메뉴 건너뛰기




Volumn , Issue , 2007, Pages 215-224

PrivateBits: Managing visual privacy in web browsers

Author keywords

Incidental information; Privacy; Usable security and privacy; Web browser

Indexed keywords

INFORMATION ANALYSIS; VISUAL COMMUNICATION; WEB BROWSERS;

EID: 34547974751     PISSN: 07135424     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1268517.1268553     Document Type: Conference Paper
Times cited : (5)

References (26)
  • 1
    • 84869462085 scopus 로고    scopus 로고
    • Privacy Critics: Ui Components to Safeguard Users' Privacy
    • 99
    • Ackerman, M. and Cranor, L. (1999). Privacy Critics: Ui Components to Safeguard Users' Privacy. In Proc. of CHI '99, 258-259.
    • (1999) Proc. of CHI , pp. 258-259
    • Ackerman, M.1    Cranor, L.2
  • 2
    • 84883892066 scopus 로고    scopus 로고
    • Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences
    • Ackerman, M., Cranor, L. and Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In Proc. of EC'99, 1-8.
    • (1999) Proc. of EC'99 , pp. 1-8
    • Ackerman, M.1    Cranor, L.2    Reagle, J.3
  • 3
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in Electronic Commerce and the Economics of Immediate Gratification
    • Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification. In Proc. of EC '04, 21-29.
    • (2004) Proc. of EC '04 , pp. 21-29
    • Acquisti, A.1
  • 4
    • 34547995462 scopus 로고    scopus 로고
    • Aula, A., Jhaveri, N. and Kaki, M. (2005). Information Search and Re-Access Strategies of Experienced Web Users. In Proc. of WWW 2005, 583-592.
    • Aula, A., Jhaveri, N. and Kaki, M. (2005). Information Search and Re-Access Strategies of Experienced Web Users. In Proc. of WWW 2005, 583-592.
  • 5
    • 33749553738 scopus 로고    scopus 로고
    • Role-Based Policies to Control Shared Application Views
    • Berry, L., Bartram, L. and Booth, K. S. (2005). Role-Based Policies to Control Shared Application Views. In Proc. of UIST, 23-32.
    • (2005) Proc. of UIST , pp. 23-32
    • Berry, L.1    Bartram, L.2    Booth, K.S.3
  • 6
    • 4544250252 scopus 로고    scopus 로고
    • Stuff Goes into the Computer and Doesn't Come Out: A Cross-Tool Study of Personal Information Management
    • Boardman, R. and Sasse, M. A. (2004). "Stuff Goes into the Computer and Doesn't Come Out": A Cross-Tool Study of Personal Information Management. In Proc. of CHI '04, 583-590.
    • (2004) Proc. of CHI '04 , pp. 583-590
    • Boardman, R.1    Sasse, M.A.2
  • 9
    • 0038127072 scopus 로고    scopus 로고
    • Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit
    • DePaulo, B. M., Wetzel, G., Sternglanz, R. W. and Wilson, M. J. W. (2003). Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit. J. Of Social Issues 59(2): 391-410.
    • (2003) J. Of Social Issues , vol.59 , Issue.2 , pp. 391-410
    • DePaulo, B.M.1    Wetzel, G.2    Sternglanz, R.W.3    Wilson, M.J.W.4
  • 10
    • 84869099777 scopus 로고    scopus 로고
    • Hawkey, K. and Inkpen, K. (2005). Privacy Gradients: Exploring Ways to Manage Incidental Information During Co-Located Collaboration. Ext. Abstracts CHI 2005, ACM Press: 1431-1434.
    • Hawkey, K. and Inkpen, K. (2005). Privacy Gradients: Exploring Ways to Manage Incidental Information During Co-Located Collaboration. Ext. Abstracts CHI 2005, ACM Press: 1431-1434.
  • 12
    • 34547975720 scopus 로고    scopus 로고
    • Hawkey, K. and Inkpen, K. M. (2006). Keeping up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proc. of CHI 2006, 821-830.
    • Hawkey, K. and Inkpen, K. M. (2006). Keeping up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proc. of CHI 2006, 821-830.
  • 14
    • 33748675700 scopus 로고    scopus 로고
    • The Impact of Task on the Usage of Web Browser Navigation Tools
    • Kellar, M., Watters, G and Shepherd, M. (2006). The Impact of Task on the Usage of Web Browser Navigation Tools. In Proc. of Graphics Interface, 235-242.
    • (2006) Proc. of Graphics Interface , pp. 235-242
    • Kellar, M.1    Watters, G.2    Shepherd, M.3
  • 15
    • 0002654263 scopus 로고    scopus 로고
    • Privacy Interfaces for Information Management
    • Lau, T., Etzioni, O. and Weld, D. S. (1999). Privacy Interfaces for Information Management. Communications of the ACM 42(10): 89-94.
    • (1999) Communications of the ACM , vol.42 , Issue.10 , pp. 89-94
    • Lau, T.1    Etzioni, O.2    Weld, D.S.3
  • 16
    • 19944367736 scopus 로고    scopus 로고
    • Personal Privacy through Understanding and Action: Five Pitfalls for Designers
    • Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Pers Ubiquit Comput 8: 440-454.
    • (2004) Pers Ubiquit Comput , vol.8 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4
  • 18
    • 84869078915 scopus 로고    scopus 로고
    • Lederer, S., Mankoff, J. and Dey, A. K. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003. Ft. Lauderdale, Florida, USA, ACM Press: 724-725.
    • Lederer, S., Mankoff, J. and Dey, A. K. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003. Ft. Lauderdale, Florida, USA, ACM Press: 724-725.
  • 19
    • 0038803998 scopus 로고    scopus 로고
    • A Tack in the Shoe: Neutralizing and Resisting the New Surveillance
    • Marx, G. T. (2003). A Tack in the Shoe: Neutralizing and Resisting the New Surveillance. J. Of Social Issues 59(2): 369-390.
    • (2003) J. Of Social Issues , vol.59 , Issue.2 , pp. 369-390
    • Marx, G.T.1
  • 20
    • 0036737236 scopus 로고    scopus 로고
    • Developing and Validating Trust Measures for E-Commerce: An Integrative Typology
    • McKnight, D. H., Choudhury, V. and Kacmar, C. (2002). Developing and Validating Trust Measures for E-Commerce: An Integrative Typology. Information Systems Research 13(3): 334-361.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 334-361
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 21
    • 84869136735 scopus 로고    scopus 로고
    • Olson, J. S., Grudin, J. and Horvitz, E. (2005). A Study of Preferences for Sharing and Privacy. Ext. Abstracts of CHI '05. Portland, Oregon, ACM Press: 1985-1988.
    • Olson, J. S., Grudin, J. and Horvitz, E. (2005). A Study of Preferences for Sharing and Privacy. Ext. Abstracts of CHI '05. Portland, Oregon, ACM Press: 1985-1988.
  • 22
    • 77950314683 scopus 로고    scopus 로고
    • Uncovering Privacy Attitudes and Practices in Instant Messaging
    • Patil, S. and Kobsa, A. (2005). Uncovering Privacy Attitudes and Practices in Instant Messaging. In Proc. of GROUP '05, 109-112.
    • (2005) Proc. of GROUP '05 , pp. 109-112
    • Patil, S.1    Kobsa, A.2
  • 23
    • 84861301596 scopus 로고    scopus 로고
    • Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application
    • Patil, S. and Lai, J. (2005). Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In Proc. of CHI'05, 101-110.
    • (2005) Proc. of CHI'05 , pp. 101-110
    • Patil, S.1    Lai, J.2
  • 24
    • 33745878837 scopus 로고    scopus 로고
    • Need to Know: Examining Information Need in Location Disclosure
    • Reilly, D., Dearman, D., Ha, V., Smith, I. and Inkpen, K. (2006). "Need to Know": Examining Information Need in Location Disclosure. In Proc. of Pervasive 2006, 33-49.
    • (2006) Proc. of Pervasive , pp. 33-49
    • Reilly, D.1    Dearman, D.2    Ha, V.3    Smith, I.4    Inkpen, K.5
  • 25
    • 84869120875 scopus 로고    scopus 로고
    • Tarasewich, P., Gong, J. and Conlan, R. (2006). Protecting Private Data in Public. In Proc. of CHI 2006 (Ext. Abstracts), 1409-1414.
    • Tarasewich, P., Gong, J. and Conlan, R. (2006). Protecting Private Data in Public. In Proc. of CHI 2006 (Ext. Abstracts), 1409-1414.
  • 26
    • 32244434492 scopus 로고    scopus 로고
    • Gathering Evidence: Use of Visual Security Cues in Web Browsers
    • Whalen, T. and Inkpen, K. M. (2005). Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proc. of Graphic Interface 2005, 137-145.
    • (2005) Proc. of Graphic Interface , pp. 137-145
    • Whalen, T.1    Inkpen, K.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.