Crime applications and social machines: crowdsourcing sensitive data.
Maire Byrne EvansKieron O'HaraThanassis TiropanisCraig WebberPublished in: WWW (Companion Volume) (2013)
Keyphrases
- sensitive data
- privacy preserving
- data storage
- smart card
- criminal networks
- sensitive information
- confidential data
- privacy preservation
- third party
- information security
- data sharing
- security concerns
- protection mechanisms
- malicious users
- data confidentiality
- social networks
- data privacy
- privacy protection
- social media
- personal data
- databases
- unauthorized access
- social networking
- data mining