See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
A. Gerl, N. Bennani, H. Kosch, L. Brunie 2018 LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage. LNCS Transactions on Large-Scale Data- and Knowledge-Centered Systems, XXXVII The final authenticated publication will be available online on SpringerLink http://link.springer.com/
European Parliament, Council of the European Union 2016 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance). Official Journal of the European Union European Union
Y. TaoX. Xiaokui 2008 Personalized Privacy Preservation Charu C. Aggarwal Privacy-Preserving Data Mining: Models and Algorithms Springer US Boston, MA
J. S. Pettersson 2015 A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 Privacy and Identity Management for the Future Internet in the Age of Globalisation, Privacy and Identity 2014 125 135
B. MoskowitzA. Raskin 2011 Privacy Icons http://wiki.mozilla.org/Privacy_Icons (01.06.2018)
M. Mehldau 2018 Iconset for Data-Privacy Declarations v0.1. Let’s simple declare what data is how used, stored, given away or deleted http://cdn.netzpolitik.org/wp-upload/data-privacy-icons-v01.pdf (01.06.2018)
L. F. CranoM. ArjulaP. Gudrun 2002 Use of a P3P user agent by early adopters Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA November 21 1 10 ACM New York, NY, USA
W. Reeder, 2008 Expandable Grids: A user interface visualization technique and a policy semantics to support fast, accurate security and privacy policy authoring School of Computer Science Carnegie Mellon University Pittsburgh Pennsylvania, USA
W. Reeder, , L. BauerL. F. BauerK. Reiter, , K. BaconK. HowH. Strong 2008 Expandable grids for visualizing and authoring computer security policies Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy April 5-10 1473 1482 ACM New York, NY, USA
P.G. KelleyL. CescaJ. BreseeL.F. Cranor 2010 Standardizing privacy notices: an online study of the nutrition label approach Proceedings of the 28th International Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA April 10-15 1573 1582 ACM New York, NY, USA
P.G. KelleyJ. BreseeL.F. CranorW. Reeder, 2009 A “nutrition label” for privacy Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), Mountain View, California, USA July 15-17 414 12 ACM New York, NY, USA
J. AnguloS. Fischer-HübnerT. PullsE. Wästlund 2011 Towards Usable Privacy Policy Display & Management for PrimeLife 5th International Symposium on Human Aspects of Information Security and Assurance (HAISA), London, UK July 7-8 108 118 University of Plymouth London, UK
Stiftung Datenschutz 2013 New ways of providing consent in data protection - technical, legal and economic challenges http://stiftungdatenschutz.org/fileadmin/Redaktion/Bilder/Abschluss_Studie_30032017/stiftungdatenschutz_PolicyPaper_New_ways_of_providing_consent_in_data_protection_EN_final.pdf (01.06.2018)
Deutschland sicher im Netz e.V 2016 DsiN-Sicherheitsindex 2016 http://www.sicher-imnetz.de/downloads/dsin-sicherheitsindex-2016 (01.06.2018)
B. Shneiderman 1996 The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations IEEE Symposium on Visual Languages, Boulder, CO, USA September 03 - 06 336 343 IEEE Computer Society Washington, DC, USA
L. Sweeney 2002 k-Anonymity: A Model for Protecting Privacy International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 557 570