Full text: Kommerzielle digitale Überwachung im Alltag

88 / 88                             Kommerzielle Digitale Überwachung im Alltag | Studie im Auftrag der österreichischen Bundesarbeitskammer | 2014 
Bi, Bin; Shokouhi, Milad; Kosinski, Michal; Graepel, Thore (2013): Inferring the Demographics of Search Users, in 22nd International World 
Wide Web Conference, ACM, 2013: Online: http://research.microsoft.com/pubs/188645/www2013.pdf 
Chittaranjan, G.; Blom, J. & Gatica-Perez, D. (2011): Who's Who with Big-Five: Analyzing and Classifying Personality Traits with 
Smartphones. In: ISWC, IEEE, pp. 29-36. Online: http://infoscience.epfl.ch/record/192371/files/Chittaranjan_ISWC11_2011.pdf 
De Bock, K., Van den Poel, D. (2010). Predicting website audience demographics for web advertising targeting using multi-website 
clickstream data. FUNDAMENTA INFORMATICAE, 98(1), 49–70. http://hdl.handle.net/1854/LU-967442 
De Domenico, M.; Lima, A.; Musolesi, M.(2012): Interdependence and Predictability of Human Mobility and Social Interactions. Proceedings 
of the Nokia Mobile Data Challenge Workshop. Colocated with Pervasive 2012. Newcastle, United Kingdom. June 2012. Online: 
Eckersley, Peter (2010): How Unique Is Your Web Browser? Electronic Frontier Foundation, 17.05.2010. Online: 
Epp, C.; Lippold, M.; Mandryk, R.L. (2011): Identifying Emotional States Using Keystroke Dynamics. In Proceedings of the 2011 Annual 
Conference on Human Factors in Computing Systems (CHI 2011), Vancouver, BC, Canada. 715-724. Online: 
Kosinski, Michal: Stillwell, David; Kohli, Pushmeet; Bachrach, Yoram; Graepel, Thore (2012): Personality and Website Choice, in ACM Web 
Sciences 2012, ACM Conference on Web Sciences, 2012. Online: 
Kosinski, Michal; Stillwell, David; Graepelb, Thore (2013). Private Traits and Attributes Are Predictable from Digital Records of Human 
Behavior. PNAS, March 2013. Online: http://www.pnas.org/content/110/15/5802 
Kramer, Adam D. I.; Guillory, Jamie E. & Hancock, Jeffrey T. (2014): Experimental evidence of massive-scale emotional contagion through 
social networks. Proceedings of the National Academy of Sciences 111 (24), S. 8788–8790. Online: 
Montjoye, Yves-Alexandre de; Hidalgo, César A.; Verleysen, Michel; Blondel, Vincent D. (2013): Unique in the Crowd: The Privacy Bounds 
of Human Mobility. Scientific Reports, March 2013, No. 1376. Online: 
Montjoye, Yves-Alexandre de; Quoidbach, Jordi; Robic, Florent; Pentland, Alex (2013): Predicting personality using novel mobile phone-
based metrics. In: Ariel M. Greenberg, William G. Kennedy, and Nathan D. Bos (Hrsg.): Proceedings of the 6th international 
conference on Social Computing, Behavioral-Cultural Modeling and Prediction (SBP'13), Springer-Verlag, Berlin, Heidelberg, 48-
55. Online: http://web.media.mit.edu/~yva/papers/deMontjoye2013predicting.pdf 
Mudholkar, Smita S.; Shende, Pradnya M.; Sarode, Milind V. (2012): Biometrics Authentication Technique for Intrusion Detection Systems 
Using Fingerprint Recognition. In: International Journal of Computer Science, Engineering and Information Technology, Vol.2, No.1, 
February 2012. Online: http://airccse.org/journal/ijcseit/papers/2112ijcseit06.pdf 
Narayanan, Arvind; Shmatikov, Vitaly (2008): Robust De-anonymization of Large Sparse Datasets. In: Proceedings of the 2008 IEEE 
Symposium on Security and Privacy (SP '08). IEEE Computer Society, Washington, DC, USA, 111-125. Online: 
Nikiforakis, Nick; Kapravelos, Alexandros; Joosen, Wouter; Kruegel, Christopher; Piessens, Frank; Vigna, Giovanni (2013): Cookieless 
Monster: Exploring the Ecosystem of Web-based Device Fingerprinting. In: Proceedings of the 34th IEEE Symposium of Security 
and Privacy (IEEE S&P 2013), San Francisco, CA, USA. 
Quercia. D.; Kosinski, M.; Stillwell, D.; Crowcroft, J. (2011): Our Twitter Profiles, Our Selves: Predicting Personality with Twitter. In: 
Proceedings of SocialCom/PASSAT. 2011, 180-185. Online: https://www.cl.cam.ac.uk/~dq209/publications/quercia11twitter.pdf 
Schwartz, H.; Eichstaedt, J.; Kern, M.; Dziurzynski, L.; Ramones, S.; et al. (2013): Personality, Gender, and Age in the Language of Social 
Media: The Open-Vocabulary Approach. PLoS ONE 8(9): e73791. Online: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3783449/ 
Sweeney, L. (2002): k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based 
Systems, 10 (5), 2002; 557-570. Online: http://epic.org/privacy/reidentification/Sweeney_Article.pdf

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.