[1]
|
G. Yee and L. Korba, “Privacy Policy Compliance for Web Services,” IEEE International Conference on Web Services (ICWS’04), San Diego, 6-9 June 2004, pp. 158-165. doi:10.1109/ICWS.2004.1314735
|
[2]
|
W. Xu, R. Sekar, I. V. Ramakrishna and V. N. Venkatakrishnan, “A Framework for Building Privacy-Conscious Composite Web Services,” IEEE International Conference on Web Services (ICWS’06), Chicago, 18-22 September 2006, pp. 655-662. doi:10.1109/ICWS.2006.4
|
[3]
|
B. Carminati, E. Ferrari and P. C. K. Hung, “Exploring Privacy Issues in Web Services Discovery Agencies,” IEEE Security and Privacy, Vol. 3, No. 5, 2005, pp. 14-21. doi:10.1109/MSP.2005.121
|
[4]
|
OUT-LAW News, “Regulators Demand Clearer Privacy Policies,” 2009.
http://www.out-law.com//default.aspx?page=9795
|
[5]
|
A. Figueroa, “Privacy Issues Hit Facebook Again,” 2010.
http://www.csmonitor.com/Business/new-economy/2010/0730/Privacy-issues-hit-Facebook-again
|
[6]
|
Nick O’Neill, “10 Privacy Settings Every Facebook User Should Know,” 2009.
http://www.allfacebook.com/facebook-privacy-2009-02
|
[7]
|
Federal Trade Commission, “ChoicePoint Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” 2011.
http://www.ftc.gov/opa/2006/01/choicepoint.shtm
|
[8]
|
EPIC Staff Publication, “Choice Point: Introduction and Background,” 2001.
http://epic.org/privacy/choicepoint/
|
[9]
|
K. Tedder, “Don’t Wait for a Data Compromise,” 2010.
https://www.firstdata.com/downloads/thought-leadership/fd-data-compromise-wp.pdf
|
[10]
|
Ponemon Institute, “Ponemon Institute Research,” 2010.
http://www.ponemon.org/about-ponemon-research
|
[11]
|
PrivacyRights Group Compilation, “Chronology of Data Breaches Security Breaches 2005 to Present,” 2011.
http://www.privacyrights.org/data-breach
|
[12]
|
Pew Research Center Report, “Internet & American Life Project,”
http://www.pewinternet.org/Press-Releases/2000/86-of-Intenet-Users-Want-to-Prohibit-Online-Companies-From-Disclosing-Their-Personal-Inf.aspx
|