-
1
-
-
84869462085
-
Privacy Critics: Ui Components to Safeguard Users' Privacy
-
99
-
Ackerman, M. and Cranor, L. (1999). Privacy Critics: Ui Components to Safeguard Users' Privacy. In Proc. of CHI '99, 258-259.
-
(1999)
Proc. of CHI
, pp. 258-259
-
-
Ackerman, M.1
Cranor, L.2
-
2
-
-
84883892066
-
Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences
-
Ackerman, M., Cranor, L. and Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In Proc. of EC'99, 1-8.
-
(1999)
Proc. of EC'99
, pp. 1-8
-
-
Ackerman, M.1
Cranor, L.2
Reagle, J.3
-
3
-
-
3242812017
-
Privacy in Electronic Commerce and the Economics of Immediate Gratification
-
Acquisti, A. (2004). Privacy in Electronic Commerce and the Economics of Immediate Gratification. In Proc. of EC '04, 21-29.
-
(2004)
Proc. of EC '04
, pp. 21-29
-
-
Acquisti, A.1
-
4
-
-
34547995462
-
-
Aula, A., Jhaveri, N. and Kaki, M. (2005). Information Search and Re-Access Strategies of Experienced Web Users. In Proc. of WWW 2005, 583-592.
-
Aula, A., Jhaveri, N. and Kaki, M. (2005). Information Search and Re-Access Strategies of Experienced Web Users. In Proc. of WWW 2005, 583-592.
-
-
-
-
5
-
-
33749553738
-
Role-Based Policies to Control Shared Application Views
-
Berry, L., Bartram, L. and Booth, K. S. (2005). Role-Based Policies to Control Shared Application Views. In Proc. of UIST, 23-32.
-
(2005)
Proc. of UIST
, pp. 23-32
-
-
Berry, L.1
Bartram, L.2
Booth, K.S.3
-
6
-
-
4544250252
-
Stuff Goes into the Computer and Doesn't Come Out: A Cross-Tool Study of Personal Information Management
-
Boardman, R. and Sasse, M. A. (2004). "Stuff Goes into the Computer and Doesn't Come Out": A Cross-Tool Study of Personal Information Management. In Proc. of CHI '04, 583-590.
-
(2004)
Proc. of CHI '04
, pp. 583-590
-
-
Boardman, R.1
Sasse, M.A.2
-
8
-
-
77953740422
-
Two Experiences Designing for Effective Security
-
de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J. and Filho, R. S. (2005). Two Experiences Designing for Effective Security. In Proc. of Symposium On Usable Privacy and Security (SOUPS), 25-34.
-
(2005)
Proc. of Symposium On Usable Privacy and Security (SOUPS)
, pp. 25-34
-
-
de Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
Filho, R.S.9
-
9
-
-
0038127072
-
Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit
-
DePaulo, B. M., Wetzel, G., Sternglanz, R. W. and Wilson, M. J. W. (2003). Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit. J. Of Social Issues 59(2): 391-410.
-
(2003)
J. Of Social Issues
, vol.59
, Issue.2
, pp. 391-410
-
-
DePaulo, B.M.1
Wetzel, G.2
Sternglanz, R.W.3
Wilson, M.J.W.4
-
10
-
-
84869099777
-
-
Hawkey, K. and Inkpen, K. (2005). Privacy Gradients: Exploring Ways to Manage Incidental Information During Co-Located Collaboration. Ext. Abstracts CHI 2005, ACM Press: 1431-1434.
-
Hawkey, K. and Inkpen, K. (2005). Privacy Gradients: Exploring Ways to Manage Incidental Information During Co-Located Collaboration. Ext. Abstracts CHI 2005, ACM Press: 1431-1434.
-
-
-
-
12
-
-
34547975720
-
-
Hawkey, K. and Inkpen, K. M. (2006). Keeping up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proc. of CHI 2006, 821-830.
-
Hawkey, K. and Inkpen, K. M. (2006). Keeping up Appearances: Understanding the Dimensions of Incidental Information Privacy. In Proc. of CHI 2006, 821-830.
-
-
-
-
14
-
-
33748675700
-
The Impact of Task on the Usage of Web Browser Navigation Tools
-
Kellar, M., Watters, G and Shepherd, M. (2006). The Impact of Task on the Usage of Web Browser Navigation Tools. In Proc. of Graphics Interface, 235-242.
-
(2006)
Proc. of Graphics Interface
, pp. 235-242
-
-
Kellar, M.1
Watters, G.2
Shepherd, M.3
-
15
-
-
0002654263
-
Privacy Interfaces for Information Management
-
Lau, T., Etzioni, O. and Weld, D. S. (1999). Privacy Interfaces for Information Management. Communications of the ACM 42(10): 89-94.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
, pp. 89-94
-
-
Lau, T.1
Etzioni, O.2
Weld, D.S.3
-
16
-
-
19944367736
-
Personal Privacy through Understanding and Action: Five Pitfalls for Designers
-
Lederer, S., Hong, J. I., Dey, A. K. and Landay, J. A. (2004). Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Pers Ubiquit Comput 8: 440-454.
-
(2004)
Pers Ubiquit Comput
, vol.8
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
17
-
-
34250651713
-
Towards a Deconstruction of the Privacy Space
-
Lederer, S., Mankoff, J. and Dey, A. K. (2003). Towards a Deconstruction of the Privacy Space. Workshop on Ubicomp Communities: Privacy as Boundary Negotiation, UBICOMP 2003, http://guir.berkeley.edu/pubs/ubicomp2003/ privacyworkshop/papers/lederer-privacyspace.pdf
-
(2003)
Workshop on Ubicomp Communities: Privacy as Boundary Negotiation, UBICOMP
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
18
-
-
84869078915
-
-
Lederer, S., Mankoff, J. and Dey, A. K. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003. Ft. Lauderdale, Florida, USA, ACM Press: 724-725.
-
Lederer, S., Mankoff, J. and Dey, A. K. (2003). Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003. Ft. Lauderdale, Florida, USA, ACM Press: 724-725.
-
-
-
-
19
-
-
0038803998
-
A Tack in the Shoe: Neutralizing and Resisting the New Surveillance
-
Marx, G. T. (2003). A Tack in the Shoe: Neutralizing and Resisting the New Surveillance. J. Of Social Issues 59(2): 369-390.
-
(2003)
J. Of Social Issues
, vol.59
, Issue.2
, pp. 369-390
-
-
Marx, G.T.1
-
20
-
-
0036737236
-
Developing and Validating Trust Measures for E-Commerce: An Integrative Typology
-
McKnight, D. H., Choudhury, V. and Kacmar, C. (2002). Developing and Validating Trust Measures for E-Commerce: An Integrative Typology. Information Systems Research 13(3): 334-361.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 334-361
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
21
-
-
84869136735
-
-
Olson, J. S., Grudin, J. and Horvitz, E. (2005). A Study of Preferences for Sharing and Privacy. Ext. Abstracts of CHI '05. Portland, Oregon, ACM Press: 1985-1988.
-
Olson, J. S., Grudin, J. and Horvitz, E. (2005). A Study of Preferences for Sharing and Privacy. Ext. Abstracts of CHI '05. Portland, Oregon, ACM Press: 1985-1988.
-
-
-
-
22
-
-
77950314683
-
Uncovering Privacy Attitudes and Practices in Instant Messaging
-
Patil, S. and Kobsa, A. (2005). Uncovering Privacy Attitudes and Practices in Instant Messaging. In Proc. of GROUP '05, 109-112.
-
(2005)
Proc. of GROUP '05
, pp. 109-112
-
-
Patil, S.1
Kobsa, A.2
-
23
-
-
84861301596
-
Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application
-
Patil, S. and Lai, J. (2005). Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In Proc. of CHI'05, 101-110.
-
(2005)
Proc. of CHI'05
, pp. 101-110
-
-
Patil, S.1
Lai, J.2
-
24
-
-
33745878837
-
Need to Know: Examining Information Need in Location Disclosure
-
Reilly, D., Dearman, D., Ha, V., Smith, I. and Inkpen, K. (2006). "Need to Know": Examining Information Need in Location Disclosure. In Proc. of Pervasive 2006, 33-49.
-
(2006)
Proc. of Pervasive
, pp. 33-49
-
-
Reilly, D.1
Dearman, D.2
Ha, V.3
Smith, I.4
Inkpen, K.5
-
25
-
-
84869120875
-
-
Tarasewich, P., Gong, J. and Conlan, R. (2006). Protecting Private Data in Public. In Proc. of CHI 2006 (Ext. Abstracts), 1409-1414.
-
Tarasewich, P., Gong, J. and Conlan, R. (2006). Protecting Private Data in Public. In Proc. of CHI 2006 (Ext. Abstracts), 1409-1414.
-
-
-
-
26
-
-
32244434492
-
Gathering Evidence: Use of Visual Security Cues in Web Browsers
-
Whalen, T. and Inkpen, K. M. (2005). Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proc. of Graphic Interface 2005, 137-145.
-
(2005)
Proc. of Graphic Interface
, pp. 137-145
-
-
Whalen, T.1
Inkpen, K.M.2
|