Erin Kenneally

According to our database1, Erin Kenneally authored at least 25 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Intelligent Data Security and Privacy for Smart Cities.
IEEE Internet Things Mag., 2019

Economics and Incentives Driving IoT Privacy and Security, Pt. 2.
IEEE Internet Things Mag., 2019

Economics and Incentives Driving IoT Privacy and Security, Pt. 1.
IEEE Internet Things Mag., 2019

2018
The TTPs of Privacy and Security of the IoT.
IEEE Internet Things Mag., 2018

Privacy and Security.
IEEE Internet Things Mag., 2018

Cyber Risk Economics Capability Gaps Research Strategy.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2016
Reasonable Expectations of Privacy Indicators.
Proceedings of the Workshop on Privacy Indicators, 2016

2015
How to throw the race to the bottom: revisiting signals for ethical and legal research using online data.
SIGCAS Comput. Soc., 2015

Cyber Research Ethics Decision Support (CREDS) Tool.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

2014
Cyber-security research ethics dialogue & strategy workshop.
Comput. Commun. Rev., 2014

Revisiting signals and noise for ethical and legal research using online data.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2012
The Menlo Report.
IEEE Secur. Priv., 2012

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

2010
A Framework for Understanding and Applying Ethical Principles in Network and Security Research.
Proceedings of the Financial Cryptography and Data Security, 2010

2006
Enabling the Enablers: An Identity Fraud Solution for Law Enforcement.
J. Digit. Forensic Pract., 2006

2004
Digital logs - proof matters.
Digit. Investig., 2004

2003
Evidence Enhancing Technology.
login Usenix Mag., 2003

Put Your Data Where Your Mouth Is.
login Usenix Mag., 2003

2002
"It Depends": Defining Legal Values for Network Behavior.
login Usenix Mag., 2002

Computer Forensics.
login Usenix Mag., 2002

Evolving Behavioral Boundaries in Cyberspace.
login Usenix Mag., 2002

Who's Liable for Insecure Networks?
Computer, 2002

2001
Stepping on the Digital Scale.
login Usenix Mag., 2001

To Disclose or Not To Disclose: A Legal Primer for ISPs.
Inf. Secur. J. A Glob. Perspect., 2001


  Loading...