How people care about their personal data released on social media
2013 Eleventh Annual Conference on Privacy, Security and Trust, 2013
ABSTRACT Content sharing services have become immensel popular on the Web. More than 1 billion pe... more ABSTRACT Content sharing services have become immensel popular on the Web. More than 1 billion people use this kind o services to communicate with friends and exchange all sorts o information. In this new context, privacy guarantees are essential guarantees about the potential release of data to unintended recipients and the use of user data by the service provider Although the general public is concerned about privacy question related to unintended audiences, data usage by service provider is still misunderstood. In order to further explore this level o misunderstanding, this work presents the results of a surve: conducted among 900 people with the aim of discovering hov people care about the use of their personal data by servic providers in terms of social media. From the results, we found that: (i) in general people do not read license terms and do no know very much about service policies, and when presented with these policies people do not agree with them; (ii) a good number of people would support alternative models such as paying for privacy or selling their personal data; and (iii) there are some differences between generations in relation to how they care about their data.
Uploads
Books by Kellyton Brito
In this scenario, reverse engineering can be a way to organize the understanding and knowledge retrieval of legacy systems. Nevertheless, despite of the existence of some processes, methods and tools to help in reverse engineering and systems understanding, some activities are still difficult to replicate in an industrial context. In special, the existence of tools that automate reverse engineering is still limited, and there is little empirical evidence of its usefulness.
Thus, this work presents the requirements, architecture and implementation of a reverse engineering tool. The requirements were based on extensive surveys on the reengineering and reverse engineering areas, covering academic and industrial studies. Finally, it discusses results of a case study that used the tool in an industrial context of reverse engineering a 210KLOC legacy system of a financial institution, developed with NATURAL/ADABAS technologies."
Papers by Kellyton Brito
In this scenario, reverse engineering can be a way to organize the understanding and knowledge retrieval of legacy systems. Nevertheless, despite of the existence of some processes, methods and tools to help in reverse engineering and systems understanding, some activities are still difficult to replicate in an industrial context. In special, the existence of tools that automate reverse engineering is still limited, and there is little empirical evidence of its usefulness.
Thus, this work presents the requirements, architecture and implementation of a reverse engineering tool. The requirements were based on extensive surveys on the reengineering and reverse engineering areas, covering academic and industrial studies. Finally, it discusses results of a case study that used the tool in an industrial context of reverse engineering a 210KLOC legacy system of a financial institution, developed with NATURAL/ADABAS technologies."