-
1
-
-
10044276780
-
-
MedicAlert. http://www.medicalert.org
-
-
-
-
2
-
-
10044265205
-
-
United States v. Carroll Towing Co. 1947
-
United States v. Carroll Towing Co. 1947.
-
-
-
-
3
-
-
84995377675
-
Multimedia information changes the whole privacy ball game
-
Toronto, Canada: ACM Press
-
Adams, A. Multimedia Information Changes the Whole Privacy Ball Game. In Proceedings of Computers, Freedom, and Privacy. Toronto, Canada: ACM Press, pp. 25-32 2000.
-
(2000)
Proceedings of Computers, Freedom, and Privacy
, pp. 25-32
-
-
Adams, A.1
-
11
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
Boston, MA. To Appear
-
Chung, E.S., J.I. Hong, J. Lin, M.K. Prabaker, J.A. Landay, and A. Liu. Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp. To Appear 2004.
-
(2004)
Proceedings of Designing Interactive Systems (DIS2004)
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.6
-
12
-
-
4544341979
-
The last link: Default = offline, or why ubicomp scares me
-
Doheny-Farina, S., The Last Link: Default = Offline, Or Why Ubicomp Scares Me, Computer-mediated Communication, vol. 1(6): pp. 18-20, 1994.
-
(1994)
Computer-mediated Communication
, vol.1
, Issue.6
, pp. 18-20
-
-
Doheny-Farina, S.1
-
14
-
-
0345774218
-
-
Oxford, England: Oxford University Press
-
Feinman, J.M., Law 101. Oxford, England: Oxford University Press, 2000.
-
(2000)
Law 101
-
-
Feinman, J.M.1
-
17
-
-
0027940858
-
Groupware and social dynamics: Eight challenges for developers
-
Grudin, J., Groupware and Social Dynamics: Eight Challenges for Developers, Communications of the ACM, vol. 37(1): pp. 92-105., 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.1
, pp. 92-105
-
-
Grudin, J.1
-
21
-
-
0028322851
-
A distributed location system for the active office
-
Harter, A. and A. Hopper, A Distributed Location System for the Active Office. IEEE Network, 1994. 8(1).
-
(1994)
IEEE Network
, vol.8
, Issue.1
-
-
Harter, A.1
Hopper, A.2
-
22
-
-
84937391117
-
Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
-
Göteborg, Sweden
-
Jiang, X., J.I. Hong, and J.A. Landay. Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 176-193 2002.
-
(2002)
Proceedings of Ubicomp 2002
, pp. 176-193
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.A.3
-
23
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
Atlanta, GA
-
Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of Ubicomp 2001. Atlanta, GA. pp. 273-291 2001.
-
(2001)
Proceedings of Ubicomp 2001
, pp. 273-291
-
-
Langheinrich, M.1
-
24
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Submitted to Personal and Ubiquitous Computing, 2004.
-
(2004)
Submitted to Personal and Ubiquitous Computing
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.3
Landay, J.A.4
-
26
-
-
84869078915
-
Who wants to know what when? Privacy preference determinants in ubiquitous computing
-
Fort Lauderdale, FL
-
Lederer, S., J. Mankoff, and A.K. Dey. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proceedings of Extended Abstracts of CHI 2003, ACM Conference on Human Factors in Computing Systems. Fort Lauderdale, FL. pp. 724-725 2003.
-
(2003)
Proceedings of Extended Abstracts of CHI 2003, ACM Conference on Human Factors in Computing Systems
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
29
-
-
27944447037
-
Identity and anonymity: Some conceptual distinctions and issues for research
-
J. Caplan and J. Torpey, Editors. Princeton University Press
-
Marx, G., Identity and Anonymity: Some Conceptual Distinctions and Issues for Research, in Documenting Individual Identity: The Development Of State Practices In The Modern World, J. Caplan and J. Torpey, Editors. Princeton University Press, 2001.
-
(2001)
Documenting Individual Identity: the Development of State Practices in the Modern World
-
-
Marx, G.1
-
30
-
-
0004257599
-
-
Boston, MA: Academic Press, xiv + 358 pages
-
Nielsen, J., Usability Engineering. Boston, MA: Academic Press, xiv + 358 pages, 1993.
-
(1993)
Usability Engineering
-
-
Nielsen, J.1
-
31
-
-
10844265715
-
Say versus Do; building a trust framework through users' actions, not their words
-
Nodder, C., Say versus Do; building a trust framework through users' actions, not their words. 2003, Workshop on Ubicomp communities: privacy as boundary negotiation. http://guir.berkeley.edu/pubs/ubicomp2003/privacyworkshop/
-
(2003)
Workshop on Ubicomp Communities: Privacy As Boundary Negotiation
-
-
Nodder, C.1
-
32
-
-
0032670353
-
Social, individual and technological issues for groupware calendar systems
-
Palen, L., Social, Individual and Technological Issues for Groupware Calendar Systems. CHI Letters: Human Factors in Computing Systems, CHI 99, 1999. 2(1): p. 17-24.
-
(1999)
CHI Letters: Human Factors in Computing Systems, CHI 99
, vol.2
, Issue.1
, pp. 17-24
-
-
Palen, L.1
-
33
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Palen, L. and P. Dourish, Unpacking "Privacy" for a Networked World. CHI Letters, 2003. 5(1): p. 129-136.
-
(2003)
CHI Letters
, vol.5
, Issue.1
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
35
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J.H. and M.D. Schroeder, The Protection of Information in Computer Systems. Proceedings of the IEEE, 1975. 63(9): p. 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
37
-
-
0347380855
-
Wireless location privacy protection
-
Schilit, B.N., J.I. Hong, and M. Gruteser, Wireless Location Privacy Protection, Computer, vol. 36(12): pp. 135-137, 2003.
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 135-137
-
-
Schilit, B.N.1
Hong, J.I.2
Gruteser, M.3
-
38
-
-
0011597021
-
Orwellian dream come true: A badge that pinpoints you
-
Sloane, L., Orwellian Dream Come True: A Badge That Pinpoints You, New York Times pp. 14, 1992.
-
(1992)
New York Times
, pp. 14
-
-
Sloane, L.1
-
40
-
-
0038564562
-
-
Reading, MA: Addison-Wesley
-
van Duyne, D.K., J.A. Landay, and J.I. Hong, The Design of Sites: Principles, Processes, and Patterns for Crafting a Customer-Centered Web Experience. Reading, MA: Addison-Wesley, 2002.
-
(2002)
The Design of Sites: Principles, Processes, and Patterns for Crafting A Customer-centered Web Experience
-
-
Van Duyne, D.K.1
Landay, J.A.2
Hong, J.I.3
-
41
-
-
0033362595
-
The origins of ubiquitous computing research at PARC in the late 1980s
-
Weiser, M., R. Gold, and J.S. Brown, The Origins of Ubiquitous Computing Research at PARC in the Late 1980s. IBM Systems Journal, 1999. 38(4): p. 693-696.
-
(1999)
IBM Systems Journal
, vol.38
, Issue.4
, pp. 693-696
-
-
Weiser, M.1
Gold, R.2
Brown, J.S.3
-
43
-
-
4544222175
-
You're not paranoid: They really are watching you
-
Whalen, J., You're Not Paranoid: They Really Are Watching You, Wired Magazine, vol. 3(3): pp. 95-85, 1995.
-
(1995)
Wired Magazine
, vol.3
, Issue.3
, pp. 95-185
-
-
Whalen, J.1
|