• Skip to main content
  • Skip to primary sidebar
AAAI

AAAI

Association for the Advancement of Artificial Intelligence

    • AAAI

      AAAI

      Association for the Advancement of Artificial Intelligence

  • About AAAIAbout AAAI
    • News
    • Officers and Committees
    • Staff
    • Bylaws
    • Awards
      • Fellows Program
      • Classic Paper Award
      • Dissertation Award
      • Distinguished Service Award
      • Allen Newell Award
      • Outstanding Paper Award
      • AI for Humanity Award
      • Feigenbaum Prize
      • Patrick Henry Winston Outstanding Educator Award
      • Engelmore Award
      • AAAI ISEF Awards
      • Senior Member Status
      • Conference Awards
    • Partnerships
    • Resources
    • Mailing Lists
    • Past Presidential Addresses
    • AAAI 2025 Presidential Panel on the Future of AI Research
    • Presidential Panel on Long-Term AI Futures
    • Past Policy Reports
      • The Role of Intelligent Systems in the National Information Infrastructure (1995)
      • A Report to ARPA on Twenty-First Century Intelligent Systems (1994)
    • Logos
  • aaai-icon_ethics-diversity-line-yellowEthics & Diversity
  • Conference talk bubbleConferences & Symposia
    • AAAI Conference
    • AIES AAAI/ACM
    • AIIDE
    • EAAI
    • HCOMP
    • IAAI
    • ICWSM
    • Spring Symposia
    • Summer Symposia
    • Fall Symposia
    • Code of Conduct for Conferences and Events
  • PublicationsPublications
    • AI Magazine
    • Conference Proceedings
    • AAAI Publication Policies & Guidelines
    • Request to Reproduce Copyrighted Materials
    • Contribute
    • Order Proceedings
  • aaai-icon_ai-magazine-line-yellowAI Magazine
  • MembershipMembership
    • Member Login
    • Chapters

  • Career CenterAI Jobs
  • aaai-icon_ai-topics-line-yellowAITopics
  • aaai-icon_contact-line-yellowContact

  • Twitter
  • Facebook
  • LinkedIn
Home / Proceedings / Papers from the 2010 AAAI Spring Symposium /

No. 5: Intelligent Information Privacy Management

All Papers

  • The Privacy Paradox

    Raffaele Zallone

    PDF
  • Privacy and Transparency

    Gregory Randolph Mayes

    PDF
  • Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks

    Girma Enideg Nigusse, Bart De Decker

    PDF
  • Protecting Reader Privacy in Digital Books

    Nicole A. Ozer, Jennifer A. Lynch

    PDF
  • Mobile Networks and Conflict Management: Farewell to Privacy?

    Marta Poblet, Sergi Torralba

    PDF
  • Privacy and Social Networks: From Data Protection to Pervasive Computing

    Antoni Roig

    PDF
  • Forensic DNA Profiles: Database Expansion, Familial Search, and a Radical Solution

    Michael Seringhaus

    PDF
  • The Problem of Onward Transfers Under U.S. Law

    Raghu Bryan Seshadri

    PDF
  • Flash Cookies and Privacy

    Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle

    PDF
  • Cloud Privacy: Normative Standards for Information Privacy Management Within Cloud Computing

    Robert Sprague

    PDF
  • How Teenagers Deal with their Privacy on Social Network Sites? Results from a National Survey in France

    Thomas Stenger, Alexandre Coutant

    PDF
  • Self-Regulation and Policy in the Spanish Audiovisual Sector: The Catalan Code of Best Practices

    Emma Teodoro, Núria Galera, Pompeu Casanovas

    PDF
  • Protecting Information Privacy on the Internet: Legal Framework in the EU

    Faye Fangfei Wang

    PDF
  • Privacy in Cross-System Personalization

    Yang Wang, Alfred Kobsa

    PDF
  • Preprocessing Legal Text: Policy Parsing and Isomorphic Intermediate Representation

    K. Krasnow Waterman

    PDF
  • Selective Privacy in a Web-Based World: Challenges of Representing and Inferring Context

    K. Krasnow Waterman, Deborah L McGuinness, Li Ding

    PDF
  • Mandatory Enforcement of Privacy Policies using Trusted Computing Principles

    Frank Kargl, Florian Schaub, Stefan Dietzel

    PDF
  • Engineering Privacy in an Age of Information Abundance

    Betsy Masiello, Alma Whitten

    PDF
  • Towards Territorial Privacy in Smart Environments

    Bastian Könings, Florian Schaub, Michael Weber, Frank Kargl

    PDF
  • Wrap Contracts and Privacy

    Nancy S. Kim

    PDF
  • Enabling Privacy-Awareness in Social Networks

    Ted Kang, Lalana Kagal

    PDF
  • Privacy in Online Social Lending

    Rainer Böhme, Stefanie Pötzsch

    PDF
  • Position and Perspective of Privacy Laws in India

    Bijan Jyotindrakumar Brahmbhatt

    PDF
  • Ontological Semantics for Data Privacy Compliance: The NEURONA Project

    Nuria Casellas, Juan-Emilio Nieto, Albert Meroño, Antoni Roig, Sergi Torralba, Mario Reyes, Pompeu Casanovas

    PDF
  • The Distinction between “Privacy” and “Personal Information” — Issues of Personal Information Protection Act in Japan

    Yeyoung Chang

    PDF
  • Modeling Privacy Requirements for Quality Manipulation of Information on Social Networking Sites

    Shan Chen, Mary-Anne Williams

    PDF
  • The Web as a Privacy Lab

    Richard Chow, Ji Fang, Philippe Golle, Jessica Staddon

    PDF
  • The Right to Delete

    Chris Conley

    PDF
  • Search Query Privacy: The Problem of Anonymization

    Ron A. Dolin

    PDF
  • Radio Frequency Identification Tags, Memory Spots, and the Processing of Personally Identifiable Information, and Sensitive Data: When There Is No Balance Between Right and Wrong

    Luca Escoffier

    PDF
  • Reasoning about the Appropriate Use of Private Data through Computational Workflows

    Yolanda Gil, Christian Fritz

    PDF
  • Geospatial Information Services: Balancing Privacy and Innovation

    Nathaniel Jurist Gleicher, Jong Sung Hwang

    PDF
  • Personalized Privacy Policies: Challenges for Data Loss Prevention

    Nathan Gnanasambandam, Jessica Staddon

    PDF
  • Influence of the “Internet of Things” on Legislation Regarding the Protection of Individual Privacy

    Jean-Francois Henrotte

    PDF
  • Privacy Classification Systems: Recall and Precision Optimization as Enabler of Trusted Information Sharing

    Christopher Hogan, Robert S. Bauer

    PDF
  • Application of an Autonomous Intelligent Cyber Entity as a Veiled Identity Agent

    Eran Kahana

    PDF
  • Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering

    Saeed Abu-Nimeh, Nancy Mead

    PDF
  • Consumers: The Missing Piece in a Piecemeal Approach to Privacy

    Clark Douglas Asay

    PDF
  • Privacy and International Compliance: When Differences Become an Issue

    Dennys Marcelo Antonialli

    PDF
  • Information Privacy and its Value

    Sabah Saleh Al-Fedaghi

    PDF

Primary Sidebar