-
1
-
-
35348903218
-
-
Abrams, M., M. P. Eisenhauer, and L.J. Sotto Letter to Federal Trade Commission. March 29, 2004. Re: alternative forms of privacy notices, project no. P034815. Hunton & Williams: The Center for Information Policy Leadership.
-
Abrams, M., M. P. Eisenhauer, and L.J. Sotto Letter to Federal Trade Commission. March 29, 2004. Re: alternative forms of privacy notices, project no. P034815. Hunton & Williams: The Center for Information Policy Leadership.
-
-
-
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1): 26-33.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
84858360184
-
Coalition, Anti Spyware Coalition Definitions and Supporting Documents
-
June 29, available at
-
Anti Spyware Coalition, Anti Spyware Coalition Definitions and Supporting Documents, Working Report (June 29, 2006), available at http://www. antispywarecoalition.org/documents/documents/ ASCDefinitionsWorkingReport20060622.pdf
-
(2006)
Working Report
-
-
Anti Spyware1
-
4
-
-
19944402322
-
-
AOL and National Cyber Security Alliance, October
-
AOL and National Cyber Security Alliance. 2004. AOL/NCSA online safety study, (October). http://www.security.iia.net.au/downloads/safety_study_v04.pdf
-
(2004)
AOL/NCSA online safety study
-
-
-
5
-
-
35348822490
-
-
Bellia, P. L. Spyware and the Limits of Surveillance Law, 20 Berkeley Tech. L.J. 1283 (2005)
-
Bellia, P. L. Spyware and the Limits of Surveillance Law, 20 Berkeley Tech. L.J. 1283 (2005)
-
-
-
-
7
-
-
35348927490
-
-
Blanke, J. M. Robust Notice and informed Consent: the Keys to Successful Spyware Legilsation, 7 Coum. Sci & Tech. L. Rev. 2 (2006)
-
Blanke, J. M. "Robust Notice" and "informed Consent:" the Keys to Successful Spyware Legilsation, 7 Coum. Sci & Tech. L. Rev. 2 (2006)
-
-
-
-
8
-
-
35348894997
-
-
Buenaventura, M. A. Teaching a Man to Fish: Why National Legislation Anchored in Notice and Consent Provisions is the Most Effective Solution to the Spyware Problem, 13 Rich. J.L. & Tech. 1 (2006)
-
Buenaventura, M. A. Teaching a Man to Fish: Why National Legislation Anchored in Notice and Consent Provisions is the Most Effective Solution to the Spyware Problem, 13 Rich. J.L. & Tech. 1 (2006)
-
-
-
-
9
-
-
84972893020
-
A Dendrite Method for Cluster Analysis
-
Calinski, R.B. and Harabasz, J. 1974. "A Dendrite Method for Cluster Analysis," Comm. in Statistics, vol. 3, pp. 1-27.
-
(1974)
Comm. in Statistics
, vol.3
, pp. 1-27
-
-
Calinski, R.B.1
Harabasz, J.2
-
10
-
-
0012376630
-
Beyond concern: Understanding net users' attitudes about online privacy
-
Ingo Vogelsang and Benjamin M. Compaine, eds, Cambridge, Massachusetts: The MIT Press, p
-
Cranor, L.F., J. Reagle, and M. S. Ackerman.1999. Beyond concern: Understanding net users' attitudes about online privacy. In Ingo Vogelsang and Benjamin M. Compaine, eds. The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy. Cambridge, Massachusetts: The MIT Press, p. 47-70
-
(1999)
The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy
, pp. 47-70
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
11
-
-
0038419136
-
Notification, disruption, and memory: Effects of messaging interruptions on memory and performance
-
Tokyo, Japan
-
Cutrell, E., M. Czerwinski, and E. Horvitz. 2001. Notification, disruption, and memory: Effects of messaging interruptions on memory and performance. Proceedings of Interact 2001: IFIP Conference on Human-Computer Interaction, Tokyo, Japan. http://research.microsoft.com/~cutrell/ interact2001messaging.pdf
-
(2001)
Proceedings of Interact 2001: IFIP Conference on Human-Computer Interaction
-
-
Cutrell, E.1
Czerwinski, M.2
Horvitz, E.3
-
12
-
-
33745816410
-
Why phishing works
-
Montréal, Québec, Canada, April 22, 27, ACM Press, New York, NY
-
Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). ACM Press, New York, NY, 581-590.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
14
-
-
84858345674
-
-
Federal Trade Commission, Monitoring Software on Your PC:, Adware, and Other Software
-
Federal Trade Commission, Monitoring Software on Your PC: Spyware, Adware, and Other Software, http:www.ftc.gov/os/2005/03/050307spywarerpt.pdf
-
Spyware
-
-
-
15
-
-
35348901992
-
-
Friedman, B., Howe, D., and Feiten, E. 2002. Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. In Proceedings of the 35th Annual Hawaii international Conference on System Sciences (Hicss'02)-8 - 8 (January 07 - 10, 2002). HICSS. IEEE Computer Society, Washington, DC, 247.
-
Friedman, B., Howe, D., and Feiten, E. 2002. Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. In Proceedings of the 35th Annual Hawaii international Conference on System Sciences (Hicss'02)-Volume 8 - Volume 8 (January 07 - 10, 2002). HICSS. IEEE Computer Society, Washington, DC, 247.
-
-
-
-
17
-
-
0038713945
-
-
Good, N. S. and Krekelberg, A. 2003. Usability and privacy: a study of KaZaA P2P file-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA, April 05 - 10, 2003). CHI '03. ACM Press, New York, NY, 137-144.
-
Good, N. S. and Krekelberg, A. 2003. Usability and privacy: a study of KaZaA P2P file-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA, April 05 - 10, 2003). CHI '03. ACM Press, New York, NY, 137-144.
-
-
-
-
18
-
-
77953767524
-
-
Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J. 2005. Stopping spyware at the gate: a user study of privacy, notice and spyware. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, 93. ACM Press, New York, NY, 43-52
-
Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J. 2005. Stopping spyware at the gate: a user study of privacy, notice and spyware. In Proceedings of the 2005 Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, vol. 93. ACM Press, New York, NY, 43-52
-
-
-
-
19
-
-
33745843365
-
Keeping up appearances: Understanding the dimensions of incidental information privacy
-
Montréal, Québec, Canada, April 22, 27, ACM Press, New York, NY
-
Hawkey, K. and Inkpen, K. M. 2006. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). ACM Press, New York, NY.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
-
-
Hawkey, K.1
Inkpen, K.M.2
-
21
-
-
33745812093
-
-
Karat, C., Karat, J., Brodie, C., and Feng, J. 2006. Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 83-92.
-
Karat, C., Karat, J., Brodie, C., and Feng, J. 2006. Evaluating interfaces for privacy policy rule authoring. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 83-92.
-
-
-
-
24
-
-
33748549923
-
Polaris: Virus-safe computing for Windows XP
-
Sep
-
Stiegler, M., Karp, A. H., Yee, K., Close, T., and Miller, M. S. 2006. Polaris: virus-safe computing for Windows XP. Commun. ACM 49, 9 (Sep. 2006), 83-88.
-
(2006)
Commun. ACM
, vol.49
, Issue.9
, pp. 83-88
-
-
Stiegler, M.1
Karp, A.H.2
Yee, K.3
Close, T.4
Miller, M.S.5
-
25
-
-
0038341777
-
Preparing to resume an interrupted task: Effects of prospective goal encoding and retrospective rehearsal
-
Trafton, J. G., E. M. Altmann, D. P. Brock, and F. E. Mintz. 2003. Preparing to resume an interrupted task: Effects of prospective goal encoding and retrospective rehearsal. International Journal of Human Computer Studies 58(4): 583-603.
-
(2003)
International Journal of Human Computer Studies
, vol.58
, Issue.4
, pp. 583-603
-
-
Trafton, J.G.1
Altmann, E.M.2
Brock, D.P.3
Mintz, F.E.4
-
26
-
-
84877016599
-
Scope: Providing awareness of multiple notifications at a glance
-
Trento, Italy
-
Van Dantzich, M., R. Daniel, E. Horvitz, and M. Czerwinski. 2002. Scope: Providing awareness of multiple notifications at a glance. Proceedings of Advanced Visual Interfaces 2002, Trento, Italy.
-
(2002)
Proceedings of Advanced Visual Interfaces
-
-
Van Dantzich, M.1
Daniel, R.2
Horvitz, E.3
Czerwinski, M.4
-
27
-
-
35348826145
-
-
Vila, T., R. Greenstadt, and D. Molnar. 2004. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In Economics of Information Security. 12 of Advances in Information Security, eds. L.J. Camp and S. Lewis, 143-154. Boston: Kluwer Academic Publishers.
-
Vila, T., R. Greenstadt, and D. Molnar. 2004. Why we can't be bothered to read privacy policies: Models of privacy economics as a lemons market. In Economics of Information Security. Vol 12 of Advances in Information Security, eds. L.J. Camp and S. Lewis, 143-154. Boston: Kluwer Academic Publishers.
-
-
-
-
28
-
-
35348844022
-
-
Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. Davis L. Rev 1545 (2006)
-
Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. Davis L. Rev 1545 (2006)
-
-
-
-
29
-
-
35348910183
-
-
Winn, J. Contracting Spyware by Contract, 20 Berkeley Tech. L.J. 1345 (2005)
-
Winn, J. Contracting Spyware by Contract, 20 Berkeley Tech. L.J. 1345 (2005)
-
-
-
|