equal
deleted
inserted
replaced
303 Database\\ |
303 Database\\ |
304 $x_1, \ldots, x_n$ |
304 $x_1, \ldots, x_n$ |
305 \end{tabular} |
305 \end{tabular} |
306 \end{center} |
306 \end{center} |
307 |
307 |
|
308 \subsubsection*{Further Reading} |
|
309 |
|
310 A readable article about how supermarkets mine your shopping |
|
311 habits (especially how they prey on young exhausted families |
|
312 ;o) appeared in 2012 in a New York Times article. |
|
313 |
|
314 \begin{center} |
|
315 \url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html} |
|
316 \end{center} |
|
317 |
|
318 \noindent An article that analyses privacy and shopping habits |
|
319 from a more economic point is available from: |
|
320 |
|
321 \begin{center} |
|
322 \url{http://www.dtc.umn.edu/~odlyzko/doc/privacy.economics.pdf} |
|
323 \end{center} |
|
324 |
|
325 \noindent An attempt to untangle the web of current technology |
|
326 for spying on consumers is published in: |
|
327 |
|
328 \begin{center} |
|
329 \url{http://cyberlaw.stanford.edu/files/publication/files/trackingsurvey12.pdf} |
|
330 \end{center} |
|
331 |
|
332 \noindent An article that sheds light on the paradox that |
|
333 people usually worry about privacy invasions of little |
|
334 significance, and overlook that might cause significant |
|
335 damage: |
|
336 |
|
337 \begin{center} |
|
338 \url{http://www.heinz.cmu.edu/~acquisti/papers/Acquisti-Grossklags-Chapter-Etrics.pdf} |
|
339 \end{center} |
308 |
340 |
309 \end{document} |
341 \end{document} |
310 |
342 |
311 http://randomwalker.info/teaching/fall-2012-privacy-technologies/? |
343 http://randomwalker.info/teaching/fall-2012-privacy-technologies/? |
312 http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ |
344 http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ |