Displaying 111 - 120 of 5575
This course introduces students to the concepts of information security management.
Collecting, making available, and preserving digital materials, including data resources as well as text resources.
What is a promotional culture?
Singh, V. K., Bozkaya, B., & Pentland, A. (2015). Money walks: implicit mobility behavior and financial well-being. PloS one, 10(8), e0136628.
Ghosh, I., & Singh, V. (2016). Predicting Privacy Attitudes Using Phone Metadata. In Proceedings, International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, Washington DC.
Vivek K. Singh and Rishav R. Agarwal. 2016. Cooperative phoneotypes: exploring phone-based behavioral markers of cooperation. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16). ACM, New York,
De Montjoye, Y.-A., L. Radaelli, V. K. Singh, and A. Pentland. “Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata.” Science 347, no. 6221 (January 29, 2015): 536–539.
Singh, V.K., & Jain, R., Situation Recognition Using EventShop (co-authored monograph), Springer, pp. 1-150, ISBN: 978-3-319-30535-6 / 3319305352.
Katz, V.S., Moran, M., & Ognyanova, K. (2019). Contextualizing connectivity: How internet connection type and parental factors influence technology use among lower-income children. Information, Communication & Society, 22(3), 313-335. 10.1080/1369118X.2017.1379551
Katz, V.S. (2014). Communication dynamics of immigrant integration. Communication Yearbook, 38, 39-68.