-
1
Privacy and the American citizen
Published 2009Subjects: “…Privacy, Right of…”
Get full text
Working Paper -
2
Privacy, technology, and the American citizen
Published 2009Subjects: “…Privacy, Right of…”
Get full text
Working Paper -
3
More than "just shopping:" personalization, privacy and the (ab)use of data
Published 2006Subjects: Get full text
Working Paper -
4
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
Published 2015“…On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system—the first time any end-to-end (e2e) voting system with ballot privacy has been used in any binding governmental election. …”
Get full text
Working Paper -
5
Practical Provably Correct Voter Privacy Protecting End-to-End Voting Employing Multiparty Computations and Split Value Representations of Votes
Published 2015“…In the present note voter privacy protection is achieved by use of a simple form of Multi Party Computations (MPC). …”
Get full text
Working Paper -
6
-
7
Developing a Common Language About IT Risk Management
Published 2012Subjects: Get full text
Working Paper -
8
Policy Analytics for Cybersecurity of Cyber-Physical Systems
Published 2022Subjects: “…Science of Security & Privacy…”
Get full text
Get full text
Working Paper -
9
Cybersecurity White Paper
Published 2021“…Widespread connection of distributed energy resources, smart appliances, and more complex electricity markets increases the importance of cybersecurity and heightens privacy concerns. • Robust regulatory standards for cybersecurity and privacy are needed for all components of an interconnected electricity network…”
Get full text
Working Paper -
10
Determinants and Role of Trust in E-Business: A Large Scale Empirical Study
Published 2003“…Web site characteristics such as privacy and security, navigation, presentation, brand, and advice account for as much as 98% of this explained variance in Web site trust. …”
Get full text
Working Paper -
11
The Interplay of Web Aggregation and Regulation
Published 2016“…The aggregator's capability of transparently extracting web data has raised challenging issues in database and privacy protection. Consequently, new regulations are introduced or being proposed. …”
Get full text
Working Paper -
12
Voting Technology and the Election Experience: The 2009 Gubernatorial Races in New Jersey and Virginia
Published 2015“…We find that voters are sensitive to the voting mode they use—in person voting compared to absentee voting—as well as to whether they get to vote on the technology they prefer (paper versus electronic). Finally, the privacy that voters feel in the voting process is also important in shaping the voter’s confidence.…”
Get full text
Working Paper -
13
Can Healthcare IT Save Babies?
Published 2011“…We identify this effect through variations in state medical privacy laws that distort the usefulness of healthcare IT. …”
Get full text
Working Paper -
14
Resilient and virtually perfect revenue from perfectly informed players
Published 2022“…We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is perfectly resilient to the problems of collusion, complexity, and privacy; and • Works for any number of players n > 1.…”
Get full text
Working Paper -
15
Ethics in Artificial Intelligence: Toward Foundations for Global Policy
Published 2022Get full text
Working Paper -
16
-
17
Application of Lean Management Principles to Election Systems
Published 2015“…By following a structured approach based on Lean, the efforts to advance voting solutions in the US can gain in efficiency, security, privacy and credibility over their current state. …”
Get full text
Working Paper -
18
Managing Shared Access to a Spectrum Commons
Published 2016“…This includes: (1) No transmit only devices; (2) Power restrictions; (3) Common channel signaling; (4) Mechanism for handling congestion and allocating resources among users/uses in times of congestion; (5) Mechanism to support enforcement (e.g., established procedures to verify protocol is in conformance); (6) Mechanism to support reversibility of policy; and (7) Protection for privacy and security. We explain why each is necessary, examine their implications for current policy, and suggest ways in which they might be implemented. …”
Get full text
Working Paper -
19
Parental physical discipline in Singapore: a study of context, practice, and perception
Published 2024“…Further, they recalled emotional and physical reactions to physical discipline, perceived parents’ emotions, implement, immediacy, privacy, and predictability of physical discipline. …”
Get full text
Working Paper