-
1
-
-
19944382845
-
Privacy in information technology: Designing to enable privacy policy management in organizations
-
Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies 63(1-2), 153-174 (2005)
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 153-174
-
-
Karat, J.1
Karat, C.-M.2
Brodie, C.3
Feng, J.4
-
2
-
-
34250753855
-
Intentional access management: Making access control usable for end-users
-
New York, NY, pp, ACM Press, New York
-
Cao, X., Iverson, L.: Intentional access management: Making access control usable for end-users. In: Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006), New York, NY, pp. 20-31. ACM Press, New York (2006)
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS
, pp. 20-31
-
-
Cao, X.1
Iverson, L.2
-
3
-
-
0038713945
-
Usability and privacy: A study of Kazaa P2P file-sharing
-
New York, NY, April, ACM Press, New York () 2003
-
Good, N.S., Krekelberg, A.: Usability and privacy: a study of Kazaa P2P file-sharing. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2003), New York, NY, April 2003, pp. 137-144. ACM Press, New York (2003)
-
(2003)
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
-
4
-
-
19944391032
-
Improving user-interface dependability through mitigation of human error
-
Maxion, R.A., Reeder, R.W.: Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies 63(1-2), 25-50 (2005)
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 25-50
-
-
Maxion, R.A.1
Reeder, R.W.2
-
5
-
-
33749617824
-
User interfaces for privacy agents
-
Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction 13(2), 135-178 (2006)
-
(2006)
ACM Transactions on Computer-Human Interaction
, vol.13
, Issue.2
, pp. 135-178
-
-
Cranor, L.F.1
Guduru, P.2
Arjula, M.3
-
6
-
-
85087242390
-
-
U.S. Senate Sergeant at Arms: Report on the investigation into improper access to the Senate Judiciary Committee's computer system (2004), available at http://judiciary.senate.gov/test imony.cfm?id=1085\&wit_id=2514
-
U.S. Senate Sergeant at Arms: Report on the investigation into improper access to the Senate Judiciary Committee's computer system (2004), available at http://judiciary.senate.gov/test imony.cfm?id=1085\&wit_id=2514
-
-
-
-
7
-
-
33745812093
-
Evaluating interfaces for privacy policy rule authoring
-
New York, NY, pp, ACM Press, New York
-
Karat, C.-M., Karat, J., Brodie, C., Feng, J.: Evaluating interfaces for privacy policy rule authoring. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2006), New York, NY, pp. 83-92. ACM Press, New York (2006)
-
(2006)
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI
, pp. 83-92
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
8
-
-
38049157384
-
-
Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB-CSD-03-1257, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1257.pdf
-
Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB-CSD-03-1257, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1257.pdf
-
-
-
-
9
-
-
19944418651
-
-
available at
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission 10-Nov-2003 (2003), available at http:www.w3.org/Submission/EPAL
-
(2003)
Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission 10-Nov-2003
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
10
-
-
84904310464
-
-
Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for anomaly discovery and rule editing. In: Marshall, A., Agoulmine, N. (eds.) MMNS 2003. LNCS, 2839, pp. 17-30. Springer, Heidelberg (2003)
-
Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for anomaly discovery and rule editing. In: Marshall, A., Agoulmine, N. (eds.) MMNS 2003. LNCS, vol. 2839, pp. 17-30. Springer, Heidelberg (2003)
-
-
-
-
11
-
-
38049159119
-
-
Ericsson, K.A., Simon, H.A.: Protocol Analysis: Verbal Reports as Data. Revised edn., MIT Press, Cambridge, MA (1993)
-
Ericsson, K.A., Simon, H.A.: Protocol Analysis: Verbal Reports as Data. Revised edn., MIT Press, Cambridge, MA (1993)
-
-
-
-
12
-
-
34250717425
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
-
New York, NY, July, ACM Press, New York () 2006
-
Brodie, C., Karat, C.M., Karat, J.: An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In: Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS 2006), New York, NY, July 2006, pp. 8-19. ACM Press, New York (2006)
-
(2006)
Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS
, pp. 8-19
-
-
Brodie, C.1
Karat, C.M.2
Karat, J.3
-
13
-
-
27644576852
-
Policy ratification
-
Los Alamitos, CA, June, IEEE Computer Society Press, Los Alamitos () 2005
-
Agrawal, D., Giles, J., Lee, K.-W., Lobo, J.: Policy ratification. In: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Los Alamitos, CA, June 2005, pp. 223-232. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY
, pp. 223-232
-
-
Agrawal, D.1
Giles, J.2
Lee, K.-W.3
Lobo, J.4
-
14
-
-
85088054290
-
Verification and change-impact analysis of access-control policies. In: ICSE
-
Los Alamitos
-
Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE 2005, pp. 196-205. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
196-205. IEEE Computer Society Press
, pp. 2005
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
15
-
-
37249076243
-
Towards everyday privacy for ubiquitous computing
-
Technical Report UCB-CSD-03-1283, University of California, Berkeley, Berkeley, CA , available at
-
Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., Mankoff, J.: Towards everyday privacy for ubiquitous computing. Technical Report UCB-CSD-03-1283, University of California, Berkeley, Berkeley, CA (2003), available at http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/CSD-03-1283.pdf
-
(2003)
-
-
Lederer, S.1
Hong, J.I.2
Jiang, X.3
Dey, A.K.4
Landay, J.A.5
Mankoff, J.6
-
16
-
-
38049111702
-
Web Privacy with P3P. O'Reilly
-
Sebastopol, CA 2002
-
Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol, CA (2002)
-
-
-
Cranor, L.F.1
-
17
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Los Alamitos, CA, May, IEEE Computer Society Press, Los Alamitos
-
Zurko, M.E., Simon, R., Sanfilippo, T.: A user-centered, modular authorization service built on an RBAC foundation. In: Proceedings 1999 IEEE Symposium on Security and Privacy, Los Alamitos, CA, May 1999, pp. 57-71. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proceedings 1999 IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
-
18
-
-
0025403275
-
Improving a human-computer dialogue
-
Molich, R., Nielsen, J.: Improving a human-computer dialogue. Communications of the ACM 33(3), 338-348 (1990)
-
(1990)
Communications of the ACM
, vol.33
, Issue.3
, pp. 338-348
-
-
Molich, R.1
Nielsen, J.2
-
19
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
Lederer, S., Hong, J., Dey, A.K., Landay, J.: Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440-454 (2004)
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.2
Dey, A.K.3
Landay, J.4
|