-
1
-
-
38149087860
-
Privacy and Rationality: Preliminary Evidence from Pilot Data
-
Acquisti, A. and Grossklags, J. Privacy and Rationality: Preliminary Evidence from Pilot Data. In Proc. WEIS 2004.
-
(2004)
Proc. WEIS
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
2342484676
-
Location-based services for mobile telephony: A study of users' privacy concerns
-
Barkhuus, L., Dey, A.K. Location-based services for mobile telephony: a study of users' privacy concerns. In Proc. Interact 2003, (2003) 709-712.
-
(2003)
In Proc. Interact 2003
, pp. 709-712
-
-
Barkhuus, L.1
Dey, A.K.2
-
4
-
-
84865637483
-
A privacy paradox: Social networking in the United States
-
Barnes, S. A privacy paradox: Social networking in the United States. First Monday 10, 9 (2006).
-
(2006)
First Monday
, vol.10
, pp. 9
-
-
Barnes, S.1
-
5
-
-
0002131454
-
Design for Privacy in Ubiquitous Computing Environments
-
Kluwer
-
Bellotti, V. and Sellen, A. Design for Privacy in Ubiquitous Computing Environments. In Proc. ECSCW 1993, Kluwer (1993), 77-92.
-
(1993)
Proc. ECSCW
, pp. 77-92
-
-
Bellotti, V.1
Sellen, A.2
-
6
-
-
0003062691
-
What You Don't Know Can Hurt You: Privacy in Collaborative Computing
-
ACM Press
-
Bellotti, V. What You Don't Know Can Hurt You: Privacy in Collaborative Computing. In Proc. HCI on People and Computers XI, ACM Press (1996), 241-261.
-
(1996)
Proc. HCI on People and Computers
, vol.11
, pp. 241-261
-
-
Bellotti, V.1
-
7
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
ACM Press
-
Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: why, when, & what people want to share. In Proc. CHI 2005, ACM Press (2005), 81-90.
-
(2005)
Proc. CHI
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
8
-
-
84858371130
-
-
Flickr-http://flickr.com
-
-
-
-
9
-
-
14844358964
-
Passive capture and ensuing issues for a personal lifetime store
-
ACM Press
-
Gemmell, J., Williams, L., Wood, K., Lueder, R., and Bell, G. Passive capture and ensuing issues for a personal lifetime store. In Proc. CARPE 2004, ACM Press (2004), 48-55.
-
(2004)
Proc. CARPE
, pp. 48-55
-
-
Gemmell, J.1
Williams, L.2
Wood, K.3
Lueder, R.4
Bell, G.5
-
10
-
-
0038713945
-
Usability and privacy: A study of Kazaa P2P file-sharing
-
ACM Press
-
Good, N. S. and Krekelberg, A. Usability and privacy: a study of Kazaa P2P file-sharing. In Proc. CHI '03. ACM Press (2003), 137-144
-
(2003)
Proc. CHI '03
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
-
11
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
Gruteser, M. and Grunwald, D. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl. 10, 3 (2005), 315-325.
-
(2005)
Mob. Netw. Appl
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
12
-
-
85092924851
-
Privacy-aware location sensor networks
-
Gruteser, M., Schelle, G., Jain, A., and Grunwald. D. Privacy-aware location sensor networks. In Proc. HotOS 2003, (2003).
-
(2003)
Proc. HotOS
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Grunwald, D.4
-
13
-
-
20444440033
-
Privacy management for portable recording devices
-
ACM Press
-
Halderman, J. A., Waters, B., and Felten, E. W. Privacy management for portable recording devices. In Proc. WPES 2004, ACM Press (2004), 16-24.
-
(2004)
Proc. WPES
, pp. 16-24
-
-
Halderman, J.A.1
Waters, B.2
Felten, E.W.3
-
14
-
-
33745843365
-
Keeping up appearances: Understanding the dimensions of incidental information privacy
-
ACM Press
-
Hawkey, K. and Inkpen, K. M. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proc. CHI 2006, ACM Press, 821-830.
-
(2006)
Proc. CHI
, pp. 821-830
-
-
Hawkey, K.1
Inkpen, K.M.2
-
15
-
-
33745842288
-
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
-
ACM Press
-
Iachello, G., Truong, K. N., Abowd, G. D., Hayes, G. R., and Stevens, M. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In Proc. CHI 2006, ACM Press, 1009-1018.
-
(2006)
Proc. CHI
, pp. 1009-1018
-
-
Iachello, G.1
Truong, K.N.2
Abowd, G.D.3
Hayes, G.R.4
Stevens, M.5
-
16
-
-
33644616367
-
-
MIT Press
-
Ito, M., Okabe, D., and Matsuda, M. Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. MIT Press (2005).
-
(2005)
Personal, Portable, Pedestrian: Mobile Phones in Japanese Life
-
-
Ito, M.1
Okabe, D.2
Matsuda, M.3
-
18
-
-
2342620647
-
Enabling Context-Aware and Privacy-Conscious User Data Sharing
-
IEEE
-
Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P. F., Sahuguet, A., Varadarajan, S. and Vyas A. Enabling Context-Aware and Privacy-Conscious User Data Sharing. In Proc. MDM 2004, IEEE (2004), 187-198.
-
(2004)
Proc. MDM
, pp. 187-198
-
-
Hull, R.1
Kumar, B.2
Lieuwen, D.3
Patel-Schneider, P.F.4
Sahuguet, A.5
Varadarajan, S.6
Vyas, A.7
-
19
-
-
19944404729
-
The Ubiquitous Camera: An In-depth Study of Cameraphone Use
-
Kindberg, T., Spasojevic, M., Fleck, R. and Sellen, A. The Ubiquitous Camera: An In-depth Study of Cameraphone Use. IEEE Pervasive Comp. 4, 2 (2005), 42-50.
-
IEEE Pervasive Comp. 4, 2 (2005), 42-50
-
-
Kindberg, T.1
Spasojevic, M.2
Fleck, R.3
Sellen, A.4
-
20
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers. Personal Ubiquitous
-
Nov
-
Lederer, S., Hong, I., Dey, K. and Landay, A. Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing. 8, 6 (Nov. 2004), 440-454.
-
(2004)
Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, I.2
Dey, K.3
Landay, A.4
-
21
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
ACM Press
-
Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. CHI 2003, ACM Press (2003), 129-136.
-
(2003)
Proc. CHI
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
22
-
-
84861301596
-
Who gets to know what when: Configuring privacy permissions in an awareness application
-
ACM Press
-
Patil, S. and Lai, J. Who gets to know what when: configuring privacy permissions in an awareness application. In Proc. CHI 2005, ACM Press (2005), 101-110.
-
(2005)
Proc. CHI
, pp. 101-110
-
-
Patil, S.1
Lai, J.2
-
23
-
-
0141436246
-
Stated Privacy Preferences versus Actual Behaviour in EC environments: A Reality Check
-
Spiekermann, S., Grossklags, J., Berendt, B. Stated Privacy Preferences versus Actual Behaviour in EC environments: a Reality Check. In Proc. WI-IF 2001.
-
(2001)
Proc. WI-IF
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
24
-
-
37249010231
-
An Evaluation of Identity-Sharing Behavior in Social Network Communities
-
Stutzman, F. An Evaluation of Identity-Sharing Behavior in Social Network Communities. In Proc. iDMAa and IMS Code Conference, 2006.
-
(2006)
Proc. iDMAa and IMS Code Conference
-
-
Stutzman, F.1
-
25
-
-
33745836765
-
Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
-
ACM Press
-
Tang, K. P., Keyani, P., Fogarty, J., and Hong, J. I. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proc. CHI 2006, ACM Press (2006), 93-102.
-
(2006)
Proc. CHI
, pp. 93-102
-
-
Tang, K.P.1
Keyani, P.2
Fogarty, J.3
Hong, J.I.4
-
26
-
-
84869103020
-
The uses of personal networked digital imaging: An empirical study of cameraphone photos and sharing. In Ext
-
ACM Press
-
van House, N., Davis, M., Ames, M., Finn, M., and Viswanathan, V. The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing. In Ext. Abstracts CHI 2006, ACM Press (2006), 1853-1856.
-
(2006)
Abstracts CHI 2006
, pp. 1853-1856
-
-
van House, N.1
Davis, M.2
Ames, M.3
Finn, M.4
Viswanathan, V.5
-
27
-
-
1142268291
-
Economic Aspects of personal privacy. In Privacy and Self-Regulation in the Information Age
-
Varian, H. Economic Aspects of personal privacy. In Privacy and Self-Regulation in the Information Age, NTIA report (1996).
-
(1996)
NTIA report
-
-
Varian, H.1
|