The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.10)
pp: 78-82
Michael Brennan , SecondMuse
How does academic privacy and security research result in real-world privacy protection or enhancement? This isn't just an issue of broader research impact but a fundamental scientific research question. A major means to accomplish impact is through existing regulation and oversight institutions.
Privacy, Educational institutions, Research and development, US Federal Trade Commission, Computer security, Federal Trade Commission, FTC, academic research, deception, unfairness, computer security
Michael Brennan, "Academic Impact at the Federal Trade Commission", IEEE Security & Privacy, vol.10, no. 6, pp. 78-82, Nov.-Dec. 2012, doi:10.1109/MSP.2012.139
1. “WPES: Workshop on Privacy in Electronic Society,” 2012;
2. Federal Trade Commission Act, 1914; .
3. Letter to Reed Freeman, US Federal Trade Commission, 12 Mar. 2010; .
4. A. Narayanan, and V. Schmatikov, “Robust De-anonymization of Large Sparse Datasets,” Proc. 2008 IEEE Symp. Security and Privacy (SP 08), IEEE CS, 2008, pp. 111–125.
5. P. Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization,” UCLA Law Rev., vol. 57, no. 6, 2010, pp. 1701–1777;
6. A. Narayanan and V. Schmatikov, “De-anonymizing Social Networks,” Proc. 30th IEEE Symp. Security and Privacy (SP 09), IEEE CS, 2009, pp. 173–187.
7. E. Felten, “Another Privacy Misstep from Facebook,” blog, 14 Dec. 2009; .
8. Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policy Makers, US Federal Trade Commission, Dec. 2010; .
9. “Preliminary Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers,” Google, 18 Feb. 2011; 00417-58065.pdf.
10. E. Wyatt and T. Vega, “FTC Backs Plan to Honor Privacy of Online Users,” The New York Times,2 Dec. 2010; scan.
11. A.M. McDonald and L.F Cranor, “The Cost of Reading Privacy Policies,” I/S: A Journal of Law and Policy for the Information Society, vol. 4, no. 3, 2008, pp. 540–565; is/files/2012/02Cranor_Formatted_Final.pdf .
12. S. Egelman, “Timing Is Everything? The Effects of Timing and Placement of Online Privacy Indicators,” Proc. 27th Int'l Conf. Human Factors in Computing (CHI 09), ACM, 2009, pp. 319–328.
13. D. Jang, R. Jhala, and S. Lerner, “An Empirical Study of Privacy-Violating Information Flows in Java-Script Web Applications,” Proc. 17th ACM Conf. Computer and Communications Security, ACM, 2010, pp. 270–283.
14. “Tips for Using Public Wi-Fi Networks,” US Federal Trade Commission, Sept. 2011; .
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool