On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Using task context to improve programmer productivity
Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Private distributed collaborative filtering using estimated concordance measures
Proceedings of the 2007 ACM conference on Recommender systems
Enhancing privacy and preserving accuracy of a distributed collaborative filtering
Proceedings of the 2007 ACM conference on Recommender systems
Better bug reporting with better privacy
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Social ranking: uncovering relevant content using tag-based recommender systems
Proceedings of the 2008 ACM conference on Recommender systems
IEEE Transactions on Software Engineering
Tesseract: Interactive visual exploration of socio-technical relationships in software development
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Codebook: discovering and exploiting relationships in software repositories
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Using information fragments to answer the questions developers ask
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
StakeNet: using social networks to analyse the stakeholders of large-scale software projects
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Is Data Privacy Always Good for Software Testing?
ISSRE '10 Proceedings of the 2010 IEEE 21st International Symposium on Software Reliability Engineering
Camouflage: automated anonymization of field data
Proceedings of the 33rd International Conference on Software Engineering
Testing software in age of data privacy: a balancing act
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Hi-index | 0.00 |
Social Computing research focuses on online social behavior and using artifacts derived from it for providing recommendations and other useful community knowledge. Unfortunately, some of that behavior and knowledge incur societal costs, particularly with regards to Privacy, which is viewed quite differently by different populations as well as regulated differently in different locales. But clever technical solutions to those challenges may impose additional societal costs, e.g., by consuming substantial resources at odds with Green Computing, another major area of societal concern. We propose a new crosscutting research area, Societal Computing, that focuses on the technical tradeoffs among computational models and application domains that raise significant societal issues. This dissertation, advised by Prof. Gail Kaiser, will focus on privacy concerns in the context of Societal Computing and will aim to address research topics such as design patterns and architectures for privacy tradeoffs, better understanding of users' privacy requirements so that tradeoffs with other areas such as green computing can be dealt with in a more effective manner, and better visualization techniques for making privacy and its tradeoffs more understandable.