Finding lists of people on the web
ACM SIGCAS Computers and Society
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Personal health information leak prevention in heterogeneous texts
AdaptLRTtoND '09 Proceedings of the Workshop on Adaptation of Language Resources and Technology to New Domains
Hi-index | 0.00 |
In search of a job after graduating from college, Meg Kemp posts her resume online. Norton Steuben, a retired law professor, hasn't looked for employment in more than 35 years and rarely uses the Internet, yet his law school maintains his curriculum vita online. Although such activity might seem innocuous, information in both these online resumes initially put Meg and Norton in danger of becoming identity-theft victims. Fortunately, they received some unexpected protection in the form of a computer program called Identity Angel, which this article describes in more detail.