Affiliation:
1. Budapest University of Technology and Economics, Hungary
Abstract
As various information technologies are penetrating everyday life, private and business matters inevitably mingle. Separating private and business past records, public information, actions or identities may, however, be crucial for an employee in certain situations. In this chapter we review the interrelated areas of employee privacy, and analyze in detail two areas of special importance from the viewpoint of the separation: web and social network privacy. In relation to these areas we discuss threats and solutions in parallel, and besides surveying the relevant literature, we also present current Privacy Enhancing Technologies applicable in each area. Additionally, we briefly review other means of workplace surveillance, providing some insight into the world of smartphones, where we expect the rise of new privacy-protecting technologies as these devices are getting capable of taking over the functions of personal computers.
Reference55 articles.
1. Adams, P. (2010). Closing the gap between people’s online and real life social network. Paul Adams Presentations. Retrieved August 31, 2010, from http://www.slideshare.net/padday/the-real-life-social-network-v2
2. Adobe Systems Incorporated. (2010). Adobe Flash player. Retrieved August 31, 2010, from http://www.adobe.com/products/flashplayer/
3. Anderson, J., Diaz, C., Bonneau, J., & Stajano, F. (2009). Privacy-enabling social networking over untrusted networks. In Proc. of the 2nd ACM Workshop on Online Social Networks (pp. 1-6). Barcelona, Spain: ACM Press. doi:10.1145/1592665.1592667
4. Backstrom, L., Dwork, C., & Kleinberg, J. (2007). Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In Proc. of the 16th International Conference on World Wide Web (pp. 181-190). Banff, Canada: ACM Press. doi:10.1145/1242572.1242598
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hiding information against structural re-identification;International Journal of Information Security;2018-02-13
2. Tracking and Fingerprinting in E-Business;Research and Development in E-Business through Service-Oriented Solutions