var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F5379598%2Fcollections%2FDTKABDR7%2Fitems%3Fkey%3DMR9XyU2gEWmpdtfEoBUzqtJu%26format%3Dbibtex%26limit%3D100&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F5379598%2Fcollections%2FDTKABDR7%2Fitems%3Fkey%3DMR9XyU2gEWmpdtfEoBUzqtJu%26format%3Dbibtex%26limit%3D100&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fusers%2F5379598%2Fcollections%2FDTKABDR7%2Fitems%3Fkey%3DMR9XyU2gEWmpdtfEoBUzqtJu%26format%3Dbibtex%26limit%3D100&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective.\n \n \n \n \n\n\n \n Brehm, K.; and Shvartzhnaider, Y.\n\n\n \n\n\n\n IEEE Security & Privacy,2–11. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{brehm_understanding_2023,\n\ttitle = {Understanding {Privacy} in {Virtual} {Reality} {Classrooms}: {A} {Contextual} {Integrity} {Perspective}},\n\tissn = {1540-7993, 1558-4046},\n\tshorttitle = {Understanding {Privacy} in {Virtual} {Reality} {Classrooms}},\n\turl = {https://ieeexplore.ieee.org/document/10352441/},\n\tdoi = {10.1109/MSEC.2023.3336802},\n\turldate = {2023-12-12},\n\tjournal = {IEEE Security \\& Privacy},\n\tauthor = {Brehm, Karoline and Shvartzhnaider, Yan},\n\tyear = {2023},\n\tpages = {2--11},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Beyond the text: Analysis of privacy statements through syntactic and semantic role labeling.\n \n \n \n \n\n\n \n Shvartzshanider, Y.; Balashankar, A.; Wies, T.; and Subramanian, L.\n\n\n \n\n\n\n In Proceedings of the natural legal language processing workshop 2023, pages 85–98, Singapore, December 2023. Association for Computational Linguistics\n \n\n\n\n
\n\n\n\n \n \n \"BeyondPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{shvartzshanider-etal-2023-beyond,\n\taddress = {Singapore},\n\ttitle = {Beyond the text: {Analysis} of privacy statements through syntactic and semantic role labeling},\n\turl = {https://aclanthology.org/2023.nllp-1.10},\n\tabstract = {This paper formulates a new task of extracting privacy parameters from a privacy policy, through the lens of Contextual Integrity (CI), an established social theory framework for reasoning about privacy norms. Through extensive experiments, we further show that incorporating CI-based domain-specific knowledge into a BERT-based SRL model results in the highest precision and recall, achieving an F1 score of 84\\%. With our work, we would like to motivate new research in building NLP applications for the privacy domain.},\n\tbooktitle = {Proceedings of the natural legal language processing workshop 2023},\n\tpublisher = {Association for Computational Linguistics},\n\tauthor = {Shvartzshanider, Yan and Balashankar, Ananth and Wies, Thomas and Subramanian, Lakshminarayanan},\n\tmonth = dec,\n\tyear = {2023},\n\tpages = {85--98},\n}\n\n
\n
\n\n\n
\n This paper formulates a new task of extracting privacy parameters from a privacy policy, through the lens of Contextual Integrity (CI), an established social theory framework for reasoning about privacy norms. Through extensive experiments, we further show that incorporating CI-based domain-specific knowledge into a BERT-based SRL model results in the highest precision and recall, achieving an F1 score of 84%. With our work, we would like to motivate new research in building NLP applications for the privacy domain.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Private attributes: The meanings and mechanisms of “privacy-preserving” adtech.\n \n \n \n \n\n\n \n McGuigan, L.; Sivan-Sevilla, I.; Parham, P.; and Shvartzshnaider, Y.\n\n\n \n\n\n\n New Media & Society, 0(0). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"PrivatePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mcguigan_private_2023,\n\ttitle = {Private attributes: {The} meanings and mechanisms of “privacy-preserving” adtech},\n\tvolume = {0},\n\turl = {https://doi.org/10.1177/14614448231213267},\n\tdoi = {10.1177/14614448231213267},\n\tlanguage = {en},\n\tnumber = {0},\n\tjournal = {New Media \\& Society},\n\tauthor = {McGuigan, L. and Sivan-Sevilla, I. and Parham, P. and Shvartzshnaider, Y.},\n\tyear = {2023},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Privacy governance not included: analysis of third parties in learning management systems.\n \n \n \n \n\n\n \n Sanfilippo, M. R.; Apthorpe, N.; Brehm, K.; and Shvartzshnaider, Y.\n\n\n \n\n\n\n Information and Learning Sciences, ahead-of-print(ahead-of-print). January 2023.\n \n\n\n\n
\n\n\n\n \n \n \"PrivacyPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{sanfilippo_privacy_2023,\n\ttitle = {Privacy governance not included: analysis of third parties in learning management systems},\n\tvolume = {ahead-of-print},\n\tissn = {2398-5348},\n\tshorttitle = {Privacy governance not included},\n\turl = {https://doi.org/10.1108/ILS-04-2023-0033},\n\tdoi = {10.1108/ILS-04-2023-0033},\n\tabstract = {Purpose This paper aims to address research gaps around third party data flows in education by investigating governance practices in higher education with respect to learning management system (LMS) ecosystems. The authors answer the following research questions: how are LMS and plugins/learning tools interoperability (LTI) governed at higher education institutions? Who is responsible for data governance activities around LMS? What is the current state of governance over LMS? What is the current state of governance over LMS plugins, LTI, etc.? What governance issues are unresolved in this domain? How are issues of privacy and governance regarding LMS and plugins/LTIs documented or communicated to the public and/or community members? Design/methodology/approach This study involved three components: (1) An online questionnaire about LMS, plugin and LTI governance practices from information technology professionals at seven universities in the USA (n = 4) and Canada (n = 3). The responses from these individuals helped us frame and design the interview schedule. (2) A review of public data from 112 universities about LMS plugin and LTI governance. Eighteen of these universities provide additional documentation, which we analyze in further depth. (3) A series of extensive interviews with 25 university data governance officers with responsibilities for LMS, plugin and/or LTI governance, representing 14 different universities. Findings The results indicate a portrait of fragmented and unobtrusive, unnoticed student information flows to third parties. From coordination problems on individual college campuses to disparate distributions of authority across campuses, as well as from significant data collection via individual LTIs to a shared problem of scope across many LTIs, the authors see that increased and intentional governance is needed to improve the state of student privacy and provide transparency in the complex environment around LMSs. Yet, the authors also see that there are logical paths forward based on successful governance and leveraging existing collaborative networks among data governance professionals in higher education. Originality/value Substantial prior work has examined issues of privacy in the education context, although little research has directly examined higher education institutions’ governance practices of LMS, plugin and LTI ecosystems. The tight integration of first and third-party tools in this ecosystem raises concerns that student data may be accessed and shared without sufficient transparency or oversight and in violation of established education privacy norms. However, these technologies and the university governance practices that could check inappropriate data handling remain under-scrutinized. This paper addresses this gap by investigating the governance practices of higher education institutions with respect to LMS ecosystems.},\n\tnumber = {ahead-of-print},\n\turldate = {2023-09-27},\n\tjournal = {Information and Learning Sciences},\n\tauthor = {Sanfilippo, Madelyn Rose and Apthorpe, Noah and Brehm, Karoline and Shvartzshnaider, Yan},\n\tmonth = jan,\n\tyear = {2023},\n\tkeywords = {Computing/technology policy, Educational technology, Empirical studies in social computing, Learning management systems, Privacy, Third-party data controllers},\n}\n\n
\n
\n\n\n
\n Purpose This paper aims to address research gaps around third party data flows in education by investigating governance practices in higher education with respect to learning management system (LMS) ecosystems. The authors answer the following research questions: how are LMS and plugins/learning tools interoperability (LTI) governed at higher education institutions? Who is responsible for data governance activities around LMS? What is the current state of governance over LMS? What is the current state of governance over LMS plugins, LTI, etc.? What governance issues are unresolved in this domain? How are issues of privacy and governance regarding LMS and plugins/LTIs documented or communicated to the public and/or community members? Design/methodology/approach This study involved three components: (1) An online questionnaire about LMS, plugin and LTI governance practices from information technology professionals at seven universities in the USA (n = 4) and Canada (n = 3). The responses from these individuals helped us frame and design the interview schedule. (2) A review of public data from 112 universities about LMS plugin and LTI governance. Eighteen of these universities provide additional documentation, which we analyze in further depth. (3) A series of extensive interviews with 25 university data governance officers with responsibilities for LMS, plugin and/or LTI governance, representing 14 different universities. Findings The results indicate a portrait of fragmented and unobtrusive, unnoticed student information flows to third parties. From coordination problems on individual college campuses to disparate distributions of authority across campuses, as well as from significant data collection via individual LTIs to a shared problem of scope across many LTIs, the authors see that increased and intentional governance is needed to improve the state of student privacy and provide transparency in the complex environment around LMSs. Yet, the authors also see that there are logical paths forward based on successful governance and leveraging existing collaborative networks among data governance professionals in higher education. Originality/value Substantial prior work has examined issues of privacy in the education context, although little research has directly examined higher education institutions’ governance practices of LMS, plugin and LTI ecosystems. The tight integration of first and third-party tools in this ecosystem raises concerns that student data may be accessed and shared without sufficient transparency or oversight and in violation of established education privacy norms. However, these technologies and the university governance practices that could check inappropriate data handling remain under-scrutinized. This paper addresses this gap by investigating the governance practices of higher education institutions with respect to LMS ecosystems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Technofuturism in Play.\n \n \n \n\n\n \n Sanfilippo, M. R.; and Shvartzshnaider, Y.\n\n\n \n\n\n\n In Governing Smart Cities as Knowledge Commons, pages 223. Cambridge University Press, 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{sanfilippo_technofuturism_2023,\n\ttitle = {Technofuturism in {Play}},\n\tbooktitle = {Governing {Smart} {Cities} as {Knowledge} {Commons}},\n\tpublisher = {Cambridge University Press},\n\tauthor = {Sanfilippo, Madelyn Rose and Shvartzshnaider, Yan},\n\tyear = {2023},\n\tpages = {223},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates.\n \n \n \n \n\n\n \n Zhang, S.; Shvartzshnaider, Y.; Feng, Y.; Nissenbaum, H.; and Sadeh, N.\n\n\n \n\n\n\n In 2022 ACM Conference on Fairness, Accountability, and Transparency, of FAccT '22, pages 1657–1670, New York, NY, USA, June 2022. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"StopPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{zhang_stop_2022,\n\taddress = {New York, NY, USA},\n\tseries = {{FAccT} '22},\n\ttitle = {Stop the {Spread}: {A} {Contextual} {Integrity} {Perspective} on the {Appropriateness} of {COVID}-19 {Vaccination} {Certificates}},\n\tisbn = {9781450393522},\n\tshorttitle = {Stop the {Spread}},\n\turl = {https://doi.org/10.1145/3531146.3533222},\n\tdoi = {10.1145/3531146.3533222},\n\tabstract = {We present an empirical study exploring how privacy influences the acceptance of vaccination certificate (VC) deployments across different realistic usage scenarios. The study employed the privacy framework of Contextual Integrity, which has been shown to be particularly effective in capturing people’s privacy expectations across different contexts. We use a vignette methodology, where we selectively manipulate salient contextual parameters to learn whether and how they affect people’s attitudes towards VCs. We surveyed 890 participants from a demographically-stratified sample of the US population to gauge the acceptance and overall attitudes towards possible VC deployments to enforce vaccination mandates and the different information flows VCs might entail. Analysis of results collected as part of this study is used to derive general normative observations about different possible VC practices and to provide guidance for the possible deployments of VCs in different contexts.},\n\turldate = {2022-06-21},\n\tbooktitle = {2022 {ACM} {Conference} on {Fairness}, {Accountability}, and {Transparency}},\n\tpublisher = {Association for Computing Machinery},\n\tauthor = {Zhang, Shikun and Shvartzshnaider, Yan and Feng, Yuanyuan and Nissenbaum, Helen and Sadeh, Norman},\n\tmonth = jun,\n\tyear = {2022},\n\tkeywords = {contextual integrity, information privacy, privacy norms, vaccination certificates},\n\tpages = {1657--1670},\n}\n\n
\n
\n\n\n
\n We present an empirical study exploring how privacy influences the acceptance of vaccination certificate (VC) deployments across different realistic usage scenarios. The study employed the privacy framework of Contextual Integrity, which has been shown to be particularly effective in capturing people’s privacy expectations across different contexts. We use a vignette methodology, where we selectively manipulate salient contextual parameters to learn whether and how they affect people’s attitudes towards VCs. We surveyed 890 participants from a demographically-stratified sample of the US population to gauge the acceptance and overall attitudes towards possible VC deployments to enforce vaccination mandates and the different information flows VCs might entail. Analysis of results collected as part of this study is used to derive general normative observations about different possible VC practices and to provide guidance for the possible deployments of VCs in different contexts.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GKC‐CI : A unifying framework for contextual norms and information governance.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; Sanfilippo, M. R.; and Apthorpe, N.\n\n\n \n\n\n\n Journal of the Association for Information Science and Technology. March 2022.\n \n\n\n\n
\n\n\n\n \n \n \"GKC‐CIPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{shvartzshnaider_gkcci_2022,\n\ttitle = {{GKC}‐{CI} : {A} unifying framework for contextual norms and information governance},\n\tissn = {2330-1635, 2330-1643},\n\turl = {https://onlinelibrary.wiley.com/doi/10.1002/asi.24633},\n\tdoi = {https://doi.org/10.1002/asi.24633},\n\tlanguage = {en},\n\turldate = {2022-03-28},\n\tjournal = {Journal of the Association for Information Science and Technology},\n\tauthor = {Shvartzshnaider, Yan and Sanfilippo, Madelyn Rose and Apthorpe, Noah},\n\tmonth = mar,\n\tyear = {2022},\n\tkeywords = {publications},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Virtual Classrooms and Real Harms: Remote Learning (US) Universities.\n \n \n \n \n\n\n \n Cohney, S.; Teixeira, R.; Kohlbrenner, A.; Narayanan, A.; Kshirsagar, M.; Shvartzshnaider, Y.; and Sanfilippo, M.\n\n\n \n\n\n\n In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pages 653–674, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"VirtualPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{cohney_virtual_2021,\n\ttitle = {Virtual {Classrooms} and {Real} {Harms}: {Remote} {Learning} ({US}) {Universities}},\n\turl = {https://www.usenix.org/system/files/soups2021-cohney.pdf},\n\tbooktitle = {Seventeenth {Symposium} on {Usable} {Privacy} and {Security} ({SOUPS} 2021)},\n\tauthor = {Cohney, Shaanan and Teixeira, Ross and Kohlbrenner, Anne and Narayanan, Arvind and Kshirsagar, Mihir and Shvartzshnaider, Yan and Sanfilippo, Madelyn},\n\tyear = {2021},\n\tkeywords = {publications},\n\tpages = {653--674},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Digital Contact Tracing in the EU: Data Subject Rights and Conflicting Privacy Governance (Poster).\n \n \n \n \n\n\n \n Rosenberger, A.; Shvartzshnaider, Y.; and Sanfilippo, M.\n\n\n \n\n\n\n Proceedings of the Association for Information Science and Technology, 58(1): 819–821. 2021.\n Publisher: Wiley Online Library\n\n\n\n
\n\n\n\n \n \n \"DigitalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{rosenberger_digital_2021,\n\ttitle = {Digital {Contact} {Tracing} in the {EU}: {Data} {Subject} {Rights} and {Conflicting} {Privacy} {Governance} ({Poster})},\n\tvolume = {58},\n\turl = {https://asistdl.onlinelibrary.wiley.com/doi/pdf/10.1002/pra2.574?casa_token=XCEHgWDsPFQAAAAA:s4gVU-SyB0Lytq-azQjuxoOYkB0vtWuKuOziGoT_jhbyf55i1JggqYd8J0ezF8rJzSIW94YDRu1VoN4U},\n\tnumber = {1},\n\tjournal = {Proceedings of the Association for Information Science and Technology},\n\tauthor = {Rosenberger, Alex and Shvartzshnaider, Yan and Sanfilippo, Madelyn},\n\tyear = {2021},\n\tnote = {Publisher: Wiley Online Library},\n\tkeywords = {publications},\n\tpages = {819--821},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data and Privacy in a Quasi-Public Space: Disney World as a Smart City.\n \n \n \n \n\n\n \n Sanfilippo, M. R.; and Shvartzshnaider, Y.\n\n\n \n\n\n\n In Diversity, Divergence, Dialogue: 16th International Conference, iConference 2021, Beijing, China, March 17–31, 2021, Proceedings, Part II 16, pages 235–250, 2021. Springer International Publishing\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{sanfilippo_data_2021,\n\ttitle = {Data and {Privacy} in a {Quasi}-{Public} {Space}: {Disney} {World} as a {Smart} {City}},\n\turl = {https://shvartzshnaider.com/papers/Disney_iConference.pdf},\n\tdoi = {10.1007/978-3-030-71305-8_19},\n\tbooktitle = {Diversity, {Divergence}, {Dialogue}: 16th {International} {Conference}, {iConference} 2021, {Beijing}, {China}, {March} 17–31, 2021, {Proceedings}, {Part} {II} 16},\n\tpublisher = {Springer International Publishing},\n\tauthor = {Sanfilippo, Madelyn Rose and Shvartzshnaider, Yan},\n\tyear = {2021},\n\tkeywords = {publications},\n\tpages = {235--250},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Contextual integrity as a gauge for governing knowledge commons.\n \n \n \n\n\n \n Shvartzshnaider, Y.; Sanfilippo, M. R.; and Apthorpe, N.\n\n\n \n\n\n\n In Governing Privacy in Knowledge Commons, pages 220–244. Cambridge University Press, 2021.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@incollection{shvartzshnaider_contextual_2021,\n\ttitle = {Contextual integrity as a gauge for governing knowledge commons},\n\tbooktitle = {Governing {Privacy} in {Knowledge} {Commons}},\n\tpublisher = {Cambridge University Press},\n\tauthor = {Shvartzshnaider, Yan and Sanfilippo, Madelyn Rose and Apthorpe, Noah},\n\tyear = {2021},\n\tkeywords = {publications},\n\tpages = {220--244},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Disaster privacy/privacy disaster.\n \n \n \n \n\n\n \n Sanfilippo, M. R.; Shvartzshnaider, Y.; Reyes, I.; Nissenbaum, H.; and Egelman, S.\n\n\n \n\n\n\n Journal of the Association for Information Science and Technology, 71(9): 1002–1014. September 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DisasterPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{sanfilippo_disaster_2020,\n\ttitle = {Disaster privacy/privacy disaster},\n\tvolume = {71},\n\tissn = {2330-1635, 2330-1643},\n\turl = {https://onlinelibrary.wiley.com/doi/10.1002/asi.24353},\n\tdoi = {10.1002/asi.24353},\n\tlanguage = {en},\n\tnumber = {9},\n\turldate = {2022-04-11},\n\tjournal = {Journal of the Association for Information Science and Technology},\n\tauthor = {Sanfilippo, Madelyn R. and Shvartzshnaider, Yan and Reyes, Irwin and Nissenbaum, Helen and Egelman, Serge},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {publications},\n\tpages = {1002--1014},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Going against the (appropriate) flow: A contextual integrity approach to privacy policy analysis.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; Apthorpe, N.; Feamster, N.; and Nissenbaum, H.\n\n\n \n\n\n\n In Proceedings of the AAAI Conference on Human Computation and Crowdsourcing, volume 7, pages 162–170, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"GoingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_going_2019,\n\ttitle = {Going against the (appropriate) flow: {A} contextual integrity approach to privacy policy analysis},\n\tvolume = {7},\n\turl = {https://nissenbaum.tech.cornell.edu/papers/Going%20Against%20the%20(Appropriate)%20Flow.pdf},\n\tbooktitle = {Proceedings of the {AAAI} {Conference} on {Human} {Computation} and {Crowdsourcing}},\n\tauthor = {Shvartzshnaider, Yan and Apthorpe, Noah and Feamster, Nick and Nissenbaum, Helen},\n\tyear = {2019},\n\tkeywords = {publications},\n\tpages = {162--170},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Vaccine: Using contextual integrity for data leakage detection.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; Pavlinovic, Z.; Balashankar, A.; Wies, T.; Subramanian, L.; Nissenbaum, H.; and Mittal, P.\n\n\n \n\n\n\n In The World Wide Web Conference, pages 1702–1712, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Vaccine:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_vaccine_2019,\n\ttitle = {Vaccine: {Using} contextual integrity for data leakage detection},\n\turl = {https://dl.acm.org/doi/pdf/10.1145/3308558.3313655?casa_token=7wTqeNijuqMAAAAA:v8zQAREHXj68NGBEMz7QuZjVZFTu2QkDqP7isA8pYKwjBglRR_Wpoo34j2CsoFyq0tMWLd-tA7U9FVc},\n\tbooktitle = {The {World} {Wide} {Web} {Conference}},\n\tauthor = {Shvartzshnaider, Yan and Pavlinovic, Zvonimir and Balashankar, Ananth and Wies, Thomas and Subramanian, Lakshminarayanan and Nissenbaum, Helen and Mittal, Prateek},\n\tyear = {2019},\n\tkeywords = {publications},\n\tpages = {1702--1712},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Discovering smart home internet of things privacy norms using contextual integrity.\n \n \n \n \n\n\n \n Apthorpe, N.; Shvartzshnaider, Y.; Mathur, A.; Reisman, D.; and Feamster, N.\n\n\n \n\n\n\n Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2): 1–23. 2018.\n Publisher: ACM New York, NY, USA\n\n\n\n
\n\n\n\n \n \n \"DiscoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{apthorpe_discovering_2018,\n\ttitle = {Discovering smart home internet of things privacy norms using contextual integrity},\n\tvolume = {2},\n\turl = {https://dl.acm.org/doi/pdf/10.1145/3214262},\n\tnumber = {2},\n\tjournal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies},\n\tauthor = {Apthorpe, Noah and Shvartzshnaider, Yan and Mathur, Arunesh and Reisman, Dillon and Feamster, Nick},\n\tyear = {2018},\n\tnote = {Publisher: ACM New York, NY, USA},\n\tkeywords = {publications},\n\tpages = {1--23},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n It Takes a Village: A Community Based Participatory Framework for Privacy Design.\n \n \n \n \n\n\n \n Mir, D. J; Shvartzshnaider, Y.; and Latonero, M.\n\n\n \n\n\n\n In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 112–115, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ItPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{mir_it_2018,\n\ttitle = {It {Takes} a {Village}: {A} {Community} {Based} {Participatory} {Framework} for {Privacy} {Design}},\n\turl = {https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8406569&casa_token=0eUDaIyeHgwAAAAA:alFqssV2228ZVh1yb6HneZ2FOx3nE-lbA5rsLbGHUBHs7ZembEDkM7rfHG7mT8myX5pmW-4ZCC0&tag=1},\n\tbooktitle = {2018 {IEEE} {European} {Symposium} on {Security} and {Privacy} {Workshops} ({EuroS}\\&{PW})},\n\tpublisher = {IEEE},\n\tauthor = {Mir, Darakhshan J and Shvartzshnaider, Yan and Latonero, Mark},\n\tyear = {2018},\n\tkeywords = {publications},\n\tpages = {112--115},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RECIPE: Applying Open Domain Question Answering to Privacy Policies.\n \n \n \n \n\n\n \n Shvartzshanider, Y.; Balashankar, A.; Wies, T.; and Subramanian, L.\n\n\n \n\n\n\n In Proceedings of the Workshop on Machine Reading for Question Answering, pages 71–77, Melbourne, Australia, 2018. Association for Computational Linguistics\n \n\n\n\n
\n\n\n\n \n \n \"RECIPE:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshanider_recipe_2018,\n\taddress = {Melbourne, Australia},\n\ttitle = {{RECIPE}: {Applying} {Open} {Domain} {Question} {Answering} to {Privacy} {Policies}},\n\tshorttitle = {{RECIPE}},\n\turl = {http://aclweb.org/anthology/W18-2608},\n\tdoi = {10.18653/v1/W18-2608},\n\tlanguage = {en},\n\turldate = {2022-03-30},\n\tbooktitle = {Proceedings of the {Workshop} on {Machine} {Reading} for {Question} {Answering}},\n\tpublisher = {Association for Computational Linguistics},\n\tauthor = {Shvartzshanider, Yan and Balashankar, Ananth and Wies, Thomas and Subramanian, Lakshminarayanan},\n\tyear = {2018},\n\tkeywords = {publications},\n\tpages = {71--77},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Learning privacy expectations by crowdsourcing contextual informational norms.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; Tong, S.; Wies, T.; Kift, P.; Nissenbaum, H.; Subramanian, L.; and Mittal, P.\n\n\n \n\n\n\n In Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"LearningPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_learning_2016,\n\ttitle = {Learning privacy expectations by crowdsourcing contextual informational norms},\n\turl = {https://privaci.info/papers/hcomp_paper.pdf},\n\tbooktitle = {Fourth {AAAI} {Conference} on {Human} {Computation} and {Crowdsourcing}},\n\tauthor = {Shvartzshnaider, Yan and Tong, Schrasing and Wies, Thomas and Kift, Paula and Nissenbaum, Helen and Subramanian, Lakshminarayanan and Mittal, Prateek},\n\tyear = {2016},\n\tkeywords = {publications},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Moana: a case for redefining the internet service abstraction.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; and Ott, M.\n\n\n \n\n\n\n In Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing, pages 1–6, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Moana:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_moana_2014,\n\ttitle = {Moana: a case for redefining the internet service abstraction},\n\turl = {https://dl.acm.org/doi/pdf/10.1145/2676733.2676735?casa_token=L41RzAfLUZEAAAAA:IUwTIEX6NsLJx_q6GDZsFsCrLTPRYLyPFLYu3zaAkepjwIsx_n58lKUlo4oDTBRov1VxjNrjNWxQYZQ},\n\tbooktitle = {Proceedings of the 9th {Workshop} on {Middleware} for {Next} {Generation} {Internet} {Computing}},\n\tauthor = {Shvartzshnaider, Yan and Ott, Maximilian},\n\tyear = {2014},\n\tkeywords = {publications},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Design for change: Information-centric architecture to support agile disaster response.\n \n \n \n \n\n\n \n Shvartzshnaider, Y.; and Ott, M.\n\n\n \n\n\n\n In 2013 IEEE International Conference on Communications (ICC), pages 4025–4029, 2013. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_design_2013,\n\ttitle = {Design for change: {Information}-centric architecture to support agile disaster response},\n\turl = {https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6655189&casa_token=6IRV3dtOI3sAAAAA:agMwTNM-iY8Ck76U7FWqEbWJ0FSo9ALGzSFRbxM9W2gAhKeXJybEdwdGISRj1Tci5oeNl8Z5p6c&tag=1},\n\tbooktitle = {2013 {IEEE} {International} {Conference} on {Communications} ({ICC})},\n\tpublisher = {IEEE},\n\tauthor = {Shvartzshnaider, Yan and Ott, Maximilian},\n\tyear = {2013},\n\tkeywords = {publications},\n\tpages = {4025--4029},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Delivering Internet-of-Things services in MobilityFirst future Internet architecture.\n \n \n \n\n\n \n Li, J.; Shvartzshnaider, Y.; Francisco, J.; Martin, R. P; Nagaraja, K.; and Raychaudhuri, D.\n\n\n \n\n\n\n In 2012 3rd IEEE International Conference on the Internet of Things, pages 31–38, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{li_delivering_2012,\n\ttitle = {Delivering {Internet}-of-{Things} services in {MobilityFirst} future {Internet} architecture},\n\tbooktitle = {2012 3rd {IEEE} {International} {Conference} on the {Internet} of {Things}},\n\tpublisher = {IEEE},\n\tauthor = {Li, Jun and Shvartzshnaider, Yan and Francisco, John-Austen and Martin, Richard P and Nagaraja, Kiran and Raychaudhuri, Dipankar},\n\tyear = {2012},\n\tkeywords = {publications},\n\tpages = {31--38},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Enabling internet-of-things services in the mobilityfirst future internet architecture.\n \n \n \n\n\n \n Li, J.; Shvartzshnaider, Y.; Francisco, J.; Martin, R. P; and Raychaudhuri, D.\n\n\n \n\n\n\n In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pages 1–6, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{li_enabling_2012,\n\ttitle = {Enabling internet-of-things services in the mobilityfirst future internet architecture},\n\tbooktitle = {2012 {IEEE} {International} {Symposium} on a {World} of {Wireless}, {Mobile} and {Multimedia} {Networks} ({WoWMoM})},\n\tpublisher = {IEEE},\n\tauthor = {Li, Jun and Shvartzshnaider, Yan and Francisco, John-Austen and Martin, Richard P and Raychaudhuri, Dipankar},\n\tyear = {2012},\n\tkeywords = {publications},\n\tpages = {1--6},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Towards a Kademlia DHT-based n-tuple store.\n \n \n \n\n\n \n Shvartzshnaider, Y.; Ott, M.; and Levy, D.\n\n\n \n\n\n\n In Proceedings of the 3rd International Workshop on Theoretical Aspects of Dynamic Distributed Systems, pages 23–27, 2011. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_towards_2011,\n\ttitle = {Towards a {Kademlia} {DHT}-based n-tuple store},\n\tbooktitle = {Proceedings of the 3rd {International} {Workshop} on {Theoretical} {Aspects} of {Dynamic} {Distributed} {Systems}},\n\tpublisher = {ACM},\n\tauthor = {Shvartzshnaider, Yan and Ott, Maximilian and Levy, David},\n\tyear = {2011},\n\tkeywords = {publications},\n\tpages = {23--27},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Global semantic graph as an alternative information and collaboration infrastructure.\n \n \n \n\n\n \n Shvartzshnaider, Y.\n\n\n \n\n\n\n In Extended Semantic Web Conference, pages 483–487, 2010. Springer Berlin Heidelberg\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{shvartzshnaider_global_2010,\n\ttitle = {Global semantic graph as an alternative information and collaboration infrastructure},\n\tbooktitle = {Extended {Semantic} {Web} {Conference}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Shvartzshnaider, Yan},\n\tyear = {2010},\n\tkeywords = {publications},\n\tpages = {483--487},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Publish/subscribe on top of DHT using RETE algorithm.\n \n \n \n\n\n \n Shvartzshnaider, Y.; Ott, M.; and Levy, D.\n\n\n \n\n\n\n Future Internet-FIS 2010,20–29. 2010.\n Publisher: Springer\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{shvartzshnaider_publishsubscribe_2010,\n\ttitle = {Publish/subscribe on top of {DHT} using {RETE} algorithm},\n\tjournal = {Future Internet-FIS 2010},\n\tauthor = {Shvartzshnaider, Yan and Ott, Maximilian and Levy, David},\n\tyear = {2010},\n\tnote = {Publisher: Springer},\n\tkeywords = {publications},\n\tpages = {20--29},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);