Peter P. Swire

Affiliations:
  • Georgia Institute of Technology in Atlanta, GA, USA
  • US Office of Management and Budget, USA (former)
  • Ohio State University, College of Law, Columbus, OH, USA (former)


According to our database1, Peter P. Swire authored at least 19 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy.
IEEE Secur. Priv., 2021

2020
Ethics and Privacy in Mixed Reality.
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020

2018
A pedagogic cybersecurity framework.
Commun. ACM, 2018

2014
Identifying and classifying ambiguity for regulatory requirements.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

2013
Automated text mining for requirements analysis of policy documents.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

2012
A legal cross-references taxonomy for reasoning about compliance requirements.
Requir. Eng., 2012

Why the Federal Government Should Have a Privacy Policy Office.
J. Telecommun. High Technol. Law, 2012

Managing changing compliance requirements by predicting regulatory evolution.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

2011
A legal cross-references taxonomy for identifying conflicting software requirements.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

2009
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime.
J. Telecommun. High Technol. Law, 2009

2008
Privacy and security: what are you doing to keep the community safe?
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

2005
Security market: incentives for disclosure of vulnerabilities.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?
J. Telecommun. High Technol. Law, 2004

2002
A Prognosis for Use of Health, Medical, and Genetic Information.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

Security and privacy after September 11: the health care example.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

2001
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory
CoRR, 2001

2000
Privacy excerpt from "Towards Digital eQuality: the U.S. Government working group on electronic commerce".
Proceedings of the Tenth Conference on Computers, 2000

Hot Topics: Health Privacy.
Proceedings of the Tenth Conference on Computers, 2000

1997
The Uses and Limits of Financial Cryptography: A Law Professor's Perspective.
Proceedings of the Financial Cryptography, 1997


  Loading...