[1]
|
P. M. Schwartz and D. J. Solove, “The PII Problem: Privacy and a New Concept of Personal Identifiable Information,” New York University Law Review, Vol. 86, 2011, p. 1814.
|
[2]
|
DHS, “Handbook for Safeguarding Sensitive Personally Identifiable Information,” The Privacy Office, US Department of Homeland Security, Washington DC.www.dhs.gov/privacy
|
[3]
|
M. McMeekin, “Personally Identifable Information (PII) Incident Security Guidelines,” Northern Rockies Coordinating Group NRCG, 2010
|
[4]
|
J. Yakowtiz, “Tragedy of the Data Commons,” 2011. www.papers.ssrn.com/sol3/papers.cfm?abstract_id=178979
|
[5]
|
P. Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” UCLA Law Review, Vol. 57, 2010, p. 1701. www.epic.org/privacy/reidentification/ohm_article.pdf
|
[6]
|
J. Yakowitz, “Space Invaders: Intrusion in the Digital Age,” 2012. http://ssrn.com/abstract=2019079
|
[7]
|
“W3C Platform for Privacy Preferences.” www.w3.org/p3p
|
[8]
|
S. Lederer, C. Beckmann, A. Dey and J. Mankoff, “Managing Personal Information Disclosure in Ubiquitous Computing Environments,” 2003. http://www.intel-esearch.net/Publications/Berkeley/070920030922_139.pdf
|
[9]
|
L. Bygrave, “Data protection Law,” 2002.http://www.michaelkirby.com.au
|
[10]
|
J. Bing, “Classification of Personal Information, with Respect to the Sensitivity Aspect,” Proceedings of the First International Oslo Symposium on Data Banks and Societies, Oslo, 1972, pp. 98-150.
|
[11]
|
R. Lee, “Personal Data Protection in the Semantic Web,” 2002. http://www.w3.org/2002/01/pedal/thesis.html
|
[12]
|
Clearing House Privacy Rights Clearinghouse, “Chronology of Data Breaches Security Breaches 2005-Present,” 2005. http://www.privacyrights.org/ar/ChronDataBreaches.htm
|
[13]
|
P. Fule and J. Roddick, “Detecting Privacy and Ethical Sensitivity in Data Mining Results,” Twenty-Seventh Australasian Computer Science Conference (ACSC 2004), Dunedin, 2004. http://crpit.com/confpapers/CRPITV26Fule.pdf
|
[14]
|
S. Al-Fedaghi, “How Sensitive is Your Personal Information?” The 22nd ACM Symposium on Applied Computing (ACM SAC 2007), Seoul, 11-15 March 2007, pp. 165169.
|
[15]
|
J. Kang, “Information Privacy in Cyberspace Transactions,” Stanford Law Review, Vol. 50, No. 4, 1998, pp. 1193-1294. doi:10.2307/1229286
|
[16]
|
L. Floridi, “Information Ethics: On the Philosophical Foundation of Computer Ethics,” ETHICOMP98 Fourth International Conference on Ethical Issues of Information Technology, 1998. http://www.wolfson.ox.ac.uk/~floridi/ie.htm
|
[17]
|
S. Al-Fedaghi, “Crossing Privacy, Information, and Ethics,” 17th International Conference Information Resources Management Association (IRMA 2006), Washington DC, 21-24 May 2006. www.irma-international.org/viewtitle/32702/
|
[18]
|
S. Al-Fedaghi, “The Ethics of Information: What is Valued Most,” The Open Ethics Journal, Vol. 3, No. 1, 2009, pp. 118-126. doi:10.2174/1874761200903010118
|
[19]
|
S. Al-Fedaghi, “Personal Information Ethics, Encyclopedia of Information Ethics and Security,” M. Quigley, Ed., Information Science Publishing, Hershey, 2007, pp. 513519. doi:10.4018/978-1-59140-987-8.ch076
|
[20]
|
S. Al-Fedaghi and Fl. Al-Haqan, “Privacy Sensitivity: Application in Arabic,” International Conference on Asian Language Processing (IALP 2009), Singapore, 7-9 December 7-9 2009.
|
[21]
|
National Institute of Health, “A Sample Health Record.” http://www.nlm.nih.gov/medlineplus/magazine/issues/summer09/articles/summer09pg17.html
|
[22]
|
Supercoder.com, “Avoid under Coding: Billing for HighLevel, Single-System E/M Services.” http://www.supercoder.com/articles/articles-alerts/pmc/avoid-undercoding-billing-for-high-level-single-system-em-services/
|
[23]
|
Women’s Justice Center, “The Maria Teresa Macias Case.” http://www.justicewomen.com/macias_case_as_filed.html
|