-
1
-
-
35348886910
-
Mobile Phones that Track Your Buddies
-
14 Nov, /Mobile+phones+that+ track+your+buddies/2100-1039_3-6135209. html
-
M. Reardon, "Mobile Phones that Track Your Buddies," CNET.com, 14 Nov. 2006, http://news.com.com/Mobile+phones+that+ track+your+buddies/2100-1039_3-6135209. html.
-
(2006)
CNET.com
-
-
Reardon, M.1
-
2
-
-
84861301596
-
Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application
-
ACM Press
-
S. Patil and J. Lai, "Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05), ACM Press, 2005, pp. 101-110.
-
(2005)
Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05)
, pp. 101-110
-
-
Patil, S.1
Lai, J.2
-
3
-
-
2542616812
-
The Quest for Personal Control over Mobile Location Privacy
-
Q. He, D. Wu, and P. Khosla, "The Quest for Personal Control over Mobile Location Privacy," IEEE Comm., vol. 42, no. 5, 2004, pp. 130-136.
-
(2004)
IEEE Comm
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
4
-
-
38049003038
-
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
-
Springer
-
A. Kapadia et al., "Virtual Walls: Protecting Digital Privacy in Pervasive Environments," Proc. 5th Int'l Conf. Pervasive Computing (Pervasive 07), Springer, 2007, pp. 162-179.
-
(2007)
Proc. 5th Int'l Conf. Pervasive Computing (Pervasive 07)
, pp. 162-179
-
-
Kapadia, A.1
-
5
-
-
19944367736
-
Personal Privacy through Understanding and Action: Five Pitfalls for Designers
-
Nov
-
S. Lederer, J. Hong, and A. Dey, "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, Nov. 2004, pp. 440-454.
-
(2004)
Personal and Ubiquitous Computing
, pp. 440-454
-
-
Lederer, S.1
Hong, J.2
Dey, A.3
-
6
-
-
1842538795
-
Privacy as Contextual Integrity
-
H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Rev., vol. 79, no. 1, 2004, pp. 119-158.
-
(2004)
Washington Law Rev
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.1
-
8
-
-
21644479537
-
Putting Systems into Place: A Qualitative Study of Design Requirements for Location-Aware Community Systems
-
ACM Press
-
Q. Jones et al., "Putting Systems into Place: A Qualitative Study of Design Requirements for Location-Aware Community Systems," Proc. ACM Conf. Computer Supported Cooperative Work (CSCW 04), ACM Press, 2004, pp. 202-211.
-
(2004)
Proc. ACM Conf. Computer Supported Cooperative Work (CSCW 04)
, pp. 202-211
-
-
Jones, Q.1
-
9
-
-
84949194428
-
Trust: A Collision of Paradigms
-
Proc. 5th Int'l Conf. Financial Cryptography FC 01, Springer
-
L.J. Camp, H. Nissenbaum, and C. McGrath. "Trust: A Collision of Paradigms," Proc. 5th Int'l Conf. Financial Cryptography (FC 01), LNCS 2339, Springer, 2002, pp. 91-105.
-
(2002)
LNCS
, vol.2339
, pp. 91-105
-
-
Camp, L.J.1
Nissenbaum, H.2
McGrath, C.3
-
10
-
-
84869078915
-
Who Wants to Know What When ? Privacy Preference Determinants in Ubiquitous Computing
-
ACM Press
-
S. Lederer, J. Mankoff, and A.K. Dey, "Who Wants to Know What When ? Privacy Preference Determinants in Ubiquitous Computing," Proc. Conf. Human Factors in Computing Systems (CHI 03), ACM Press, 2003, pp. 724-725.
-
(2003)
Proc. Conf. Human Factors in Computing Systems (CHI 03)
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
11
-
-
84861295423
-
Location Disclosure to Social Relations: Why, When and What People Want to Share
-
ACM Press
-
S. Consolvo et al., "Location Disclosure to Social Relations: Why, When and What People Want to Share," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05), ACM Press, 2005, pp. 81-90.
-
(2005)
Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05)
, pp. 81-90
-
-
Consolvo, S.1
-
12
-
-
17244370331
-
A Space for Place in Sociology
-
Aug
-
T.F. Gieryn, "A Space for Place in Sociology," Ann. Rev. of Sociology, Aug. 2000, pp. 463-496.
-
(2000)
Ann. Rev. of Sociology
, pp. 463-496
-
-
Gieryn, T.F.1
-
13
-
-
33646073434
-
Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service
-
Proc. Ubiquitous Computing UbiComp 05, Springer
-
G. Iachello et al., "Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service," Proc. Ubiquitous Computing (UbiComp 05), LNCS 3660, Springer, 2005, pp. 213-231.
-
(2005)
LNCS
, vol.3660
, pp. 213-231
-
-
Iachello, G.1
-
15
-
-
84858345700
-
Proc. 1st Workshop Wireless Network Measurements
-
WiNMee 05, Int'l Comm. Sciences and Technology Assoc
-
T. Henderson, D. Anthony, and D. Kotz, "Measuring Wireless Network Usage with the Experience Sampling Method," Proc. 1st Workshop Wireless Network Measurements (WiNMee 05), Int'l Comm. Sciences and Technology Assoc, 2005; www.winmee.org/ 2005/papers/WiNMee_Henderson.pdf.
-
(2005)
-
-
Henderson, T.1
Anthony, D.2
Kotz, D.3
|