Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Creating creativity: user interfaces for supporting innovation
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
ACM SIGCAS Computers and Society
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Sociotechnical Architecture for Online Privacy
IEEE Security and Privacy
IEEE Security and Privacy
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Lessons for Laptops for the 18th Century
IEEE Security and Privacy
IEEE Security and Privacy
International Journal of Learning Technology
Some Unusual Open Learner Models
Proceedings of the 2005 conference on Artificial Intelligence in Education: Supporting Learning through Intelligent and Socially Informed Technology
Privacy-enhanced web personalization
The adaptive web
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Here we consider personal data collection and storage, access control, data mining, and related privacy protection in two different scenarios: online tutoring systems and school-based educational systems. When applying intelligent agents to create an accurate student profile intended to facilitate personalised content delivery, we argue that information collected by an agent needs to be stripped of sensitive personal data. In case of more traditional educational environments within which students' data are collected for variety of administrative purposes, the only way to protect sensitive information is to combine technical security procedures with the existing legal restrictions and policies put in place.