-
1
-
-
84869462085
-
Privacy critics: UI components to safeguard Users' privacy
-
Paper presented at the
-
Ackerman, M., Cranor, L., 1999. Privacy Critics: UI Components to Safeguard Users' Privacy. Paper presented at the CHI', 99, pp. 258-259.
-
(1999)
CHI', 99
, pp. 258-259
-
-
Ackerman, M.1
Cranor, L.2
-
3
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification
-
Paper presented at the
-
Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the 5th ACM conference on Electronic commerce, pp. 21-29.
-
(2004)
5th ACM Conference on Electronic Commerce
, pp. 21-29
-
-
Acquisti, A.1
-
4
-
-
19944425668
-
-
AT&T., 2003. Privacy Bird, available from: http://www.privacybird.com
-
(2003)
Privacy Bird
-
-
-
5
-
-
19944361990
-
-
Retrieved 31 January, 2005
-
AT&T., 2004. Find People Nearby. Retrieved 31 January, 2005, available from: http://www.attwireless.com/personal/features/organization/ findfriends.jhtml
-
(2004)
Find People Nearby
-
-
-
6
-
-
0002131454
-
A design for privacy in ubiquitous computing environments
-
Paper presented at the
-
Bellotti, V., Sellen, A., 1993. A. Design for Privacy in Ubiquitous Computing Environments. Paper presented at the 3rd European Conference on Computer Supported Cooperative Work, (ECSCW 93), pp. 77-92.
-
(1993)
3rd European Conference on Computer Supported Cooperative Work, (ECSCW 93)
, pp. 77-92
-
-
Bellotti, V.1
Sellen, A.2
-
9
-
-
19944377349
-
-
FTC VS. TOYSMART
-
Bronski, D., Chen, C., Rosenthal, M., Pluscec, R., 2001. FTC VS. TOYSMART. Duke Law and Technology Review, 0010.
-
(2001)
Duke Law and Technology Review
, pp. 0010
-
-
Bronski, D.1
Chen, C.2
Rosenthal, M.3
Pluscec, R.4
-
10
-
-
19944368926
-
-
Children's Online Privacy Protection Act 15 USC 6501-6505
-
Children's Online Privacy Protection Act, 1998. 15 USC 6501-6505. Available from: http://www.ftc.gov/ogc/coppa1.htm
-
(1998)
-
-
-
12
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
Paper presented at the Portland, Oregon, USA, (to appear)
-
Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P., 2005. Location disclosure to social relations: why, when, & what people want to share. Paper presented at the Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, (to appear).
-
(2005)
Conference on Human Factors in Computing Systems, CHI 2005
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
Lamarca, A.4
Tabert, J.5
Powledge, P.6
-
13
-
-
19944396296
-
-
ContentGuard.com., 2005. XrML Version 2.0, available from: http://www.xrml.org
-
(2005)
XrML Version 2.0
-
-
-
16
-
-
0038684367
-
-
O'Reilly & Associates Cambridge, MA
-
L. Cranor Web Privacy with P3P 2002 O'Reilly & Associates Cambridge, MA
-
(2002)
Web Privacy with P3P
-
-
Cranor, L.1
-
17
-
-
0345673940
-
-
Cranor, L., Langheinrich, M., Marchiori, M., 2002. A P3P Preference Exchange Language, available from: http://www.w3.org/TR/P3P-preferences/
-
(2002)
A P3P Preference Exchange Language
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
-
18
-
-
19944388746
-
-
CreativeCommons.org., 2005. Creative Commons, available from: http://creativecommons.org/
-
(2005)
Creative Commons
-
-
-
19
-
-
19944403736
-
Social and cultural obstacles to the (B2C) E-commerce experience
-
Paper presented at the
-
Dawson, L., Minocha, S., Petre, M., 2003. Social and cultural obstacles to the (B2C) E-Commerce Experience. Paper presented at the People and Computers XVII - Designing for Society, pp. 225-241.
-
(2003)
People and Computers XVII - Designing for Society
, pp. 225-241
-
-
Dawson, L.1
Minocha, S.2
Petre, M.3
-
20
-
-
19944363689
-
-
95/46/EC
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995), 95/46/EC. Available from: http://europa.eu.int/comm/internal_market/privacy/law_en.htm
-
-
-
-
21
-
-
19944405612
-
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (2002). Available from: http://europa.eu.int/comm/internal_market/privacy/law_en.htm
-
-
-
-
22
-
-
33846190518
-
A formal model of obfuscation and negotiation for location privacy
-
Paper presented at the Munich, Germany, 8-13 May, to appear
-
Duckham, M., Kulik, L., 2005. A formal model of obfuscation and negotiation for location privacy. Paper presented at the Third International Conference on Pervasive Computing: Pervasive '05, Munich, Germany, 8-13 May, to appear.
-
(2005)
Third International Conference on Pervasive Computing: Pervasive '05
-
-
Duckham, M.1
Kulik, L.2
-
25
-
-
0003098014
-
Social translucence: Designing social infrastructures that make collective activity visible
-
T. Erickson, C. Halverson, W.A. Kellogg, M. Laff, and T. Wolf Social translucence: designing social infrastructures that make collective activity visible Communications of the ACM 45 4 2002 40 44
-
(2002)
Communications of the ACM
, vol.45
, Issue.4
, pp. 40-44
-
-
Erickson, T.1
Halverson, C.2
Kellogg, W.A.3
Laff, M.4
Wolf, T.5
-
27
-
-
19944396962
-
-
Gramm-Leach-Bliley Act. 15 USC, Subchapter I, Sec. 6801-6809
-
Gramm-Leach-Bliley Act., 1999. 15 USC, Subchapter I, Sec. 6801-6809. Available from: http://www.ftc.gov/privacy/glbact/glbsub1.htm
-
(1999)
-
-
-
28
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Paper presented at the
-
Gruteser, M., Grunwald, D., 2003. Anonymous usage of location-based services through spatial and temporal cloaking. Paper presented at the First International Conference on Mobile Systems, Applications, and Services.
-
(2003)
First International Conference on Mobile Systems, Applications, and Services
-
-
Gruteser, M.1
Grunwald, D.2
-
29
-
-
24944553842
-
A formal privacy system and its application to location based services
-
Paper presented at the Toronto, Canada
-
Gunter, C.A., May, M.J., Stubblebine, S.G., 2004. A formal privacy system and its application to location based services. Paper presented at the Workshop on Privacy Enhancing Technologies, Toronto, Canada.
-
(2004)
Workshop on Privacy Enhancing Technologies
-
-
Gunter, C.A.1
May, M.J.2
Stubblebine, S.G.3
-
30
-
-
19944390811
-
-
Health Insurance Portability and Accountability Act 42 USC 201
-
Health Insurance Portability and Accountability Act, 1996. 42 USC 201. Available from: http://aspe.hhs.gov/admnsimp/pl104191.htm
-
(1996)
-
-
-
31
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
Paper presented at the Boston, MA, USA
-
Hong, J.I., Landay, J.A., 2004. An architecture for privacy-sensitive ubiquitous computing. Paper presented at the Proceedings of the Second International Conference on Mobile Systems, Applications, and Services, Boston, MA, USA, pp. 177-189.
-
(2004)
Proceedings of the Second International Conference on Mobile Systems, Applications, and Services
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
32
-
-
24944578141
-
-
IBM., 2003. Enterprise Privacy Authorization Language, available from: http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index. html
-
(2003)
Enterprise Privacy Authorization Language
-
-
-
33
-
-
84937391117
-
Approximate information flows: Socially based modeling of privacy in ubiquitous computing
-
Paper presented at the Goteberg, Sweden
-
Jiang, X., Hong, J.I., Landay, J.A., 2002. Approximate information flows: socially based modeling of privacy in ubiquitous computing. Paper presented at the Fourth International Conference on Ubiquitous Computing, Goteberg, Sweden.
-
(2002)
Fourth International Conference on Ubiquitous Computing
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.A.3
-
35
-
-
15744379083
-
A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments
-
Computer Science Division, University of California, Berkley
-
Lederer, S., Dey, A.K., Mankoff, J., 2002. A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments (Technical Report UCB/CSD-2-1188): Computer Science Division, University of California, Berkley.
-
(2002)
Technical Report
, vol.UCB-CSD-2-1188
-
-
Lederer, S.1
Dey, A.K.2
Mankoff, J.3
-
36
-
-
85025461759
-
-
2005, a focus on the mobile and wireless sector: Deloitte Research.
-
Lee, P., 2005. TMT Trends: Predictions, 2005, a focus on the mobile and wireless sector: Deloitte Research. Available from http://www.deloitte.com/dtt/ cda/doc/content/Mobile%20wireless_FINAL_01FEB05_LR_FA_LOCKED.pdf.
-
(2005)
TMT Trends: Predictions
-
-
Lee, P.1
-
38
-
-
19944363997
-
Topiary: A tool for prototyping location-enhanced applications
-
Paper presented at the Santa Fe, New Mexico, 24-27 October
-
Li, Y., Hong, J.I., Landay, J.A., 2004. Topiary: a tool for prototyping location-enhanced applications. Paper presented at the UIST'04: Symposium on User Interface Software and Technology, Santa Fe, New Mexico, 24-27 October, pp. 217-226.
-
(2004)
UIST'04: Symposium on User Interface Software and Technology
, pp. 217-226
-
-
Li, Y.1
Hong, J.I.2
Landay, J.A.3
-
39
-
-
84976793562
-
Values, personal information privacy, and regulatory approaches
-
S.J. Milberg, S.J. Burke, H.J. Smith, and E.A. Kallman Values, personal information privacy, and regulatory approaches Communications of the ACM 38 12 1995 65 74
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 65-74
-
-
Milberg, S.J.1
Burke, S.J.2
Smith, H.J.3
Kallman, E.A.4
-
41
-
-
0001775576
-
Heuristic Evaluation
-
J. Nielsen R.L. Mack Wiley New York
-
J. Nielsen Heuristic Evaluation J. Nielsen R.L. Mack Usability Inspection Methods 1994 Wiley New York
-
(1994)
Usability Inspection Methods
-
-
Nielsen, J.1
-
43
-
-
19944393388
-
Consumer privacy attitudes: A major shift since 2000 and why
-
P&AB
-
P&AB Consumer privacy attitudes: a major shift since 2000 and why Privacy & American Business Newsletter 10 6 2003 23
-
(2003)
Privacy & American Business Newsletter
, vol.10
, Issue.6
, pp. 23
-
-
-
44
-
-
0038037379
-
Unpacking "privacy" for a Networked World
-
L. Palen, and P. Dourish Unpacking "Privacy" for a Networked World CHI Letters (CHI 2003) 5 1 2003 129 136
-
(2003)
CHI Letters (CHI 2003)
, vol.5
, Issue.1
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
45
-
-
35048855200
-
Heuristic evaluation and mobile usability: Bridging the realism gap
-
Paper presented at the Glasgow, UK
-
Po, S., Howard, S., Vetere, F., Skov, M.B., 2004. Heuristic evaluation and mobile usability: bridging the realism gap. Paper presented at the MobileHCI 2004, Glasgow, UK, pp. 49-60.
-
(2004)
MobileHCI 2004
, pp. 49-60
-
-
Po, S.1
Howard, S.2
Vetere, F.3
Skov, M.B.4
-
46
-
-
0038086632
-
An economic theory of privacy
-
R. Posner An economic theory of privacy Regulation 1978 19 26
-
(1978)
Regulation
, pp. 19-26
-
-
Posner, R.1
-
48
-
-
33646522979
-
A document format for expressing privacy preferences for location information
-
November 28 The Internet Society. Retrieved 26 January, 2005
-
Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J., 2004, November 28. A document format for expressing privacy preferences for location information [Internet Draft]. The Internet Society. Retrieved 26 January, 2005, available from: http://www.ietf.org/internet-drafts/draft-ietf-geopriv-policy- 05.txt
-
(2004)
Internet Draft
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
-
49
-
-
0036005221
-
Toward a typology of internet users and online privacy concerns
-
K. Sheehan Toward a typology of internet users and online privacy concerns The Information Society 18 1 2002 21 32
-
(2002)
The Information Society
, vol.18
, Issue.1
, pp. 21-32
-
-
Sheehan, K.1
-
50
-
-
24944459064
-
Social disclosure of place: From location technology to communication practices
-
Paper presented at the Munich, Germany
-
Smith, I., Consolvo, S., Lamarca, A., Hightower, J., James Scott, Sohn, T., Hughes, J., Iachello, G., Abowd, G.D., 2005. Social disclosure of place: from location technology to communication practices. Paper presented at the Third International Conference on Pervasive Computing: Pervasive '05, Munich, Germany.
-
(2005)
Third International Conference on Pervasive Computing: Pervasive '05
-
-
Smith, I.1
Consolvo, S.2
Lamarca, A.3
Hightower, J.4
Scott, J.5
Sohn, T.6
Hughes, J.7
Iachello, G.8
Abowd, G.D.9
-
51
-
-
19944367443
-
The Moral of Santa's story
-
Sokol, D., 2004. The Moral of Santa's story. BBC News Magazine. Available from: http://news.bbc.co.uk/1/hi/magazine/4121991.stm
-
(2004)
BBC News Magazine
-
-
Sokol, D.1
-
52
-
-
2642522215
-
-
The Harris Poll, 17, 19 March
-
Taylor, H., 2003. Most People Are "Privacy Pragmatists" Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. The Harris Poll, 17, 19 March. Available from: http://www.harrisinteractive.com/ harris_poll/index.asp?PID=365
-
(2003)
Most People Are "Privacy Pragmatists" Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits
-
-
Taylor, H.1
-
53
-
-
19944405611
-
-
Retrieved 29 March, 2005
-
TRUSTe.org., 2004. TRUSTe Home Page. Retrieved 29 March, 2005, available from: http://www.truste.org
-
(2004)
TRUSTe Home Page
-
-
-
54
-
-
19944373576
-
-
Video Privacy Protection Act 18 USC 2710
-
Video Privacy Protection Act, 1988. 18 USC 2710. Available from: http://www4.law.cornell.edu/uscode/18/2710.html
-
(1988)
-
-
-
56
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Paper Presented at the Washington, DC
-
Whitten, A., Tygar, J.D., 1999. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Paper Presented at the Eighth USENIX Security Symposium, Washington, DC, pp. 169-184.
-
(1999)
Eighth USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
57
-
-
85001837279
-
Semiautomatic derivation and use of personal privacy policies in e-business
-
G. Yee, and L. Korba Semiautomatic derivation and use of personal privacy policies in e-business International Journal of E-Business Research 1 1 2005 54 69
-
(2005)
International Journal of E-Business Research
, vol.1
, Issue.1
, pp. 54-69
-
-
Yee, G.1
Korba, L.2
|