• Lin W, Shieh M and Lin Y. (2023). Web API Verifier for IoTtalk and Its Applications. Mobile Internet Security. 10.1007/978-981-99-4430-9_24. (323-337).

    https://link.springer.com/10.1007/978-981-99-4430-9_24

  • Lapin K and Volungevičiūtė L. (2023). Improving the Usability of Requests for Consent to Use Cookies. Digital Interaction and Machine Intelligence. 10.1007/978-3-031-37649-8_19. (191-201).

    https://link.springer.com/10.1007/978-3-031-37649-8_19

  • Belen A, Rigor T, Ong D and de Guzman J. (2022). Enhancing Web Authentication Security Using Random Forest TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON). 10.1109/TENCON55691.2022.9978128. 978-1-6654-5095-9. (1-6).

    https://ieeexplore.ieee.org/document/9978128/

  • Martínez D, Calle E, Jové A and Pérez-Solà C. (2022). Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies. Computers & Security. 10.1016/j.cose.2022.102873. 122. (102873). Online publication date: 1-Nov-2022.

    https://linkinghub.elsevier.com/retrieve/pii/S016740482200267X

  • Pantelic O, Jovic K and Krstovic S. (2022). Cookies Implementation Analysis and the Impact on User Privacy Regarding GDPR and CCPA Regulations. Sustainability. 10.3390/su14095015. 14:9. (5015).

    https://www.mdpi.com/2071-1050/14/9/5015

  • Azeroual O and Koltay T. (2022). RecSys Pertaining to Research Information with Collaborative Filtering Methods: Characteristics and Challenges. Publications. 10.3390/publications10020017. 10:2. (17).

    https://www.mdpi.com/2304-6775/10/2/17

  • Mao K, Dong Q, Wang Y and Honga D. (2022). An Exploratory Approach to Intelligent Quiz Question Recommendation. Procedia Computer Science. 207:C. (4065-4074). Online publication date: 1-Jan-2022.

    https://doi.org/10.1016/j.procs.2022.09.469

  • Adhatarao S, Lauradoux C and Santos C. (2022). Why Is My IP Address Processed?. Privacy Symposium 2022. 10.1007/978-3-031-09901-4_12. (231-250).

    https://link.springer.com/10.1007/978-3-031-09901-4_12

  • Bermejo Fernandez C, Chatzopoulos D, Papadopoulos D and Hui P. (2021). This Website Uses Nudging: MTurk Workers' Behaviour on Cookie Consent Notices. Proceedings of the ACM on Human-Computer Interaction. 5:CSCW2. (1-22). Online publication date: 13-Oct-2021.

    https://doi.org/10.1145/3476087

  • Delilovic N. (2021). Recommender Systems in Digital Libraries Using Artificial Intelligence and Machine Learning. Handbook of Research on Methodologies and Applications of Supercomputing. 10.4018/978-1-7998-7156-9.ch012. (162-178).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7156-9.ch012

  • Krašovec A, Pellarini D, Geneiatakis D, Baldini G and Pejović V. (2020). Not Quite Yourself Today. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 4:4. (1-29). Online publication date: 17-Dec-2020.

    https://doi.org/10.1145/3432206

  • Hils M, Woods D and Böhme R. Measuring the Emergence of Consent Management on the Web. Proceedings of the ACM Internet Measurement Conference. (317-332).

    https://doi.org/10.1145/3419394.3423647

  • Gabryel M, Grzanek K and Hayashi Y. (2020). Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic. Journal of Artificial Intelligence and Soft Computing Research. 10.2478/jaiscr-2020-0016. 10:4. (243-253). Online publication date: 1-Oct-2020.. Online publication date: 1-Oct-2020.

    https://www.sciendo.com/article/10.2478/jaiscr-2020-0016

  • Urban T, Degeling M, Holz T and Pohlmann N. Beyond the Front Page:Measuring Third Party Dynamics in the Field. Proceedings of The Web Conference 2020. (1275-1286).

    https://doi.org/10.1145/3366423.3380203

  • Yang Z and Yue C. (2020). A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. Proceedings on Privacy Enhancing Technologies. 10.2478/popets-2020-0016. 2020:2. (24-44). Online publication date: 1-Apr-2020.. Online publication date: 1-Apr-2020.

    https://www.sciendo.com/article/10.2478/popets-2020-0016

  • Korac D, Damjanovic B and Simic D. (2020). Information Security in M-learning Systems: Challenges and Threats of Using Cookies 2020 19th International Symposium INFOTEH-JAHORINA (INFOTEH). 10.1109/INFOTEH48170.2020.9066344. 978-1-7281-4775-8. (1-6).

    https://ieeexplore.ieee.org/document/9066344/

  • Jones M. (2020). Cookies: a legacy of controversy. Internet Histories. 10.1080/24701475.2020.1725852. 4:1. (87-104). Online publication date: 2-Jan-2020.

    https://www.tandfonline.com/doi/full/10.1080/24701475.2020.1725852

  • Amarasekara B, Mathrani A and Scogings C. (2020). Crookies. Encyclopedia of Criminal Activities and the Deep Web. 10.4018/978-1-5225-9715-5.ch073. (1062-1076).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9715-5.ch073

  • Liu J, Ma G and Jiao Y. Multichannel Auction Strategies in Online Advertising With a Profit Model. IEEE Access. 10.1109/ACCESS.2020.2991989. 8. (83831-83841).

    https://ieeexplore.ieee.org/document/9085338/

  • Kaur H, Chauhan R, Afshar Alam M, Razaqi N and Chang V. (2020). Accessing Sensor Data via Hybrid Virtual Private Network Using Multiple Layer Encryption Method in Big Data. Cognitive Informatics and Soft Computing. 10.1007/978-981-15-1451-7_20. (187-195).

    http://link.springer.com/10.1007/978-981-15-1451-7_20

  • Pinto P, Lages R and Au-Yong-Oliveira M. (2020). Web Cookies: Is There a Trade-off Between Website Efficiency and User Privacy?. Trends and Innovations in Information Systems and Technologies. 10.1007/978-3-030-45691-7_67. (713-722).

    http://link.springer.com/10.1007/978-3-030-45691-7_67

  • Lee J, Mtibaa A and Mastorakis S. (2019). A Case for Compute Reuse in Future Edge Systems: An Empirical Study 2019 IEEE Globecom Workshops (GC Wkshps). 10.1109/GCWkshps45667.2019.9024587. 978-1-7281-0960-2. (1-6).

    https://ieeexplore.ieee.org/document/9024587/

  • Velagapudi S and Gupta H. (2019). Privacy, Security Of Cookies In HTTP Transmission 2019 4th International Conference on Information Systems and Computer Networks (ISCON). 10.1109/ISCON47742.2019.9036289. 978-1-7281-3651-6. (22-25).

    https://ieeexplore.ieee.org/document/9036289/

  • Saini A, Gaur M, Laxmi V and Conti M. (2019). You click, I steal. International Journal of Information Security. 18:4. (481-504). Online publication date: 1-Aug-2019.

    https://doi.org/10.1007/s10207-018-0423-3

  • Marchiori M. (2017). Learning the way to the cloud: Big Data Park. Concurrency and Computation: Practice and Experience. 10.1002/cpe.4234. 31:2. Online publication date: 25-Jan-2019.

    https://onlinelibrary.wiley.com/doi/10.1002/cpe.4234

  • Paul P, Biswas B, Khalid Z, Biswas S, Dutta N, Saha H and Das M. (2018). Using Browser Cookies for Event Monitoring and User Verification of an Account 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). 10.1109/IEMCON.2018.8615105. 978-1-5386-7266-2. (455-460).

    https://ieeexplore.ieee.org/document/8615105/

  • Kobusińska A, Pawluczuk K and Brzeziński J. (2018). Big Data fingerprinting information analytics for sustainability. Future Generation Computer Systems. 86:C. (1321-1337). Online publication date: 1-Sep-2018.

    https://doi.org/10.1016/j.future.2017.12.061

  • Deshpande D, Deshpande S and Thakare V. (2018). Web User Identification: Analysis of Heuristic Solutions 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). 10.1109/ICCONS.2018.8662893. 978-1-5386-2842-3. (1790-1795).

    https://ieeexplore.ieee.org/document/8662893/

  • Cohen J. (2017). The Biopolitical Public Domain: the Legal Construction of the Surveillance Economy. Philosophy & Technology. 10.1007/s13347-017-0258-2. 31:2. (213-233). Online publication date: 1-Jun-2018.

    http://link.springer.com/10.1007/s13347-017-0258-2

  • Belloro S and Mylonas A. I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild. IEEE Access. 10.1109/ACCESS.2018.2869251. 6. (52779-52792).

    https://ieeexplore.ieee.org/document/8457184/

  • Aiello M. (2018). Patching the Web. The Web Was Done by Amateurs. 10.1007/978-3-319-90008-7_6. (65-77).

    http://link.springer.com/10.1007/978-3-319-90008-7_6

  • Ruohonen J and Leppanen V. (2017). Whose Hands Are in the Finnish Cookie Jar? 2017 European Intelligence and Security Informatics Conference (EISIC). 10.1109/EISIC.2017.25. 978-1-5386-2385-5. (127-130).

    http://ieeexplore.ieee.org/document/8240779/

  • Desai B. IoT. Proceedings of the 21st International Database Engineering & Applications Symposium. (82-89).

    https://doi.org/10.1145/3105831.3105843

  • Golrezaei N and Nazerzadeh H. (2017). Auctions with Dynamic Costly Information Acquisition. Operations Research. 65:1. (130-144). Online publication date: 1-Feb-2017.

    https://doi.org/10.1287/opre.2016.1558

  • Phothilimthana P, Thakur A, Bodik R and Dhurjati D. (2016). Scaling up Superoptimization. ACM SIGPLAN Notices. 51:4. (297-310). Online publication date: 9-Jun-2016.

    https://doi.org/10.1145/2954679.2872387

  • Maas M, Asanović K, Harris T and Kubiatowicz J. (2016). Taurus. ACM SIGPLAN Notices. 51:4. (457-471). Online publication date: 9-Jun-2016.

    https://doi.org/10.1145/2954679.2872386

  • Wolf M, Grodzinsky F and Miller K. (2016). Augmented reality all around us. ACM SIGCAS Computers and Society. 45:3. (126-131). Online publication date: 5-Jan-2016.

    https://doi.org/10.1145/2874239.2874257

  • Jain A. (2015). A Technique for Selecting Online Advertisements using Mailbox Calendar Invites. ACM SIGSOFT Software Engineering Notes. 40:4. (1-7). Online publication date: 28-Jul-2015.

    https://doi.org/10.1145/2788630.2788641

  • Zhu J and Desai B. User Agent and Privacy Compromise. Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering. (38-45).

    https://doi.org/10.1145/2790798.2790803

  • Arief B, Coopamootoo K, Emms M and van Moorsel A. Sensible Privacy. Proceedings of the 13th Workshop on Privacy in the Electronic Society. (201-204).

    https://doi.org/10.1145/2665943.2665965

  • Sar R and Al-Saggaf Y. (2014). Contextual integrity's decision heuristic and the tracking by social network sites. Ethics and Information Technology. 16:1. (15-26). Online publication date: 1-Mar-2014.

    https://doi.org/10.1007/s10676-013-9329-y

  • Tappenden A and Miller J. (2014). Automated cookie collection testing. ACM Transactions on Software Engineering and Methodology. 23:1. (1-40). Online publication date: 1-Feb-2014.

    https://doi.org/10.1145/2559936

  • Macia N and Tinetti F. (2014). Improving Security in Web Sessions. Emerging Trends in ICT Security. 10.1016/B978-0-12-411474-6.00029-3. (481-491).

    https://linkinghub.elsevier.com/retrieve/pii/B9780124114746000293

  • Herps A, Watters P and Pineda-Villavicencio G. Measuring Surveillance in Online Advertising. Proceedings of the 2013 Fourth Cybercrime and Trustworthy Computing Workshop. (30-35).

    https://doi.org/10.1109/CTC.2013.12

  • Rabinovich P. (2013). Secure cross-domain cookies for HTTP. Journal of Internet Services and Applications. 10.1186/1869-0238-4-13. 4:1. (13).

    http://jisajournal.springeropen.com/articles/10.1186/1869-0238-4-13

  • Bélanger F, Crossler R, Hiller J, Park J and Hsiao M. (2013). POCKET. Decision Support Systems. 54:2. (1161-1173). Online publication date: 1-Jan-2013.

    https://doi.org/10.1016/j.dss.2012.11.010

  • (2012). References. The Death of the Internet. 10.1002/9781118312551.refs. (339-358).

    https://onlinelibrary.wiley.com/doi/10.1002/9781118312551.refs

  • Choukse D, Kanellopoulos D and Singh U. (2012). Developing secure web applications. International Journal of Internet Technology and Secured Transactions. 4:2/3. (221-236). Online publication date: 1-Jul-2012.

    https://doi.org/10.1504/IJITST.2012.047969

  • Nemati H and Van Dyke T. Do Privacy Statements Really Work?. Cyber Crime. 10.4018/978-1-61350-323-2.ch314. (695-712).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-323-2.ch314

  • Chen T and Fu Z. Protection of Privacy on the Web. Cyber Crime. 10.4018/978-1-61350-323-2.ch107. (83-100).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-323-2.ch107

  • Kelbert F, Shirazi F, Simo H, Wüchner T, Buchmann J, Pretschner A and Waidner M. (2012). State of Online Privacy: A Technical Perspective. Internet Privacy. 10.1007/978-3-642-31943-3_4. (189-279).

    http://link.springer.com/10.1007/978-3-642-31943-3_4

  • Tang S, Dautenhahn N and King S. Fortifying web-based applications automatically. Proceedings of the 18th ACM conference on Computer and communications security. (615-626).

    https://doi.org/10.1145/2046707.2046777

  • Yadav S, Ahamd K and Shekhar J. (2011). Finite state machine based approach to prevent format string attacks. ACM SIGSOFT Software Engineering Notes. 36:5. (1-7). Online publication date: 30-Sep-2011.

    https://doi.org/10.1145/2020976.2020997

  • Kaur P and Singh H. (2011). A model for versioning control mechanism in component-based systems. ACM SIGSOFT Software Engineering Notes. 36:5. (1-8). Online publication date: 30-Sep-2011.

    https://doi.org/10.1145/2020976.2020988

  • Lecue F. Towards Semantics-Based Instantiation of Services. Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01. (396-403).

    https://doi.org/10.1109/WI-IAT.2011.211

  • Mulazzani M, Schrittwieser S, Leithner M, Huber M and Weippl E. Dark clouds on the horizon. Proceedings of the 20th USENIX conference on Security. (5-5).

    /doi/10.5555/2028067.2028072

  • Lécué F. Personalizing your web services with constructive DL reasoning join. Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence. (1216-1221).

    /doi/10.5555/2900423.2900616

  • Lecue F. Personalizing Access to Semantic Web Services. Proceedings of the 2011 IEEE International Conference on Web Services. (259-266).

    https://doi.org/10.1109/ICWS.2011.9

  • Ayadi I, Serhrouchni A, Pujolle G and Simoni N. (2011). HTTP Session Management: Architecture and Cookies Security 2011 Conference on Network and Information Systems Security (SAR-SSI). 10.1109/SAR-SSI.2011.5931364. 978-1-4577-0735-3. (1-7).

    http://ieeexplore.ieee.org/document/5931364/

  • Nemati H and Van Dyke T. Do Privacy Statements Really Work?. Security and Privacy Assurance in Advancing Technologies. 10.4018/978-1-60960-200-0.ch004. (42-59).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0.ch004

  • Hunter M. (2011). Cookie. Encyclopedia of Cryptography and Security. 10.1007/978-1-4419-5906-5_105. (254-256).

    http://link.springer.com/10.1007/978-1-4419-5906-5_105

  • Isa W, Noor N, Hasbullah N and Manaf N. (2010). Towards engineering HCI - Privacy requirement in Malaysia: A preliminary study on Small-Medium e-commerce privacy adoptions 2010 International Conference on User Science and Engineering (i-USEr 2010). 10.1109/IUSER.2010.5716767. 978-1-4244-9048-6. (284-289).

    http://ieeexplore.ieee.org/document/5716767/

  • Cha S, Ku R, Fu Y and Lin H. On Generating RFID Privacy Policies in Consideration of Openness and Enforcement. Proceedings of the 2010 IEEE Second International Conference on Social Computing. (897-905).

    https://doi.org/10.1109/SocialCom.2010.133

  • Renaud K and Galvez-Cruz D. (2010). Privacy: Aspects, definitions and a multi-faceted privacy preservation approach 2010 Information Security for South Africa (ISSA). 10.1109/ISSA.2010.5588297. 978-1-4244-5493-8. (1-8).

    http://ieeexplore.ieee.org/document/5588297/

  • Skinner C. (2010). The complete customer journey: avoiding technology and business barriers to measure the total value of media. Business Strategy Series. 10.1108/17515631011063758. 11:4. (223-226). Online publication date: 6-Jul-2010.

    http://www.emeraldinsight.com/doi/10.1108/17515631011063758

  • McCarthy L and Yates D. (2010). The use of cookies in Federal agency web sites: Privacy and recordkeeping issues. Government Information Quarterly. 10.1016/j.giq.2010.02.005. 27:3. (231-237). Online publication date: 1-Jul-2010.

    http://linkinghub.elsevier.com/retrieve/pii/S0740624X10000274

  • White T, Salehi-Abari A and Box B. On how ants put advertisements on the web. Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part II. (494-503).

    /doi/10.5555/1945847.1945907

  • Wu H, Chen W and Ren Z. Securing Cookies with a MAC Address Encrypted Key Ring. Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02. (62-65).

    https://doi.org/10.1109/NSWCTC.2010.151

  • Cohen M. Network Forensics. Handbook of Research on Computational Forensics, Digital Crime, and Investigation. 10.4018/978-1-60566-836-9.ch012. (279-306).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9.ch012

  • CHA S. (2010). Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy. IEICE Transactions on Information and Systems. 10.1587/transinf.E93.D.1866. E93-D:7. (1866-1877).

    http://joi.jlc.jst.go.jp/JST.JSTAGE/transinf/E93.D.1866?from=CrossRef

  • White T, Salehi-Abari A and Box B. (2010). On How Ants Put Advertisements on the Web. Trends in Applied Intelligent Systems. 10.1007/978-3-642-13025-0_51. (494-503).

    http://link.springer.com/10.1007/978-3-642-13025-0_51

  • Pujolle G, Serhrouchni A and Ayadi I. Secure session management with cookies. Proceedings of the 7th international conference on Information, communications and signal processing. (689-694).

    /doi/10.5555/1818318.1818493

  • Pujolle G, Serhrouchni A and Ayadi I. (2009). Secure session management with cookies Signal Processing (ICICS). 10.1109/ICICS.2009.5397550. 978-1-4244-4656-8. (1-6).

    http://ieeexplore.ieee.org/document/5397550/

  • Tappenden A and Miller J. (2009). A survey of cookie technology adoption amongst nations. Journal of Web Engineering. 8:3. (211-244). Online publication date: 1-Sep-2009.

    /doi/10.5555/2011294.2011295

  • Mondet S, Cheng W, Morin G, Grigoras R, Boudon F and Ooi W. (2009). Compact and progressive plant models for streaming in networked virtual environments. ACM Transactions on Multimedia Computing, Communications, and Applications. 5:3. (1-22). Online publication date: 1-Aug-2009.

    https://doi.org/10.1145/1556134.1556138

  • Knoche H and Sasse M. (2009). The big picture on small screens delivering acceptable video quality in mobile TV. ACM Transactions on Multimedia Computing, Communications, and Applications. 5:3. (1-27). Online publication date: 1-Aug-2009.

    https://doi.org/10.1145/1556134.1556137

  • Cesar P, Bulterman D, Jansen J, Geerts D, Knoche H and Seager W. (2009). Fragment, tag, enrich, and send. ACM Transactions on Multimedia Computing, Communications, and Applications. 5:3. (1-27). Online publication date: 1-Aug-2009.

    https://doi.org/10.1145/1556134.1556136

  • Tappenden A and Miller J. (2009). Cookies. ACM Transactions on the Web. 3:3. (1-49). Online publication date: 1-Jun-2009.

    https://doi.org/10.1145/1541822.1541824

  • Lee H, Leonard D, Wang X and Loguinov D. (2009). IRLbot. ACM Transactions on the Web. 3:3. (1-34). Online publication date: 1-Jun-2009.

    https://doi.org/10.1145/1541822.1541823

  • Bloice M, Wotawa F and Holzinger A. (2009). Java's alternatives and the limitations of Java when writing cross-platform applications for mobile devices in the medical domain Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces (ITI). 10.1109/ITI.2009.5196053. 978-953-7138-15-8. (47-54).

    http://ieeexplore.ieee.org/document/5196053/

  • Shah R and Kesan J. (2009). Recipes for cookies: how institutions shape communication technologies. New Media & Society. 10.1177/1461444808101614. 11:3. (315-336). Online publication date: 1-May-2009.

    http://journals.sagepub.com/doi/10.1177/1461444808101614

  • Cohen M. (2009). Source attribution for network address translated forensic captures. Digital Investigation: The International Journal of Digital Forensics & Incident Response. 5:3-4. (138-145). Online publication date: 1-Mar-2009.

    https://doi.org/10.1016/j.diin.2008.12.002

  • Tappenden A and Miller J. A Three-Tiered Testing Strategy for Cookies. Proceedings of the 2008 International Conference on Software Testing, Verification, and Validation. (131-140).

    https://doi.org/10.1109/ICST.2008.18

  • Zimmer M. (2008). The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance. Web Search. 10.1007/978-3-540-75829-7_6. (77-99).

    http://link.springer.com/10.1007/978-3-540-75829-7_6

  • Chyou J and Cheng B. Improving the deployability of existing windows-based client/server business information systems using activex. Proceedings of the Third international conference on Distributed Computing and Internet Technology. (249-263).

    https://doi.org/10.1007/11951957_23

  • Yeh P, Li J and Yuan S. Tracking the changes of dynamic web pages in the existence of URL rewriting. Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61. (169-176).

    /doi/10.5555/1273808.1273831

  • Ha V, Inkpen K, Al Shaar F and Hdeib L. An examination of user perception and misconception of internet cookies. CHI '06 Extended Abstracts on Human Factors in Computing Systems. (833-838).

    https://doi.org/10.1145/1125451.1125615

  • Chakraborty S and Ray I. Allowing Finer Control Over Privacy Using Trust as a Benchmark 2006 IEEE Information Assurance Workshop. 10.1109/IAW.2006.1652082. 1-4244-0130-5. (92-99).

    http://ieeexplore.ieee.org/document/1652082/

  • Chan A. (2005). Mobile cookies management on a smart card. Communications of the ACM. 48:11. (38-43). Online publication date: 1-Nov-2005.

    https://doi.org/10.1145/1096000.1096002

  • Facca F and Lanzi P. (2005). Mining interesting knowledge from weblogs. Data & Knowledge Engineering. 53:3. (225-241). Online publication date: 1-Jun-2005.

    https://doi.org/10.1016/j.datak.2004.08.001

  • Thiemann P. (2005). An embedded domain-specific language for type-safe server-side web scripting. ACM Transactions on Internet Technology. 5:1. (1-46). Online publication date: 1-Feb-2005.

    https://doi.org/10.1145/1052934.1052935

  • Chan A. Cookies on-the-move. Proceedings of the 2004 ACM symposium on Applied computing. (1693-1697).

    https://doi.org/10.1145/967900.968236

  • Ray I and Geisterfer M. (2004). Towards a Privacy Preserving e-Commerce Protocol. E-Commerce and Web Technologies. 10.1007/978-3-540-30077-9_16. (154-163).

    http://link.springer.com/10.1007/978-3-540-30077-9_16

  • Finkelstein A, Lamerdorf W, Leyman F, Piccinelli G and Weerawarana S. (2004). Object Orientation and Web Services. Object-Oriented Technology. ECOOP 2003 Workshop Reader. 10.1007/978-3-540-25934-3_17. (179-189).

    http://link.springer.com/10.1007/978-3-540-25934-3_17

  • Rezgui A, Bouguettaya A and Eltoweissy M. (2003). Privacy on the Web. IEEE Security and Privacy. 1:6. (40-49). Online publication date: 1-Nov-2003.

    https://doi.org/10.1109/MSECP.2003.1253567

  • Claessens J, Díaz C, Goemans C, Dumortier J, Preneel B and Vandewalle J. (2003). Revocable anonymous access to the Internet?. Internet Research. 10.1108/10662240310488933. 13:4. (242-258). Online publication date: 1-Oct-2003.

    https://www.emerald.com/insight/content/doi/10.1108/10662240310488933/full/html

  • Shah R and Kesan J. (2003). Manipulating the governance characteristics of code. info. 10.1108/14636690310495184. 5:4. (3-9). Online publication date: 1-Aug-2003.

    https://www.emerald.com/insight/content/doi/10.1108/14636690310495184/full/html

  • Turner E and Dasgupta S. (2003). Privacy on the Web: an Examination of User Concerns, Technology, and Implications for Business Organizations and Individuals. Information Systems Management. 10.1201/1078/43203.20.1.20031201/40079.2. 20:1. (8-18). Online publication date: 1-Jan-2003.

    http://www.tandfonline.com/doi/abs/10.1201/1078/43203.20.1.20031201/40079.2

  • Shah R and Kesan J. (2003). Incorporating societal concerns into communication technologies. IEEE Technology and Society Magazine. 10.1109/MTAS.2003.1216240. 22:2. (28-33). Online publication date: 1-Oct-2004.

    http://ieeexplore.ieee.org/document/1216240/

  • Cha S and Joung Y. (2003). From P3P to Data Licenses. Privacy Enhancing Technologies. 10.1007/978-3-540-40956-4_14. (205-221).

    http://link.springer.com/10.1007/978-3-540-40956-4_14

  • Rocha B, Almeida V, Ishitani L and Meira W. Disclosing users' data in an environment that preserves privacy. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. (71-80).

    https://doi.org/10.1145/644527.644535

  • Hochheiser H. (2002). The platform for privacy preference as a social protocol. ACM Transactions on Internet Technology. 2:4. (276-306). Online publication date: 1-Nov-2002.

    https://doi.org/10.1145/604596.604598

  • Shah R and Kesan J. Incorporating societal concerns into communication technologies 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. 10.1109/ISTAS.2002.1013828. 0-7803-7284-0. (290-295).

    http://ieeexplore.ieee.org/document/1013828/

  • Shah R and Kesan J. Recipes for Cookies: The Role of Institutions in Shaping the Development of Communication Technologies. SSRN Electronic Journal. 10.2139/ssrn.565041.

    http://www.ssrn.com/abstract=565041

  • Shah R and Kesan J. Manipulating the Governance Characteristics of Code. SSRN Electronic Journal. 10.2139/ssrn.475682.

    http://www.ssrn.com/abstract=475682

  • Cohen J. The Biopolitical Public Domain: The Legal Construction of the Surveillance Economy. SSRN Electronic Journal. 10.2139/ssrn.2666570.

    https://www.ssrn.com/abstract=2666570

  • Golrezaei N and Nazerzadeh H. Auctions with Dynamic Costly Information Acquisition. SSRN Electronic Journal. 10.2139/ssrn.2444429.

    http://www.ssrn.com/abstract=2444429

  • Mittal S. User Privacy and the Evolution of Third-Party Tracking Mechanisms on the World Wide Web. SSRN Electronic Journal. 10.2139/ssrn.2005252.

    http://www.ssrn.com/abstract=2005252