Sl.No | Chapter Name | English |
---|---|---|
1 | Online Privacy | Download To be verified |
2 | Privacy concepts and studies | Download To be verified |
3 | Fair Information Practices | Download To be verified |
4 | Right to Privacy Contextual Integrity | Download To be verified |
5 | Privacy Policy (Part I) | Download To be verified |
6 | Privacy Policy (Part II) | Download To be verified |
7 | Privacy-based technologies& decision making | Download To be verified |
8 | Social Media Privacy | Download To be verified |
9 | Identity resolution | Download To be verified |
10 | Privacy Nudges | Download To be verified |
11 | Cookies | Download To be verified |
12 | Ethics about studying Online Privacy | Download To be verified |
13 | Anonymization techniques and Differential Privacy | Download To be verified |
14 | Conducting (user, lab, online) studies | Download To be verified |
15 | Research paper reading | Download To be verified |
16 | Voter and Browser Privacy Leaks, Profiling form PII - (Part I) | Download To be verified |
17 | Voter and Browser Privacy Leaks, Profiling form PII - (Part II) | Download To be verified |
18 | Online Privacy Tools ( Hands-on) - Part I | Download To be verified |
19 | Online Privacy Tools ( Hands-on)- Part II | Download To be verified |
20 | Mobile numbers, home location, Location-based social networks | Download To be verified |
21 | Location-based social networks | Download To be verified |
22 | Privacy laws and regulations (Part-I) | Download To be verified |
23 | Privacy laws and regulations (Part-II) | Download To be verified |
24 | Privacy standards | PDF unavailable |
25 | Look back | PDF unavailable |
Sl.No | Language | Book link |
---|---|---|
1 | English | Not Available |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |