKM,09): 1227–1236, ACM, 2009.Google Scholar
  61. Davison/Maraist/Bing 2011.
    Davison, H. K./Maraist, C./ Bing, M. N.: Friend or Foe? The Promise and Pitfalls of Using Social Networking Sites for HR Decisions, Journal of Business and Psychology, Vol. 26, Issue: 2: 153–159,2011.CrossRefGoogle Scholar
  62. Davos 2012.
    The World Economic Forum: Big Data, Big Impact: New Possibilities for International Development, 2012. URL: http://www.weforum.org/reports/big-data-big-impact-new-possibilitiesinternational-development
  63. Deloitte 2011.
  64. Dierks/Rescorla 2008.
    Dierks, Tim/ Rescorla, Eric: RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. IETF., The Internet Engineering Task Force, 2008.Google Scholar
  65. Diesburg/Wang 2010.
    Diesburg, Sarah M./ Wang, An-I Andy: A survey of confidential data storage and deletion methods, ACM Computing Surveys, Vol. 43 Issue 1, Article No. 2, 2010.Google Scholar
  66. Dingledine/mathewson/Syverson 2004.
    Dingledine, Roger/ Mathewson, Nick/ Syverson Paul: Tor: The second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, Vol. 13: 303–320, 2004.Google Scholar
  67. Directive 95/46/EC.
    EU Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC, 23, 1995.Google Scholar
  68. Dobias 2011.
    Dobias, Jaromir: Privacy Effects of Web Bugs Amplified by Web 2.0, Book Chapter of Privacy and Identity Management for Life, Springer Boston, 2011.Google Scholar
  69. Douceur 2002.
    Douceur, John R: The Sybil Attack, International Workshop on Peer-To-Peer Systems, Lecture Notes in Computer Science, Vol. 2429: 251–260, Springer Berlin/Heidelberg, 2002.Google Scholar
  70. Duc/Keryell 2006.
    Duc, Guillaume/ Keryell, Ronan: CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection, Computer Security Applications Conference: 483–492, 2006.Google Scholar
  71. Dumitru 2009.
  72. Dwork 2008.
    Dwork, Cynthia: Differential Privacy: A Survey of Results, Theory and Applications of Models of Computation, Lecture Notes in Computer Science Vol. 4978: 1–19, Springer Berlin/Heidelberg, 2008.Google Scholar
  73. Dwork/Smith 2009.
    Dwork, Cynthia/Smith, Adam: Differential Privacy for Statistics: What we Know and What we Want to Learn, Journal of Privacy and Confidentiality, Vol. 1 Issue 2: 135–154, 2009.Google Scholar
  74. Eckersley 2010.
    Eckersley, Peter: How Unique Is Your Web Browser?, Privacy Enhancing Technologies: 1-18, 2010.Google Scholar
  75. Edelman 2009.
    Edelman, Benjamin: Adverse selection in online “trust” certifications, Proceedings of the 11th International Conference on Electronic Commerce: 205–212, ACM New York, 2009.Google Scholar
  76. Edwards/Riley 2011.
    Edwards, Cliff/ Riley, Michael: Sony Data Breach Exposes Users to Years of Identity-Theft Risk. Bloomberg, 03/05/2011. URL: http://www.bloomberg.com/news/2011-05-03/sonybreach-exposes-users-to-identity-theft-as-credit-card-threatrecedes.Html
  77. Egele/moser/Kruegel/Kirda 2011.
    Egele, Manuel/ Moser, Andreas/ Kruegel, Christopher/Kirda, Engin: PoX: Protecting users from malicious Facebook applications, IEEE PERCOM Workshops, 2011.Google Scholar
  78. Eirinaki/Vazirgiannis 2003.
    Eirinaki, Magdalini/ Vazirgiannis, Michalis: Web mining for web personalization, ACM Trans. Internet Technol. 3, 1: 1–27, 2003.CrossRefGoogle Scholar
  79. Elgamal 1985.
    El Gamal, Taher: A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of CRYPTO 84 on Advances in cryptology: 10–18, Springer-Verlag New York, Inc., 1985.Google Scholar
  80. E-Marketer 2011.
    E-Marketer: US M-Commerce Sales to Grow 91% to $6.7 Billion in 2011,01/12/2011. URL:http://www.emarketer.com/PressRelease.aspx?R=1008716
  81. Enck/Butler/Richardson/McDaniel/Smith 2008.
    Enck, William/ Butler, Kevin/ Richardson, Thomas/ McDaniel, Patrick/ mith, Adam: Defending Against Attacks on Main Memory Persistence, Proceedings of the 2008 Annual Computer Security Applications Conference: 65–74, IEEE Computer Society, 2008.Google Scholar
  82. Enev/Gupta/Kohno/Patel 2011.
    Enev, Miro / Gupta, Sidhant / Kohno, Tadayoshi/ Patel, Shwetak: Televisions, Video Privacy, and Powerline Electromagnetic Interference, http://abstract.cs.washington.edu/~miro/docs/ccs2011.pdf
  83. ENISA 2007.
    ENISA: Security Issues and Recommendations for Online Social Networks, Position Paper,11/2007. URL:http://fredstutzman.com/papers/ENISA2007.pdf
  84. ENISA 2009.
  85. EPIC on Re-identification.
    Re-identification. URL: http://epic.org/privacy/reidentification/ [23/05/2012].
  86. Del Sesto/Frankel 2008.
    Del Sesto, Ronald W. Jr./ Frankel, Jon: How deep Packet Inspection changed the Privacy debate, Bingham (Law Firm), 2008. URL: http://www.bingham.com/Publications/Files/2008/09/How-Deep-Packet-Inspection-Changed-the-Privacy-Debate/ [30/5/2012].
  87. Facebook 2010.
    Facebook: The Value of a Liker by Facebook + Media, 29/09/2010. URL: http://www.facebook.com/notes/facebook-media/value-of-a-liker/150630338305797
  88. Fletcher 2010.
    Fletcher, Dan: How Facebook Is Redefining Privacy, Time Magazine, 20/05/2010. URL: http://www.time.com/time/magazine/article/0,9171,1990798,00.html#ixzz1lpfqrijz
  89. FTC 2000.
    Federal Trade Commission: Online Profiling: A Report to Congress-Part 2-Recommendations, 2000.Google Scholar
  90. FTC 2009.
    Federal Trade Commission, FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising-Behavioral Advertising Tracking, Targeting, & Technology, 02/2009. URL: http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf
  91. FTC 2010.
    Federal Trade Commission: Protecting Consumer Privacy in an Era of Rapid Change, 2010. URL: http://www.ftc.gov// [23/05/2012].
  92. Freudiger/Shokri/Hubaux 2011.
    Freudiger, J./ Shokri, R./ Hubaux, J.-P.: Evaluating the Privacy Risk of Location-Based Services, Financial Cryptography and Data Security (FC), 2011.Google Scholar
  93. Friedland/Sommer 2010.
    Friedland, G./ Sommer, R.: Cybercasing the joint: On the privacy implications of geo-tagging, USENIX Workshop on Hot Topics in Security, 2010.Google Scholar
  94. Gartner 2009.
    Shen et al.: Dataquest Insight: The Top 10 Consumer Mobile Applications in 2012, Gartner Research, 2009.Google Scholar
  95. Gartner 2010.
    Gartner, Inc.: Forecast: Public Cloud Services, Worldwide and Regions, Industry Sectors, 2009-2014. 02/6/2010. URL: http://www.gartner.com/resId=1378513
  96. Gerck 2002.
    Gerck, Ed.: Trust as Qualified Reliance on Information Trust as Qualified, Reading: 1071–6327, 2002. URL: http://nma.com/papers/it-trust-part1.pdf
  97. Geyer/Freyne/Mobasher/Anand/Dugan 2010.
    Geyer, Werner/ Freyne, Jill/ Mobasher, Bamshad/ Anand, Sarabjot Singh/ Dugan, Casey: Recommender Systems and the Social Web, 2nd workshop on recommender systems and the social web, Proceedings of the fourth ACM conference on Recommender systems (RecSys, 10): 379–380, ACM, 2010.Google Scholar
  98. Ginsberg/Mohebbi/Patel/Brammer/Smolinski/Brilliant 2009.
    Ginsberg, Jeremy/ Mohebbi, Matthew H./ Patel, Rajan S./ Brammer, Lynnette/ Smolinski, Mark S./ Brilliant, Larry: Detecting influenza epidemics using search engine query data, Nature, Vol. 457, Macmillan Publishers, 2009.Google Scholar
  99. Goldschlag/Reed/Syverson 1999.
    Goldschlag, David/ Reed, Michael/ Syverson, Paul: Onion routing, Communications of the ACM, Vol. 42 Issue 2: 39–41, 1999.CrossRefGoogle Scholar
  100. Google Reader 2012.
    Beware! Google Reader Notifier for Firefox Is Now Crap-wared. URL: http://www.howtogeek.com/howto/2585/beware-google-reader-notifierfor-firefox-is-now-crapware/ [30/05/2012].
  101. Goy/Ardissono/Petrone 2007.
    Goy, Anna/ Ardissono, Liliana/ Petrone, Giovanna: Personalization in e-commerce applications. In the adaptive web, Peter Brusilovsky, Alfred Kobsa, and Wolfgang Nejdl (Eds.), Lecture Notes In Computer Science, Vol. 4321, Springer-Verlag, 2007.Google Scholar
  102. Götz/Machanavajjhala/Wang/Xiao/Gehrke 2012.
    Gotz, Michaela/ Machanavajjhala, Ashwin/ Wang, Guozhang/ Xiao, Xiaokui/ Gehrke, Johannes: Publishing Search Logs — A Comparative Study of Privacy Guarantees, IEEE Trans. On Knowl. and Data Eng. Vol. 24:520–532, 2012.CrossRefGoogle Scholar
  103. Grance/Jansen 2011.
    Grance, T./ Jansen, W.: Guidelines on Security and Privacy in Public Cloud Computing, NIST, NIST SP-800-144, 2011. URL: http://www.nist.gov/manuscript-publicationsearch.cfm?pub_id=909494
  104. Grandison/Sloman 2000.
    Grandison, Tyrone/ Sloman, Morris: A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, Vol. 3 No. 4: 2–16, 2000.CrossRefGoogle Scholar
  105. Griffiths 2010.
    Griffiths, Sarah: Mobile social networking apps spark privacy concerns, Hexus, 2010. URL: http://hexus.net/business/news/internet/25288-mobile-social-networkingapps-spark-privacy-concerns// [23.05.2012].
  106. Gross/Acquisti 2005.
    Gross, R./ Acquisti, A.: Privacy and Information Revelation in Online Social Networks, ACM Workshop on Privacy in the Electronic Society: 71–80, 2005.Google Scholar
  107. Guarda/Zannone 2009.
    Guarda, P./ Zannone, N.: Towards the development of privacy-aware systems, Inf. Softw. Technol., Vol. 51: 337–350, 2009.CrossRefGoogle Scholar
  108. Hagen/Manning/Souza 1999.
    Hagen, P. R./ Manning, H./ Souza, R.: Smart personalization, Technical report, Forrester Research, Cambridge, MA, 1999.Google Scholar
  109. Halderman/Schoen/Heninger/Clarkson/Paul/Calandrino/feldman/Appelbaum/felten 2009.
    Halderman, J. Alex/ Schoen, Seth D./ Heninger, Nadia/ Clarkson, William/ Paul, William/ Calandrino, Joseph A./ Feldman, Ariel J./ Appelbaum, Jacob/ Felten, Edward W.: Lest we remember: cold-boot attacks on encryption keys, Communications of the ACM, Vol. 52 Issue 5:91–98, 2009.CrossRefGoogle Scholar
  110. Hansen/Schwartz/Cooper 2008.
    Hansen, Marit/ Schwartz, Ari/Cooper, Alissa: Privacy and Identity Management, IEEE Security & Privacy, Vol. 6 No. 2: 38–45, 2008.CrossRefGoogle Scholar
  111. Hansen 2008.
    Hansen, Marit/ Pfitzmann, Andreas/ Steinbrecher, Sandra: Identity management throughout one’s whole life, Inf. Secur. Tech., Vol. 13, No. 2: 83–94, 2008.CrossRefGoogle Scholar
  112. Hansen 2009.
    Hansen, Marit: Putting Privacy Pictograms into Practice-a European Perspective, GI Jahrestagung 2009, 2009Google Scholar
  113. Head/Yuan 2001.
    Head, Milena/ Yuan, Yufei: Privacy Protection in Electronic Commerce: A Theoretical Framework, Human Systems Management, 20: 149–160, 2001.Google Scholar
  114. Hedbom 2009.
    Hedbom, Hans: iA Survey on Transparency Tools for Enhancing Privacy. In: The Future of Identity in the Information Society, Springer, Vol. 298: 67–82, 2009.CrossRefGoogle Scholar
  115. Heuston 2011.
    Heuston, George Z.: Privacy concerns: From social media aggregation to aggravation. URL: http://www.oregonlive.com/argus/index.ssf/2011/01/privacy_concerns_from_social_m.html/ [03/02/2012].
  116. Hilty/Pretschner/Basin/Schaefer 2007.
    Hilty, Manuel/ Pretschner, Alexander/ Basin, David/ Schaefer, Christian/ Walter, Thomas: Monitors for usage control. In: Trust Management, Springer, Vol. 238: 411–414, 2007.CrossRefGoogle Scholar
  117. Hill 2011.
    Hill, Kashmir: Mark Zuckerberg’s private photos exposed due to Facebook flaw, Forbes, 12/06/2011. URL: http://www.forbes.com/sites/kashmirhill/2011/12/06/mark-zuckerbergs-private-photos-exposed-thanks-to-facebookflaw/ [23/05/2012].
  118. HIPAA 1996.
    Congress of the USA: The Health insurance portability and accountability act, In: Congress of the USA, 1996.Google Scholar
  119. Ho/Kwok 2003.
    Ho, Shuk Ying/ Kwok, Sai Ho: The attraction of personalized service for users in mobile commerce: an empirical study, SIGecom Exch. 3, 4:10–18, 2003.CrossRefGoogle Scholar
  120. Ho/Tam 2005.
    Ho, S. Y./ Tam, K. Y: An Empirical Examination of the Effects of Web Personalization at Different Stages of Decision Making, International Journal of Human-Computer Interaction, Vol. 19, Issue 1:95–112,2005.MathSciNetCrossRefGoogle Scholar
  121. Hoffman 2002.
    Hoffman, P: RFC 3207: SMTP service extension for secure SMTP over Transport Layer Security, The Internet Engineering Task Force, 2002.Google Scholar
  122. Hu/Ahn 2011.
    Hu, Hongxin/ Ahn, Gail-Joon: Multiparty authorization framework for data sharing in online social networks, Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy (DBSec’11):, 29–43, Yingjiu Li (Ed.). Springer-Verlag, Berlin/Heidelberg, 2011.Google Scholar
  123. Hu/Zong/Lee/Yeh 2003.
    Hu, Wen-Chen/ Zong, Xuli / Lee, Chung-wei/ Yeh, Jyh-haw: World Wide Web usage mining systems and technologies, Journal on Systemics, Cybernetics, and Informatics, 1(4): 53–59, 2003.Google Scholar
  124. Hull/Lipford/Latulipe 2011.
    Hull, Gordon/ Lipford, Heather Richter/ Latulipe, Celine: Contextual gaps: privacy issues on Facebook, Ethics and Inf. Technol. Vol. 13,4: 289–302, 2011.CrossRefGoogle Scholar
  125. IAB Europe 2010.
    Interactive Advertising Bureaux (IAB) Europe, Europe’s online ad market continues to grow despite the recession, 2010. URL: http://www.iabeurope.eu/news/europe%27s-onlinead-market-continues-to-grow-despite-the-recession.aspx/ [26/05/2012].
  126. IAB Europe 2011.
    Interactive Advertising Bureaux (IAB) Europe, ONLINE DISPLAY ADVERTISING BOUNCES BACK, 2011. URL:http://www.iabeurope.eu/news/online-display-advertisingbounces-back.aspx/ [26/05/2012].
  127. IAB PWC 2011.
    PricewaterhouseCoopers, IAB Internet Advertising Revenue Report, 2011. URL:http://www.iab.net/insights_research/industry_data_and_landscape/adrevenuereport/ [26/05/2012].
  128. ITU 2011.
    International Telecommunication Union, Measuring the Information Society, Geneva 2011.Google Scholar
  129. InternetWorldStats 2011.
    Internet World Stats, World Internet Usage and Population statistics, 31/12/2011. URL: http://www.internetworldstats.com/stats.htm/ [26/07/2012].
  130. Invoke 2010.
    Invoke, Invoke Live! Social Commerce, Key Findings Report, 15/10/2010. URL: http://www.invoke.com/sites/default/files/m-files/lnvokeLive-2010-SocialCommerceReport.pdf/ [26/07/2012].
  131. Irani/Webb/Li/Pu 2009.
    Irani, Danesh/ Webb, Steve/ Li, Kang/ Pu, Calton: Large Online Social Footprints—An Emerging Threat, International Conference on Computational Science and Engineering 3: 271–276, 2009.Google Scholar
  132. Irani/Webb/Pu/Li 2011.
    Irani, Danesh/ Webb, Steve/ Pu, Calton/ Li, Kang: Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks, Internet Computing, IEEE, Vol. 15, No. 3:13–19, 2011.CrossRefGoogle Scholar
  133. Jagatic/Johnson/Jakobsson/Menczer 2007.
    Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. 2007. Social phishing. Commun. ACM 50,10 (October 2007), 94–100.CrossRefGoogle Scholar
  134. Jang/Jhala/Lerner/Shacham 2010.
    Jang, Dongseok/ Jhala, Ranjit/ Lerner, Sorin/ Shacham, Hovav: An empirical study of privacy-violating information flows in JavaScript web applications, Proceedings of ACM conference on Computer and communications security (CCS, 10):270–283, 2010.Google Scholar
  135. Jendricke/Markotten 2000.
    Jendricke, Uwe/ Markotten, Daniela Gerd: Usability meets security-the Identity-Manager as your personal security assistant for the Internet, Proceedings of the 16th Annual Computer Security Applications Conference, IEEE Computer Society, 2000.Google Scholar
  136. Johnson III 2007.
    Johnson III, Clay: Safeguarding against and responding to the breach of personally identifiable information, Office of Management and Budget Memorandum, 2007.Google Scholar
  137. Jones/Kumar/Pang/Tomkins 2007.
    Jones, Rosie/ Kumar, Ravi/ Pang, Bo/ Tomkins, Andrew: „I know what you did last summer”: query logs and user privacy, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management (CIKM,07): 909–914, ACM, 2007.Google Scholar
  138. John 2010.
    John, Jean: Facebook CSRF and XSS vulnerabilities Destructive worms on a social network, 05/10/2010. URL: http://www.john-jean.com/blog/advisories/facebook-csrf-and-xssvulnerabilities-destructive-worms-on-a-social-network-350/ [26/07/2012].
  139. Josang/Ismail/Boyd 2007.
    Josang, Audun/ Ismail, Roslan/ Boyd, Colin: A survey of trust and reputation systems for online service provision. In: Decision Support Systems, Vol. 43 Issue 2: 618–644, Elsevier Science Publishers, 2007.CrossRefGoogle Scholar
  140. Kamkar 2010.
    Kamkar, Samy: Evercookie-never forget, URL: http://samy.pl/evercookie/ [23/02.2012].
  141. Kaushik 2007.
    Kaushik, Avinash: Web Analytics: An Hour a Day. SYBEX Inc., 2007.Google Scholar
  142. Kaushik 2010.
    Kaushik, Avinash: Web Analytics 2.0: The Art of Online Accountability and Science of Customer Centricity, Wiley Publishing, Inc., 2010.Google Scholar
  143. Kent/Seo 2005.
    Kent, S./ Seo K.: RFC 4301: Security Architecture for the Internet Protocol. Internet Engineering Task Force, 2005.Google Scholar
  144. Ko/Cheek/Shehab/Sandhu 2010.
    Ko, Moo Nam/ Cheek, Gorrell P./ Shehab, Mohamed/Sand-hu, Ravi: Social-Networks Connect Services, Computer, Vol. 43, No.8: 37–43, 2010.CrossRefGoogle Scholar
  145. Kobsa 2001.
    Kobsa/ Alfred: Tailoring Privacy to Users’ Need, Proceedings of the 8th International Conference on User Modeling 2001 (UM,01): 303–313, Mathias Bauer, Piotr J. Gmytrasiewicz, and Julita Vassileva (Eds.). Springer-Verlag, London, 2001.Google Scholar
  146. Kobsa 2003.
    Kobsa, Alfred: A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems, Privacy Enhancing Technologies: 177–188, 2003.Google Scholar
  147. Kobsa 2007.
    Kobsa, Alfred: Privacy-enhanced web personalization, In The adaptive web, Peter Brusilovsky, Alfred Kobsa, and Wolfgang Nejdl (Eds.), Lecture Notes In Computer Science, Vol. 4321: 628–670, Springer-Verlag, Berlin/Heidelberg, 2007.CrossRefGoogle Scholar
  148. Kolovski/Hendler 2007.
    Kolovski, Vladmimir/ Hendler, James: XACML Policy Analysis Using Description Logics, Proceedings of the 15th International World Wide Web Conference: 494–497, 2007.Google Scholar
  149. Krishnamurthy/Wills 2008.
    Krishnamurthy, Balachander/ Wills, Craig: Characterizing privacy in online social networks, WOSN'08: Proceedings of the first workshop on Online social networks, 2008.Google Scholar
  150. Krishnamurthy/Wills 2009.
    Krishnamurthy, Balachander/ Wills, Craig: On the Leakage of Personally Identifiable Information Via Online Social Networks, Proceedings of ACM SIGCOMM Workshop on Online Social Networks, 2009.Google Scholar
  151. Krishnamurthy/Wills 2010.
    Krishnamurthy, Balachander/ Wills, Craig.E.: Privacy leakage in mobile online social networks, Proceedings of the 3rd conference on Online social networks, 4–4, 2010.Google Scholar
  152. Kristol 2001.
    Kristol, David M.: HTTP Cookies: Standards, privacy, and politics, ACM Trans. Internet Techn. 1(2): 151–198, 2001.CrossRefGoogle Scholar
  153. Kuhlmann/Gehring 2003.
    Kuhlmann, Dirk/ Gehring, Robert A.: Trusted Platforms, DRM, and Beyond, In E. Becker, W. Buhse, D. Günnewig, & N. Rump (Eds.), Digital Rights Management Technological Economic Legal and Political Aspects: 178–205, Springer Berlin/Heidelberg, 2003.CrossRefGoogle Scholar
  154. Kundra 2011.
    Kundra, Vivek (US Chief Information Officer): Federal Cloud Computing Strategy, 8/2/2011. URL: http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf/ [26/07/2012].
  155. Korolova 2010.
    Korolova, A.: Privacy Violations Using Microtargeted Ads: A Case Study, Impressions: 27–49, 2010.Google Scholar
  156. Köpsell 2010.
    Köpsell, Stefan: Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW, Dissertation, Technische Universität Dresden, 2010.Google Scholar
  157. Landesman 2012.
    Landesman, Mary: Browser History Sniffing and Other Tracking Techniques. URL: http://antivirus.about.com/od/securitytips/a/historysniffing.htm/ [23/02/2012].
  158. Lardinois 2010.
    F. Lardinois: PleaseRobMe and the Dangers of Location-Based Social Networks, ReadWriteWeb, 02/2010. URL:http://www.readwriteweb.com/archives/pleaserobme_and_the_dangers_of_location-aware_social_networks.php/ [26/07/2012].
  159. Langheinrich/Karjoth 2011.
    Langheinrich, Marc/ Karjoth, Günter: Social Networking and the Risk to Companies and Institutions, In Information Security Technical Report, Special Issue: Identity Reconstruction and Theft, Issue 15 (2010):51–56, Elsevier, 2011.Google Scholar
  160. Larsen 2008.
    Larsen, Niels Elgaard: Privacy in The Polippix Project, IT-Political Association of Denmark (IT-POL), 2008.Google Scholar
  161. Lee 2006.
    Lee, E.A: Cyber-Physical Systems — Are Computing Foundations Adequate? 1–6, 2006.Google Scholar
  162. Lee 2008.
    Lee, E.: Cyber physical systems: Design challenges, IEEE International Symposium Object Oriented Real-Time Distributed Computing (ISORC): 363–369, 2008.Google Scholar
  163. Leech/Ganis/Lee/Kuris/Koblas/Jones 1996.
    Leech, M/ Ganis, M/ Lee, Y/ Kuris, R/ Koblas, D/ Jones, L: RFC 1928: SOCKS Protocol Version 5. The Internet Engineering Task Force, 1996.Google Scholar
  164. Leenes/Schallaböck/Hansen 2008.
    Leenes, Ronald/ Schallaböck, Jan/ Hansen, Marit: PRIME White Paper. PRIME (Privacy and Identity Management for Europe), 2008.Google Scholar
  165. Li/Li/Venkatasubramanian 2007.
    Li, Ninghui/ Li, Tiancheng/ Venkatasubramanian, Suresh: t-closeness: Privacy beyond k-anonymity and ldiversity, Data Engineering, Vol. 3: 106–115, 2007.Google Scholar
  166. Li/Chen 2010.
    Li, Nan/ Chen, Guanling: Sharing location in online social networks, Network, IEEE, Vol. 24, No. 5: 20–25, 2010.CrossRefGoogle Scholar
  167. Löhr/Ramasamy/Sadeghi/Schulz/Schunter/Stüble 2007.
    Löhr, Hans/Ramasamy, HariGovind V./ Sadeghi, Ahmad-Reza/ Schulz, Stefan/ Schunter, Matthias/ Stüble, Christian: Enhancing Grid Security Using Trusted Virtualization, Lecture Notes in Computer Science, Vol. 4610:372–384, 2007.CrossRefGoogle Scholar
  168. Lotan/Graeff/Ananny/Gaffney/Pearce/Boyd 2011.
    Lotan, G./ Graeff, E./ Ananny, M./ Gaffney, D./ Pearce, I.,/ boyd, d.: The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions. International Journal of Communications, Vol. 5: 1375–1405, 2011.Google Scholar
  169. Ma/Zhou/Lyu/King 2011.
    Ma, Hao/ Zhou, Tom Chao/ Lyu, Michael R./ King, Irwin: Improving Recommender Systems by Incorporating Social Contextual Information, ACM Trans. Inf. Syst. 29, Vol. 2, Article 9, 2011.Google Scholar
  170. Machanavajjhala/Gehrke/Kifer 2007.
    Machanavajjhala, Ashwin/ Gehrke, Johannes/ Kifer, Daniel: L-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 1, Issue 1, 2007.Google Scholar
  171. Machanavajjhala/Kifer/Gehrke/Venkitasubramaniam 2007.
    Machanavajjhala, Ashwin/ Kifer, Daniel/ Gehrke, Johannes/ Venkitasubramaniam, Muthuramakrishnan: L-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, Vol. 1, Issue 1, 2007.Google Scholar
  172. Machanavajjhala/Korolova/Sarma 2011.
    Machanavajjhala, Ashwin/ Korolova, Aleksandra/ Das Sarma, Atish: Personalized Social Recommendations-Accurate or Private?, Journal Proceedings of the VLDB Endowment, Vol. 4, Issue 7, April 2011.Google Scholar
  173. Madria/Bhowmick/Ng/Lim 1999.
    Madria, Sanjay Kumar/ Bhowmick, Sourav S./ Ng, Wee Keong/ Lim, Ee-Peng: Research Issues in Web Data Mining, in Proceedings of Data Warehousing and Knowledge Discovery, DaWaK 1999.Google Scholar
  174. Madejski/Johnson/Bellovin 2011.
    Madejski, Michelle/ Johnson, Maritza/ Bellovin, Steven M.: The failure of online social network privacy settings, Technical Report CUCS-010-11, Department of Computer Science, Columbia University, 2011.Google Scholar
  175. Manyika/Chui/Brown/Bughin/Dobbs/Roxburgh/Byers 2011.
    Manyika, James/ Chui, Michael/ Brown, Brad/ Bughin, Jacques/ Dobbs, Richard/ Roxburgh, Charles/Byers, Angela Hung: Big data: The next frontier for innovation, competition, and productivity, McKinsey Global Institute, 2011. URL: http://www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Big_data_The_next_frontier_for_innovation
  176. Masiello/Whitten 2010.
    Masiello, Betsy/ Whitten, Alma: Engineering Privacy in an Age of Information Abundance, Intelligent Information Privacy Management: 119–24, 2010.Google Scholar
  177. Marlinspike 2009.
    Marlinspike, M.: New Techniques for Defeating SSL/TLS, Black Hat DC, 2009. URL:http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
  178. Madden 2012.
    Madden, Mary: “Privacy Management on Social Media Sites,” The Pew Research Center’s Internet and American Life Project, 2012.Google Scholar
  179. Mccallister/Grance/Scarfone 2010.
    McCallister, E./ Grance, T.,/ Scarfone, K.: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), NIST Special Publication. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.Google Scholar
  180. Mccoy/Bauer/Grunwald/Kohno/Sicker 2008.
    McCoy, Damon/ Bauer, Kevin/ Grunwald, Dirk/ Kohno, Tadayoshi/ Sicker, Douglas: Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th international symposium on Privacy Enhancing Technologies: 63–76, Springer-Verlag, Berlin, Heidelberg, 2008.Google Scholar
  181. McDonald/Cranor 2008.
    McDonald, A./ Cranor, L.: The Cost of Reading Privacy Policies, In Technology Policy Research Conf., 2008.Google Scholar
  182. McKinley 2008.
    McKinley, Katherine: Cleaning Up After Cookies Version 1.0, San Francisco 2008.Google Scholar
  183. McSherry/Mironov 2009.
    McSherry, Frank/ Mironov, Ilya: Differentially private recommender systems: building privacy into the ne, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD,09): 627–636, ACM, 2009.Google Scholar
  184. Menezes/Oorschot/Vanstone 1996.
    Menezes, Alfred J/ Van Oorschot, Paul C/ Vanstone, Scott A: Handbook of Applied Cryptography, CRC Press, 1996.Google Scholar
  185. Meyer 2011.
    Meyer, David: The Schleswig-Holstein Question, BBC News. 10/09/2011. URL: http://www.bbc.co.uk/news/technology-14859813
  186. Mills 2011.
    Mills, Elinor: Hackers release credit card, other data from Stratfor breach, CNET News, 30/12/2011. URL: http://news.cnet.com/8301-27080_3-57350361-245/hackersrelease-credit-card-other-data-from-stratfor-breach/ [26/07/2012].
  187. Mobasher/Dai/Luo/Sun/Zhu 2000.
    Mobasher, Bamshad/ Dai, Honghua/ Luo, Tao/ Sun Yuqing/ Zhu, Jiang: Integrating Web Usage and Content Mining for More Effective Personalization, Proceedings of the First International Conference on Electronic Commerce and Web Technologies (EC-WEB,00),. Springer-Verlag, London, 2000.Google Scholar
  188. Mobasher 2007.
    Mobasher, Bamshad: Data Mining for Web Personalization, In The Adaptive Web: Methods and Strategies of Web Personalization, Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.). Lecture Notes in Computer Science, Vol. 4321: 90–135, Springer, Berlin/ Heidelberg, 2007.CrossRefGoogle Scholar
  189. Mochalski/Schulze 2009.
    Mochalski, Klaus/ Schulze, Hendrik: Deep Packet Inspection-Technology, Applications & Net Neutrality, Forum American Bar Association, Vol. 24, Issue 1, 2010.Google Scholar
  190. Mui/Mohtashemi/Halberstadt 2002.
    Mui, Lik/ Mohtashemi, Mojdeh/ Halberstadt, Ari: A Computational Model of Trust and Reputation for E-businesses, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Volume 7: 2431–2439, IEEE Computer Society, 2002.CrossRefGoogle Scholar
  191. Murphy/Salomone 2010.
    Murphy, Glen D./ Salomone, Sonia: Using Enterprise 2.0 tools to facilitate knowledge transfer in complex engineering environments, 2010.Google Scholar
  192. Narayanan/Shmatikov 2008.
    Narayanan, Arvind/ Shmatikov, Vitaly: Robust Deanonymization of Large Sparse Datasets, Proceedings of the IEEE Symposium on Security and Privacy (SP,08): 111–125, IEEE Computer Society, 2008.Google Scholar
  193. Narayanan/Shmatikov 2009.
    Narayanan, Arvind/ Shmatikov, Vitaly: De-anonymizing Social Networks, IEEE S&P 2009.Google Scholar
  194. Newman 1999.
    Newman, C: RFC 2595: Using TLS with IMAP, POP3 and ACAP, 1999.Google Scholar
  195. Ni/Bertino/Lobo/Calo 2009.
    Ni, Qun/ Bertino, Elisa/ Lobo, Jorge/ Calo, Seraphin B: Privacy-Aware Role Based Access Control, IEEE Security & Privacy, Vol. 7, Issue 4: 35–43, 2009.CrossRefGoogle Scholar
  196. Nielsen 2009.
    The Nielsen Company, Social Networking and Blog Sites Capture More Internet Time and Advertising, 2009. URL:http://blog.nielsen.com/nielsenwire/online_mobile/social-networking-and-blog-sites-capture-more-internet-time-and-advertisinga/ [23/05/2012].
  197. Nielsen 2010.
    Nielsenwire, Social Networks/Blogs Now Account for One in EveryFour and a Half Minutes Online, 2010. URL:http://blog.nielsen.com/nielsenwire/global/social-mediaaccounts-for-22-percent-of-time-online/ [23/05/2012].
  198. Nielsen 2011.
    Nielsen: Social Media Report: Q3, 2011. URL: http://blog.nielsen.com/nielsenwire/social/ [23/05/2012].
  199. Nissenbaum 2010.
    Nissenbaum/ Helen: Privacy in Context: Technology, Policy, and the Integrity of Social Life, Palo Alto, CA: Stanford University Press, 2010.Google Scholar
  200. NETL 2009.
    National Energy Technology Laboratory (NETL), The Modern Grid Strategy Vision, 2009. URL: http://www.netl.doe.gov/moderngrid/vision.html/ [23/05/2012].
  201. NISTIR 7628.
    The Smart Grid Interoperability Panel-Cyber Security Working Group, Smart grid cyber security strategy and requirements (draft nistir 7628), The National Institute of Standards and Technology (NIST), Tech. Rep., 2010.Google Scholar
  202. Nofer/Hinz/Muntermann/Roßnagel 2011.
    Nofer, Michael/ Hinz, Oliver/ Muntermann, Jan/ Roßnagel, Heiko: Assessing the Economic Impact of Privacy Violations and Security Breaches-The Case of the Financial Industry, TU Darmstadt, Germany, 2011.Google Scholar
  203. nVision 2008.
    nVision: E-commerce across Europe-Progress and prospects, London, UK, 2008.Google Scholar
  204. Owad 2006.
    Owad, Tom: Data Mining 101: Finding Subversives with Amazon Wishlists, 04/01/2006. URL: http://www.applefritter.com/bannedbooks
  205. Page/Brin/Motwani/Winograd 1998.
    Page, Lawrence/ Brin, Sergey/ Motwani, Rajeev/ Winograd, Terry: The PageRank Citation Ranking: Bringing Order to the Web, Technical Report, Stanford InfoLab, 1998.Google Scholar
  206. Pamnani/Chawan 2010.
    Pamnani, Rajni/ Chawan, Pramila: Web Usage Mining: A Research Area in Web Mining, International Conference on Recent Trends in Computer Engineering, ISCET, RIMT, 2010.Google Scholar
  207. Park/Sandhu 2002.
    Park, Jaehong/ Sandhu, Ravi: Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies: 57–64, ACM, New York, NY, USA, 2002.Google Scholar
  208. Peterson 2010.
    Peterson, P.A.H.: Cryptkeeper: Improving security with encrypted RAM, IEEE International Conference on Technologies for Homeland Security: 120–126, 2010.Google Scholar
  209. PCAST 2010.
    Executive Office of the President President’s Council of Advisors on Science and Technology (PCAST), REPORT TO THE PRESIDENT AND CONGRESS DESIGNING A DIGITAL FUTURE: FEDERALLY FUNDED RESEARCH AND DEVELOPMENT IN NETWORKING AND INFORMATION TECHNOLOGY, DECEMBER 2010, http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf
  210. Pfitzmann/Hansen 2010.
    Pfitzmann, Andreas/ Hansen, Marit: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, Internet-Draft, 2010.Google Scholar
  211. Pike Research 2011.
    Pike Research, Smart Grid Data Analytics, 2011. URL: http://www.pikeresearch.com/research/smart-grid-data-analytics
  212. Powers/Ashley/Schunter 2002.
    Powers, Calvin S/ Ashley Paul/ Schunter Matthias: Privacy Promises, Access Control, and Privacy Management. Enforcing Privacy Throughout an Enterprise by Extending Access Control, Proceedings Third International Symposium on Electronic Commerce: 13–21, IEEE, 2002.Google Scholar
  213. Primelife 2011.
    Raggett, Dave (ed.): Privacy Enhancing Browser Extensions Deliverable: D 1.2.3., 28/2/2011. URL: http://www.w3.org/2011/D1.2.3/
  214. PWC 2011.
    Jacobson, David: Digital mobility drives you-You drive digital mobility, PricewaterhouseCoopers, 2011. URL: http://www.pwc.com/ca/en/technology-consulting/technology-advisory/digita l-mobility-white-paper.jhtml
  215. Quinn 2009.
    E. L. Quinn: Privacy and the new energy infrastructure, 2/2009. URL: http://ssrn.com/abstract=1370731.
  216. Ramakrishnan/Keller/Mirza/Grama/Karypis 2001.
    Ramakrishnan, Naren/ Keller, Benjamin J./ Mirza, Batul J./ Grama, Ananth Y./ Karypis, George: Privacy Risks in Recommender Systems, Journal IEEE Internet Computing, Volume 5, Issue 6, IEEE Educational Activities Department Piscata-way, 2001.Google Scholar
  217. Raice 2011.
    Raice, Shayndi: LinkedIn Retreats in Privacy Flap, The Wall Street Journal, 8/2011. URL: http://online.wsj.com/article/SB10001424053111904823804576502860557223074.html
  218. Rao/Rohatgi 2000.
    Rao, Josyula R./ Rohatgi, Pankaj: Can Pseudonymity Really Guarantee Privacy?, Proceedings of the 9th conference on USENIX Security Symposium, Vol. 9: 85–96, USENIX Association, 2000.Google Scholar
  219. Reed/Syverson/Goldschlag 1998.
    Reed, Michael/ Syverson, Paul/ Goldschlag, David: Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, Vol. 16, Issue 4:482–494, 1998.CrossRefGoogle Scholar
  220. Rescorla 2000.
    Rescorla, Eric: RFC 2818: HTTP Over TLS. The Internet Engineering Task Force, 2000.Google Scholar
  221. Resnick/Varian 1997.
    Resnick, P./ Varian, H. R.: Recommender Systems, Magazine Communications of the ACM, Vol. 40, Issue 3, ACM, 1997.Google Scholar
  222. Resnick/Zeckhauser/friedman/Kuwabara 2000.
    Resnick, Paul/ Kuwabara, Ko/ Zeckhauser, Richard/ Friedman, Eric: Reputation systems, Communications of the ACM, Vol. 43 Issue 12: 45–48, 2000.CrossRefGoogle Scholar
  223. Rifkind 2010.
    Rifkind, Malcolm: WikiLeaks: Do they have a right to privacy?, The Telegraph, 30/11/2010. URL: http://www.telegraph.co.uk/news/worldnews/wikileaks/8169712/WikiLeaks-Do-they-have-a-right-to-privacy.html
  224. Rivest/Shamir/Adleman 1978.
    Rivest, Ronald L/ Shamir, Adi/ Adleman, Leonard: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21 Issue 2: 120–126, 1978.MathSciNetzbMATHCrossRefGoogle Scholar
  225. Rosen 2010.
    Rosen, Jeffrey: The Web Means the End of Forgetting, The New York Times, 25/ 07/2010. URL:http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all/ [23.02.2012].
  226. Rosteck 2008.
    Rosteck, Thomas: Die Trusted Computing Group, Trusted Computing: 15–20, Vieweg+Teubner, 2008.Google Scholar
  227. Sabater/Sierra 2005.
    Sabater, Jordi/ Sierra, Carles: Review on Computational Trust and Reputation Models, Artificial Intelligence Review, Vol. 24 Issue 1:33–60, 2005.zbMATHCrossRefGoogle Scholar
  228. Sackmann/Strüker/Accorsi 2006.
    Sackmann, Stefan/ Strüker, Jens/ Accorsi, Rafael: Personalization in privacy-aware highly dynamic systems. In: Communications of the ACM-Privacy and security in highly dynamic systems, Vol. 49 Issue 9: 32–38, ACM, 2006.Google Scholar
  229. Sandhu/Coyne/Feinstein/Youman 1996.
    Sandhu, Ravi S/ Coyne, Edward J/ Feinstein, Hal L/ Youman, Charles E: Role-Based Access Control Models. In: Journal Computer, Vol. 29 Issue 2: 38–47,1996.CrossRefGoogle Scholar
  230. Sandhu/Samarati 1994.
    Sandhu, Ravi S/ Samarati, Pierangela: Access control: principle and practice. In: Communications Magazine, IEEE, Vol. 32 No. 9:40–48, 1994.CrossRefGoogle Scholar
  231. Sarbanes-oxley 2002.
    SOX (2002) Sarbanes-Oxley act, In: Congress of the USA, 2002.Google Scholar
  232. Schäfers 2008.
    Schäfers, B.: E-Commerce in der Otto-Group am Beispiel des Social Shopping-Portals, Handbuch Kundenmanagement: 677–685, 2008.Google Scholar
  233. Schenker 2003.
    Schenker, Adam: Graph-Theoretic Techniques for Web Content Mining, dissertation for the degree of Doctor of Philosophy, Department of Computer Science and Engineering, College of Engineering, University of South Florida, 2003.Google Scholar
  234. Schmücker 2011.
    Schmücker, Niklas: Web Tracking, SNET2 Seminar Paper, TU Berlin, Germany, 2011.Google Scholar
  235. Schneier 1993.
    Schneier, Bruce: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, Cambridge Security Workshop: 191–204, Springer, London, 1993.Google Scholar
  236. Schneier 2010.
    Schneier, Bruce: A Taxonomy of Social Networking Data, In Journal IEEE Security and Privacy, Vol. 8, Issue 4, 2010.Google Scholar
  237. Schoemaker 2011.
    Schoemaker, René: LinkedIn’s Privacy Slip-up Draws Legal Scrutiny, (PCWorld), 2011. URL: http://www.pcworld.com/article/237849/linkedins_privacy_slipup_draws_legal_scrutiny.htm
  238. Seneviratne/Kagal 2011.
    Seneviratne, Oshani/ Kagal, Lalana: Usage Restriction Management for Accountable Data Transfer on the Web, 2011.Google Scholar
  239. Sheng/Nah/Siau 2008.
    Sheng, Hong/ Nah, Fiona Fui-Hoon/ Siau, Keng: An Experimental Study on U-commerce Adoption: The Impact of Personalization and Privacy Concerns, Journal of Associations for Information Systems (JAIS), Vol. 9, Issue 6, Article 15, 2008.Google Scholar
  240. Shmatikov/Talcott 2005.
    Shmatikov, Vitaly/ Talcott, Carolyn: Reputation-based trust management, Journal of Computer Security, Vol. 13 No.: 167–190, 2005.Google Scholar
  241. Smith 1982.
    Smith, Alan Jay: Cache Memories, ACM Computing Surveys (CSUR), Vol. 14, No. 3, 1982.Google Scholar
  242. Smyth/Coyle/Briggs 2011.
    Smyth, Barry/ Coyle, Maurice/ Briggs, Peter: Communities, Collaboration, and Recommender Systems in Personalized Web Search, Recommender Systems Handbook, Part 4: 579–614, Springer Verlag, 2011.Google Scholar
  243. Singel 2009.
    Singel, Ryan: You Deleted Your Cookies? Think Again. URL: http://www.wired.com/business/2009/08/you-deleted-your-cookies-think-again/ [23.02.2012].
  244. Soghoian/Stamm 2010.
    Soghoian, C./ Stamm, S.: Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL, papersssrncom: 1-19, 2010. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1591033
  245. Solove 1972.
    Solove, Daniel J.: Understanding Privacy, Harvard University Press, 1972 (New Edition 2008).Google Scholar
  246. Soltani/canty/mayo/Thomas/Hoofnagle 2009.
    Soltani, Ashkan/ Canty, Shannon/ Mayo, Quentin/ Thomas, Lauren/ Hoofnagle, Chris Jay: Flash Cookies and Privacy, SSRN, 2009.Google Scholar
  247. Sophos 2010.
    Sophos, Facebook Worm-Likejacking, 31/05/2010. URL:http://nakedsecurity.sophos.com/2010/05/31/facebook-likejacking-worm/ [26/072012].
  248. Stackoverflow 2010.
    How do I use cookies to store users’ recent site history (PHP)? URL: http://stackoverflow.com/questions/2813659/how-do-i-usecookies-to-store-users-recent-site-historyphp/ [23.02.2012].
  249. Steinbrecher/Koepsell 2003.
    Steinbrecher, Sandra/ Koepsell, Stefan: Modelling Unlinkability, Privacy Enhancing Technologies, Vol. 2760: 32–47, Springer Berlin/Heidelberg, 2003.CrossRefGoogle Scholar
  250. Steindel 2011.
    Steindel, Tracy A.: A Path Toward User Control of Online Profiling, 17 Mich. Telecomm. Tech. L. Rev. 459, 2010.Google Scholar
  251. Sweeney 1997.
    Sweeney, Latanya: Weaving Technology and Policy Together to Maintain Confidentiality, 25 J.L. MED. & ETHICS 98, 100, 1997. (“The term anonymous implies that the data cannot be manipulated or linked to identify an individual.” (emphasis in original)).Google Scholar
  252. Sweeney (1)2002.
    Sweeney, Latanya: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression, 10 INT’L J. on Uncertainty, Fuzziness and Knowledge-based Systems: 571–572, 2002.Google Scholar
  253. Sweeney (2) 2002.
    Sweeney, Latanya: k-anonymity: A model for protecting privacy, International Journal on Uncertainty Fuzziness and Knowledge-based Systems, Vol. 10, Issue 5: 557–570, 2002.MathSciNetzbMATHCrossRefGoogle Scholar
  254. Tam/Ho 2003.
    Tam, KarYan/ Ho, ShukYing: Web personalization: is it effective?, IT Professional, Vol. 5, No. 5: 53–57, 2003.CrossRefGoogle Scholar
  255. Tam/Ho 2005.
    Tam, Kar Yan/ Ho, Shuk Ying: Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective, Information Systems Research, Vol. 16, Issue 3, INFORMS Institute for Operations Research and the Management Sciences (INFORMS), Linthicum, 2005.Google Scholar
  256. Tan/Steinbach/Kumar 2006.
    Tan, Pang-Ning/ Steinbach, Michael/ Kumar, Vipin: Introduction to Data Mining, Addison Wesley, 2005.Google Scholar
  257. Tarasewich/Nickerson/Warkentin 2002.
    Tarasewich, Peter/ Nickerson, Robert C./ Warkentin, Merrill: Issues in Mobile E-Commerce, Communications of the Association for Information Systems: Vol. 8, Article 3, 2002.Google Scholar
  258. Tene/Polonetsky 2012.
    Tene, Omer/ Polonetsky, Jules: To Track or ‘Do Not Track’: Advancing Transparency and Individual Control in Online Behavioral Advertising, 2011. URL: http://ssrn.com/abstract=1920505
  259. Teltzrow/Kobsa 2004.
    Teltzrow, Maximilian/ Kobsa, Alfred: Impacts of user privacy preferences on personalized systems: a comparative study, Designing personalized user experiences in eCommerce, Kluwer Academic Publishers, 2004.Google Scholar
  260. Thearling 2000.
    Thearling, Kurt: Data warehousing, 2000. URL: http://www.thearling.com/text/hrdotcom/dw.htm/ [23/05/2012].
  261. Tirtea/Castelluccia/Ikonomou 2011.
    Tirtea, Rodica/ Castelluccia, Claude/ Ikonomou, Demosthenes: Bittersweet cookies, Some security and privacy considerations, European Network, and information Security Agency (ENISA), 2011.Google Scholar
  262. Thompson/Hall 2010.
    Thompson, K. D. Catherine/ Hall, Jim: Privacy by Design: Achieving the Gold Standard in Data Protection for the Smart Grid, June 2010.Google Scholar
  263. Tomlinson/Yau/MacDonald 2010.
    Tomlinson, Allan/ Yau, Po-Wah/ MacDonald, John A.: Privacy threats in a mobile enterprise social network, Information Security, Technical Report 15: 57–66, 2010.Google Scholar
  264. Toubiana/narayanan/Boneh/nissenbaum/Barocas 2010.
    Toubiana, Vincent/ Narayanan, Arvind/ Boneh, Dan/ Nissen-baum, Helen: Adnostic: Privacy preserving targeted advertising, Proceedings of the Network and Distributed Systems Symposium, 2010.Google Scholar
  265. Toubiana/Nissenbaum 2011.
    Toubiana, Vincent/ Nissenbaum, Helen: An Analysis of Google Log Retention Policies, Journal of Privacy and Confidentiality, Vol. 3, Issue 1, Article 2, 2011.Google Scholar
  266. Trowbridge 2003.
    Trowbridge, Chris: An Overview of Remote Operating System Fingerprinting, Sans Institute, 2003.Google Scholar
  267. Tuffield 2007.
    M. Tuffield: NHS.uk allowing Google, Facebook, and others to track you. URL: http://mmt.me.uk/blog/2010/11/21/nhs-and-tracking/ [26/072012].
  268. Turow/King/Hoofnagle/Bleakley/Hennessy2009.
    Turow, Joseph/ King, Jennifer/ Hoofnagle, Chris Jay/ Bleakley, Amy/ Hennessy, Michael: Americans Reject Tailored Advertising and Three Activities that Enable It, Social Science Research Network, Vol. 104, Issue 30: 1–27, 2009.Google Scholar
  269. ULD 2011.
    Unabhängige Landeszentrum für Datenschutz Schleswig-Holstein (ULD): Wer ist datenschutzrechtlich verantwortlich für Facebook-Fanpages und Social-Plugins? URL:https://www.datenschutzzentrum.de/facebook/facebookverantwortlichkeit.Html/ [02/01/2012]
  270. Uscourtsno.07-1660 2008.
    Stacey Snyder Plaintiff v. Millersville University et al., The US District Court for the Eastern District of Pennsylvania (NO.07-1660), 3/12/2008. URL: http://www.paed.uscourts.gov/documents/opinions/08d1410p.pdf
  271. Vaas 2012.
  272. Vascellaro 2009.
    Vascellaro, Jessica E.: Facebook’s About-Face on Data, The Wall Street Journal, 19/02/2009. URL: http://online.wsj.com/article/SB123494484088908625.html
  273. Vega 2011.
    Vega, Tanzina: AT&T Begins Service to Text Users in Certain Locations, The New York Times, 27/02/2011. URL: http://mediadecoder.blogs.nytimes.com/2011/0 2/27/att-beginsservice-to-text-users-in-certain-locations/?ref=business/ [26/072012].
  274. Venzke 2011.
    Venzke, Sven: Social Media Marketing: Eine daten-schutzrechtliche Orientierungshilfe, 2011. URL: http://www.datenschutz-nord.de/presse/download/Rahmenbedingungen_Social_Media_Marketing_DuD_062011.pdf
  275. Vratonjic/manshaei/Raya/Hubaux 2010.
    Vratonjic, N./ Manshaei, M./ Raya, M.,/ Hubaux, J. P.: ISPs and Ad Networks Against Botnet Ad Fraud, Proceedings of the First international conference on Decision and game theory for security (GameSec’10): 149–167, Springer-Verlag, Berli/Heidelberg, 2010Google Scholar
  276. W3C 2010.
    W3C, Same Orighin Policy, 2010. URL: http://www.w3.org/Security/wiki/Same_Origin_Policy/ [23.02.2012].
  277. Walters 2009.
    Walters, Chris: Facebook’s New Terms Of Service: “We Can Do Anything We Want With Your Content. Forever.“, 2/2009. URL: http://consumerist.com/2009/02/facebooks-new-termsof-service-we-can-do-anything-we-want-with-yourcontentforever.html/ [26/072012].
  278. Weinberg/Chen/Jayaraman/Jackson 2011.
    Weinberg, Zachary/ Chen, Eric Y./ Jayaraman, Pavithra Ramesh/ Jackson, Collin: I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, IEEE Security and Privacy (SP) Symposium: 147–161, 2011.Google Scholar
  279. Weitzner/Abelson/Berners-lee/Hanson/Hendler/Ka-gal/Mcguinness/Sussman/Waterman 2006.
    Weitzner, Daniel J./ Abelson, Harold/ Berners-Lee, Tim/ Hanson, Chris/ Hendler, James/ Kagal, Lalana/ McGuinness, Deborah L/ Sussman, Gerald Jay/ Waterman, K Krasnow: Transparent Accountable Data Mining: New Strategies for Privacy Protection, Computer Science and Artificial Intelligence Laboratory, Technical Report MIT-CSAIL-TR-2006-007, 2006.Google Scholar
  280. Whalen 2002.
    David Whalen: The Unofficial Cookie FAQ, Version 2.6. URL: http://www.cookiecentral.com/faq/ [23.02.2012].
  281. Winkler 2006.
    William E. Winkler/ William E. Winkler/ P. Nov: Overview of record linkage and current research directions, Technical report, Bureau of the Census, 2006.Google Scholar
  282. Wondracek/Holz/Kirda/Kruegel 2010.
    Wondracek, G./ Holz, T./ Kirda, E./ Kruegel, C.: A practical attack to de-anonymize social network users, IEEE Symposium on Security and Privacy: 223–238, 2010.Google Scholar
  283. Wong/Fu/Wang/Yu/Pei 2011.
    Wong, Raymond Chi-Wing/ Fu, Ada Wai-Chee/ Wang, Ke/ Yu, Philip/ Pei, Jian: Can the Utility of Anonymized Data be used for Privacy Breaches?, ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 5, Issue 3, 2011.Google Scholar
  284. Yung 2003.
    Yung, Moti: Trusted computing platforms: the good, the bad, and the ugly. In: Computer Aided Verification, Lecture Notes in Computer Science, Vol. 2742: 250–254, Springer, 2003.CrossRefGoogle Scholar
  285. Zarsky 2003.
    Zarsky, Tal Z.: Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society. In University of Miami Law Review, Vol. 58, Issue 4: 1301–1354, 2004.Google Scholar
  286. Zeh 2011.
    Zeh, Reimar: Wie viele Fans hat Angela Merkel? Wahlkampf in Social Network Sites, Die Massenmedien im Wahlkampf, VS Verlag für Sozialwissenschaften, 2010.Google Scholar
  287. Zeller 2006.
    Zeller, Tom Jr.: AOL Executive Quits After Posting of Search Data, New York Times, 2010.Google Scholar
  288. Zheleva/Getoor 2009.
    Zheleva, E./ Getoor, L.: To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles, International World Wide Web Conference (WWW), 2009.Google Scholar
  289. Zimmerman 1995.
    Philip Zimmermann: PGP Source Code and Internals, MIT Press, 1995.Google Scholar
  290. Zimmermann 1980.
    Zimmermann, Hubert: OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, Vol. 28, Issue 4: 425–432, 1980.CrossRefGoogle Scholar
  291. Zwass 1996.
    Zwass, Vladimir: Electronic commerce: structures and Issues, In Journal International Journal of Electronic Commerce, Vol. 1:3–23, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Florian Kelbert
  • Fatemeh Shirazi
  • Hervais Simo
  • Tobias Wüchner
  • Johannes Buchmann
  • Alexander Pretschner
  • Michael Waidner

There are no affiliations available

Personalised recommendations