XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Human and societal aspects of security and privacy

Articles & Features

Beware of toxic computing

DEPARTMENT: Milestones

Beware of toxic computing

By Manandeep, September 2021

PDF | HTML | In the Digital Library

SECTION: Features

From individual consent to collective refusal

Big tech companies have been found to misuse personal data, often collected without consent. What can the public do to change unjust collection and use of their personal data, and what role can computer scientists play in these efforts?

By Jonathan Zong, December 2020

PDF | HTML | In the Digital Library

Cyber security in Africa: The boring technology story that matters

Cyber security in Africa: The boring technology story that matters

Cybersecurity involves protection of computer systems from theft, damage, or manipulation to the hardware, software, or the data contained on them. A limitless cyberspace, little to no boundaries, and eroding national borders is making Africa vulnerable to cyber threats and potential harms. Cybersecurity represents serious economic and national security challenges, which need to be properly defined and contextualized.

By Hood Mukiibi, November 2019

PDF | HTML | In the Digital Library

A history of data breaches

DEPARTMENT: Milestones

A history of data breaches

By Alok Pandey, July 2018

PDF | HTML | In the Digital Library

Autonomous infrastructure for a suckless internet

SECTION: Features

Autonomous infrastructure for a suckless internet

How can we promote an internet that respects human rights? Investing in autonomous infrastructure built and operated by politically motivated techies, who put their skills at the service of the public interest, may be the answer.

By Stefania Milan, July 2018

PDF | HTML | In the Digital Library

Routes to rights: internet architecture and values in times of ossification and commercialization

Routes to rights: internet architecture and values in times of ossification and commercialization

This article discusses the consequences of the commercialization and evolution of the Internet infrastructure, and how it affects our ability to exercise human rights online.

By Niels ten Oever, Davide Beraldo, July 2018

PDF | HTML | In the Digital Library

A primer on differential privacy

DEPARTMENT: Hello world

A primer on differential privacy

By Oana Niculaescu, April 2018

PDF | HTML | In the Digital Library

Journalism with flying robots

SECTION: Features

Journalism with flying robots

The use of unmanned aerial drones will revolutionize news reporting, but many issues need to be resolved before things can really take off.

By Matt Waite, March 2014

PDF | HTML | In the Digital Library

The scary reality of identity theft

DEPARTMENT: Blogs

The scary reality of identity theft

By Wolfgang Richter, December 2013

PDF | HTML | In the Digital Library

Cryptography, security and privacy (CrySP) research group

Keeping Your Little Back Shop

COLUMN: INIT

Keeping Your Little Back Shop

By Maire Byrne-Evans, Christine Task, September 2013

PDF | HTML | In the Digital Library

The New Firefox Cookie Policy

DEPARTMENT: Blogs

The New Firefox Cookie Policy

Stanford grad student Jonathan Mayer discusses cookies, Web tracking, and changes to Mozilla's cookie policy.

By Jonathan Mayer, September 2013

PDF | HTML | In the Digital Library

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

SECTION: Features

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

Revealing private content on the Web can also spark public engagement. To understand this, we need to challenge our common sense notions of privacy and democracy.

By Andreas Birkbak, September 2013

PDF | HTML | In the Digital Library

Something Bad Might Happen: Lawyers, anonymization and risk

Something Bad Might Happen: Lawyers, anonymization and risk

The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.

By Marion Oswald, September 2013

PDF | HTML | In the Digital Library

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Why defining what counts as personal data is important for data protection and information sharing.

By Iain Bourne, September 2013

PDF | HTML | In the Digital Library

Talking 'Bout Your Reputation

Talking 'Bout Your Reputation

People think they want anonymity, but actually desire privacy. But how do we reframe the debate surrounding privacy and security? Perhaps technology is the answer.

By David Birch, September 2013

PDF | HTML | In the Digital Library

An Illustrated Primer in Differential Privacy

An Illustrated Primer in Differential Privacy

The vast amounts of data that are now available provide new opportunities to social science researchers, but also raise huge privacy concerns for data subjects. Differential privacy offers a way to balance the needs of both parties. But how?

By Christine Task, September 2013

PDF | HTML | In the Digital Library

Cynthia Dwork on Differential Privacy

Cynthia Dwork on Differential Privacy

Distinguished Scientist at Microsoft Research, Dr. Cynthia Dwork, provides a first-hand look at the basics of differential privacy.

By Michael Zuba, September 2013

PDF | HTML | In the Digital Library

Profile: Jessica Staddon<br>Managing Google's privacy research

Profile: Jessica Staddon
Managing Google's privacy research

In this profile, Jessica Staddon discusses managing privacy research for one the world's best-known technology corporations.

By Adrian Scoică, September 2013

PDF | HTML | In the Digital Library

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

DEPARTMENT: Labz

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

CUPS, a research lab at Carnegie Mellon University, is dedicated to addressing the broad array of challenges collectively called "usable privacy and security."

By Rich Shay, September 2013

PDF | HTML | In the Digital Library

Data security in the cloud environment

DEPARTMENT: Blogs

Data security in the cloud environment

By Dimitris Mitropoulos, March 2013

PDF | HTML | In the Digital Library

DNA smart card for financial transactions

In this paper, a secure environment for electronic commerce is introduced. The environment is formed via a synthesis of biometrics consumer authentication with a security token. Such a token is a smart card containing cryptographic keys and a cryptographic microprocessor for data encryption. The keys are used to further authenticate the possessor of the card as the actual owner and also to facilitate secure electronic financial transactions. New technologies like these bring benefits to society by enhancing the standard of living, however, numerous challenges are introduced [1].Biometrics is a Greek composite word stemming from the synthesis of bio and metric, meaning life measurement. In this context, the science of biometrics is concerned with the accurate measurement of unique biological characteristics of an individual in order to securely identify them to a computer or other electronic system. Biological characteristics measured usually include fingerprints, voice patterns, retinal and iris scans, face patterns, and even the chemical composition of an individual's DNA [9].

By Sofia Gleni, Panagiotis Petratos, September 2004

PDF | HTML | In the Digital Library

Multilevel security

By Stephany Filimon, April 2004

PDF | HTML | In the Digital Library

E-commerce recommenders

By Ana Gil, Francisco García, December 2003

PDF | HTML | In the Digital Library

Cookies

By Michael Nelte, Elton Saul, September 2000

PDF | HTML | In the Digital Library

Public key cryptography

By Pradosh Kumar Mohapatra, September 2000

PDF | HTML | In the Digital Library

Protecting the integrity of agents

By Michael J. Grimley, Brian D. Monroe, June 1999

PDF | HTML | In the Digital Library

Electronic voting

By Lorrie Faith Cranor, April 1996

PDF | HTML | In the Digital Library