Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Communications of the ACM
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
The design and implementation of a secure auction service
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy Preserving Data Mining (Advances in Information Security)
Privacy Preserving Data Mining (Advances in Information Security)
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Electronic Commerce Research and Applications
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
A Shortage of Privacy Engineers
IEEE Security and Privacy
Hi-index | 0.00 |
Today, our social, economic and political systems all make increasing use of the underlying computing infrastructure, and are heavily reliant on its safety and robustness. The ubiquitous collection and analysis of data through this infrastructure creates a burgeoning privacy problem. Indeed, special care must be taken to ensure that privacy is not breached from misuse of data flowing through these systems. Recently, the severity of this problem has been recognized both in the legislature and in the computing research field. However, we still lack a comprehensive view of this important topic in the undergraduate curriculum. Privacy is a critical problem for individuals and society at large. Serious problems are caused inadvertently due to ignorance of the subject and general lack of knowledge. Raising awareness of privacy issues, along with knowledge of the current state of the art technical and sociological solutions is best inculcated in young minds right from the start. In this paper, we explore how a comprehensive view of privacy can be incorporated into the undergraduate curriculum at the appropriate level. We present two alternative approaches towards this -- having an independent course for privacy or including small modules on privacy within existing courses.