-
1
-
-
0035570270
-
Privacy in context
-
Ackerman, M. Darrell, T., and Weitzner, D. (2001) Privacy in context, Human Computer Interaction, 16, 2, 167-176.
-
(2001)
Human Computer Interaction
, vol.16
, Issue.2
, pp. 167-176
-
-
Ackerman, M.1
Darrell, T.2
Weitzner, D.3
-
2
-
-
0038588452
-
Privacy in Multimedia Communications: Protecting Users, Not Just Data
-
A. Blandford, J. Vanderdonkt & P. Gray [Eds.]: People and Computers XV - Interaction without frontiers. Lille, Sept. 2001. Springer
-
Adams, A. and Sasse, A. (2001) Privacy in Multimedia Communications: Protecting Users, Not Just Data . In A. Blandford, J. Vanderdonkt & P. Gray [Eds.]: People and Computers XV - Interaction without frontiers. Joint Proceedings of HCI200I and ICM2001, Lille, Sept. 2001. pp. 49-64. Springer.
-
(2001)
Joint Proceedings of HCI200I and ICM2001
, pp. 49-64
-
-
Adams, A.1
Sasse, A.2
-
3
-
-
0003508667
-
-
Monterey, CA: Brooks/Cole Pub. Co., Inc.
-
Altman, I. (1975). The Environment and Social Behavior, Privacy, Personal Space, Territory and Crowding. Monterey, CA: Brooks/Cole Pub. Co., Inc.
-
(1975)
The Environment and Social Behavior, Privacy, Personal Space, Territory and Crowding
-
-
Altman, I.1
-
4
-
-
19944404913
-
The complexity underlying JetBlue's privacy policy violations
-
August/September, 2004.
-
Anton, A., He, Q., and Baumer, D. (2004) The complexity underlying JetBlue's privacy policy violations. IEEE Security & Privacy. August/September, 2004.
-
(2004)
IEEE Security & Privacy
-
-
Anton, A.1
He, Q.2
Baumer, D.3
-
5
-
-
19944418651
-
-
W3C Member Submission 10-Nov-2003
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter, M. (2003). Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission 10-Nov-2003. http://www.w3.org/Submission/EPAL/
-
(2003)
Enterprise Privacy Architecture Language (EPAL 1.2)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
6
-
-
0347415586
-
Patient privacy in electronic prescription transfer
-
Ball, E. (2003). Patient privacy in electronic prescription transfer. IEEE Security and Privacy, 1, 2, 77-80.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 77-80
-
-
Ball, E.1
-
7
-
-
0003664109
-
Privacy in medical records: IT implications of HIPAA
-
December, 2000
-
Baumer, D., Earp, J.B., and Payton, F. C. (2000). Privacy in medical records: IT implications of HIPAA. Computers and Society, December, 2000, 40-47.
-
(2000)
Computers and Society
, pp. 40-47
-
-
Baumer, D.1
Earp, J.B.2
Payton, F.C.3
-
10
-
-
1342296879
-
Personalization versus privacy
-
Nov., 2000
-
Hagen, P. (2000). Personalization versus privacy. The Forrester Report, Nov., 2000, 1-19.
-
(2000)
The Forrester Report
, pp. 1-19
-
-
Hagen, P.1
-
11
-
-
4544286640
-
Privacy polices as decision-making tools: An evaluation of online privacy notices
-
Jensen, C. and Potts, C. (2004). Privacy polices as decision-making tools: An evaluation of online privacy notices. CHI 2004, 471-478.
-
(2004)
CHI 2004
, pp. 471-478
-
-
Jensen, C.1
Potts, C.2
-
12
-
-
1342323619
-
Personalizing the user experience on ibm.com
-
Karat, C., Brodie, C., Karat, J., Vergo, J., and Alpert, S. (2003) Personalizing the user experience on ibm.com. IBM Systems Journal, 42, 4, 686-701.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.4
, pp. 686-701
-
-
Karat, C.1
Brodie, C.2
Karat, J.3
Vergo, J.4
Alpert, S.5
-
13
-
-
0347164897
-
Personalized hypermedia and international privacy
-
Kobsa, A. Personalized hypermedia and international privacy. Communications of the ACM, 45, 5, 64-67.
-
Communications of the ACM
, vol.45
, Issue.5
, pp. 64-67
-
-
Kobsa, A.1
-
14
-
-
84979828719
-
European and American privacy: Commerce, rights, and justice
-
2003
-
Manny, C. H. (2003). European and American privacy: Commerce, rights, and justice. Computer Law and Security Report, 19, 1, 2003, 4-10.
-
(2003)
Computer Law and Security Report
, vol.19
, Issue.1
, pp. 4-10
-
-
Manny, C.H.1
-
17
-
-
33646010208
-
-
Office of the Federal Privacy Commissioner of Australia. (2000). Privacy and Business (2000). http://www.privacy.gov.au
-
(2000)
Privacy and Business (2000).
-
-
-
18
-
-
0038037379
-
Unpacking 'privacy' for a networked world
-
Palen, L. and Dourish, P. (2002). Unpacking 'privacy' for a networked world, CHI 2002. 129-136.
-
(2002)
CHI 2002.
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
20
-
-
19944407294
-
Blinkering surveillance: Enabling video privacy through computer vision
-
in press
-
Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y., and Ekin, A. (2004). Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IEEE Security and Privacy, in press.
-
(2004)
IEEE Security and Privacy
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.5
Ekin, A.6
-
21
-
-
0027805822
-
Privacy policies and practices: Inside the organizational maze
-
Smith, J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12, 105-122.
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 105-122
-
-
Smith, J.1
-
22
-
-
33646001287
-
-
th Congress, July 24, 2003
-
th Congress, July 24, 2003.
-
-
-
|