XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Privacy policies

Articles & Features

SECTION: Features

Data protection in Hong Kong

How does a law turn society on its head? How does technology keep a movement alive? Through the lens of her home, Hong Kong, the author discusses legal loopholes in a new national security law that might bring about a dystopian reality, and how tomorrow's secure and private tech can fight back.

By Glacier Kwong, December 2020

PDF | HTML | In the Digital Library

Max Schrems' European Court of Justice odyssey

How one privacy activist took on Facebook, the European Commission, and the United States to protect the rights of European citizens, and prevailed.

By Mihir Kshirsagar, Ross Teixeira, December 2020

PDF | HTML | In the Digital Library

Routes to rights: internet architecture and values in times of ossification and commercialization

Routes to rights: internet architecture and values in times of ossification and commercialization

This article discusses the consequences of the commercialization and evolution of the Internet infrastructure, and how it affects our ability to exercise human rights online.

By Niels ten Oever, Davide Beraldo, July 2018

PDF | HTML | In the Digital Library

The case for regulating social networks and the internet

The case for regulating social networks and the internet

We don't need to miss out on the joys of technology in order to regain what liberty and democracy are supposed to mean, but the regulatory transformation we need is of epic proportions.

By carlo von lynX, July 2018

PDF | HTML | In the Digital Library

Journalism with flying robots

Journalism with flying robots

The use of unmanned aerial drones will revolutionize news reporting, but many issues need to be resolved before things can really take off.

By Matt Waite, March 2014

PDF | HTML | In the Digital Library

Cryptography, security and privacy (CrySP) research group

Keeping Your Little Back Shop

COLUMN: INIT

Keeping Your Little Back Shop

By Maire Byrne-Evans, Christine Task, September 2013

PDF | HTML | In the Digital Library

The New Firefox Cookie Policy

DEPARTMENT: Blogs

The New Firefox Cookie Policy

Stanford grad student Jonathan Mayer discusses cookies, Web tracking, and changes to Mozilla's cookie policy.

By Jonathan Mayer, September 2013

PDF | HTML | In the Digital Library

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

SECTION: Features

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

Revealing private content on the Web can also spark public engagement. To understand this, we need to challenge our common sense notions of privacy and democracy.

By Andreas Birkbak, September 2013

PDF | HTML | In the Digital Library

Something Bad Might Happen: Lawyers, anonymization and risk

Something Bad Might Happen: Lawyers, anonymization and risk

The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.

By Marion Oswald, September 2013

PDF | HTML | In the Digital Library

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Why defining what counts as personal data is important for data protection and information sharing.

By Iain Bourne, September 2013

PDF | HTML | In the Digital Library

Talking 'Bout Your Reputation

Talking 'Bout Your Reputation

People think they want anonymity, but actually desire privacy. But how do we reframe the debate surrounding privacy and security? Perhaps technology is the answer.

By David Birch, September 2013

PDF | HTML | In the Digital Library

An Illustrated Primer in Differential Privacy

An Illustrated Primer in Differential Privacy

The vast amounts of data that are now available provide new opportunities to social science researchers, but also raise huge privacy concerns for data subjects. Differential privacy offers a way to balance the needs of both parties. But how?

By Christine Task, September 2013

PDF | HTML | In the Digital Library

Cynthia Dwork on Differential Privacy

Cynthia Dwork on Differential Privacy

Distinguished Scientist at Microsoft Research, Dr. Cynthia Dwork, provides a first-hand look at the basics of differential privacy.

By Michael Zuba, September 2013

PDF | HTML | In the Digital Library

Profile: Jessica Staddon<br>Managing Google's privacy research

Profile: Jessica Staddon
Managing Google's privacy research

In this profile, Jessica Staddon discusses managing privacy research for one the world's best-known technology corporations.

By Adrian Scoică, September 2013

PDF | HTML | In the Digital Library

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

DEPARTMENT: Labz

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

CUPS, a research lab at Carnegie Mellon University, is dedicated to addressing the broad array of challenges collectively called "usable privacy and security."

By Rich Shay, September 2013

PDF | HTML | In the Digital Library

Data security in the cloud environment

DEPARTMENT: Blogs

Data security in the cloud environment

By Dimitris Mitropoulos, March 2013

PDF | HTML | In the Digital Library

Multilevel security

By Stephany Filimon, April 2004

PDF | HTML | In the Digital Library

Cookies

By Michael Nelte, Elton Saul, September 2000

PDF | HTML | In the Digital Library

Protecting the integrity of agents

By Michael J. Grimley, Brian D. Monroe, June 1999

PDF | HTML | In the Digital Library

Electronic voting

By Lorrie Faith Cranor, April 1996

PDF | HTML | In the Digital Library