-
1
-
-
34249659475
-
Privacy issues and human-computer interaction
-
S. Garfinkel and L. Cranor, Eds. O'Reilly, Sebastopol, CA
-
ACKERMAN, M. S. AND MAINWARING, S. D. 2005. Privacy issues and human-computer interaction. In Security and Usability: Designing Secure Systems That People Can Use, S. Garfinkel and L. Cranor, Eds. O'Reilly, Sebastopol, CA, 381-400.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 381-400
-
-
ACKERMAN, M.S.1
MAINWARING, S.D.2
-
2
-
-
0001807712
-
Hanging on the 'wire: A field study of an audio-only media space
-
ACKERMAN, M. S., STARR, B., HINDUS, D., AND MAINWARING, S. D. 1997. Hanging on the 'wire: A field study of an audio-only media space. ACM Trans. Comput.-Hum. Interact. 4, 1.
-
(1997)
ACM Trans. Comput.-Hum. Interact. 4
, pp. 1
-
-
ACKERMAN, M.S.1
STARR, B.2
HINDUS, D.3
MAINWARING, S.D.4
-
3
-
-
0037299043
-
Understanding the differences between how novice and experienced designers aapproach design tasks
-
AHMED, S., WALLACE,K.,ANDBLESSING,L. 2003. Understanding the differences between how novice and experienced designers aapproach design tasks. Resear. Engin. Design 14, 1, 1-11.
-
(2003)
Resear. Engin. Design
, vol.14
, Issue.1
, pp. 1-11
-
-
AHMED, S.1
WALLACE, K.2
ANDBLESSING, L.3
-
5
-
-
0003508667
-
-
Brooks/Cole Publishing Company, Monterey, CA
-
ALTMAN, I. 1975. The Environment and Social Behavior - Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing Company, Monterey, CA.
-
(1975)
The Environment and Social Behavior - Privacy, Personal Space, Territory, Crowding
-
-
ALTMAN, I.1
-
6
-
-
84993894931
-
Privacy regulation: Culturally universal or culturally specific?
-
ALTMAN, I. 1977. Privacy regulation: Culturally universal or culturally specific?. J. Soc. Iss. 33, 3, 66-84.
-
(1977)
J. Soc. Iss
, vol.33
, Issue.3
, pp. 66-84
-
-
ALTMAN, I.1
-
7
-
-
47249099244
-
-
ASSOCIATION FOR COMPUTING MACHINERY
-
ASSOCIATION FOR COMPUTING MACHINERY. ACM code of ethics. http://www.acm.org/serving/ ethics.html.
-
ACM code of ethics
-
-
-
8
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
BASKERVILLE, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surv. 25, 4, 375-414.
-
(1993)
ACM Comput. Surv
, vol.25
, Issue.4
, pp. 375-414
-
-
BASKERVILLE, R.1
-
10
-
-
0001994942
-
-
BERLEUR, J. AND BRUNNSTEIN, K, Eds, Chapman & Hall, London, UK
-
BERLEUR, J. AND BRUNNSTEIN, K., Eds. 1996. Ethics of Computing: Codes, Spaces for Discussion and Law. Chapman & Hall, London, UK.
-
(1996)
Ethics of Computing: Codes, Spaces for Discussion and Law
-
-
-
11
-
-
0028096317
-
Software requirements as negotiated win conditions
-
IEEE Press
-
BOEHM, B. W., BOSE, P., HOROWITZ, E., AND LEE, M. J. 1994. Software requirements as negotiated win conditions. In Proceedings of the 1st International Conference on Requirements Engineering. IEEE Press, 74-83.
-
(1994)
Proceedings of the 1st International Conference on Requirements Engineering
, pp. 74-83
-
-
BOEHM, B.W.1
BOSE, P.2
HOROWITZ, E.3
LEE, M.J.4
-
12
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
ACM Press
-
CHUNG, E., HONG, J., LIN, J., PRABAKER, M., LANDAY, J., AND LIU, A. 2004. Development and evaluation of emerging design patterns for ubiquitous computing. In Proceedings of the Conference on Designing Interactive Systems. ACM Press, 233-242.
-
(2004)
Proceedings of the Conference on Designing Interactive Systems
, pp. 233-242
-
-
CHUNG, E.1
HONG, J.2
LIN, J.3
PRABAKER, M.4
LANDAY, J.5
LIU, A.6
-
13
-
-
84976717439
-
Scaling up: A research agenda for software engineering
-
COMPUTER SCIENCE AND TECHNOLOGY BOARD
-
COMPUTER SCIENCE AND TECHNOLOGY BOARD. 1990. Scaling up: A research agenda for software engineering. Com. ACM 33, 3, 281-293.
-
(1990)
Com. ACM
, vol.33
, Issue.3
, pp. 281-293
-
-
-
16
-
-
19944399587
-
Privacy, Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices
-
Tech. rep. UCI-ISR-05-1. Institute for Software Research, University of California at Irvine
-
DOURISH, P. AND ANDERSON, K. 2005. Privacy, Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices. Tech. rep. UCI-ISR-05-1. Institute for Software Research, University of California at Irvine.
-
(2005)
-
-
DOURISH, P.1
ANDERSON, K.2
-
18
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data
-
EU DIRECTIVE. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. Official Journal of the European Communities L281, 31-50.
-
(1995)
Official Journal of the European Communities
, vol.L281
, pp. 31-50
-
-
DIRECTIVE, E.1
-
19
-
-
47249091173
-
-
EUROPEAN COMMISSION ARTICLE 29 WORKING PARTY. 2004. Opinion 4/2004 on the Processing of Personal Data by Means of Video Surveillance. 11750/02/EN WP 89.
-
EUROPEAN COMMISSION ARTICLE 29 WORKING PARTY. 2004. Opinion 4/2004 on the Processing of Personal Data by Means of Video Surveillance. 11750/02/EN WP 89.
-
-
-
-
23
-
-
14844358964
-
Passive capture and ensuing issues for a personal lifetime store
-
ACM Press
-
GEMMELL, J., WILLIAMS, L., WOOD, K., LUEDER, R., AND BELL, G. 2004. Passive capture and ensuing issues for a personal lifetime store. In Proceedings of the ACM Workshop on Continous Archival and Retrieval of Personal Experiences (CARPE'04). ACM Press, 48-55.
-
(2004)
Proceedings of the ACM Workshop on Continous Archival and Retrieval of Personal Experiences (CARPE'04)
, pp. 48-55
-
-
GEMMELL, J.1
WILLIAMS, L.2
WOOD, K.3
LUEDER, R.4
BELL, G.5
-
24
-
-
34948898464
-
Lexis Nexis data breach far worse than reported
-
4/13/05
-
GREENE, T. C. 2005. Lexis Nexis data breach far worse than reported. The Register, 4/13/05.
-
(2005)
The Register
-
-
GREENE, T.C.1
-
25
-
-
35048898461
-
The personal audio loop: Designing a ubiquitous audio-based memory aid
-
Proceedings of Mobile HCI, Springer Verlag
-
HAYES, G. R., PATEL, S. N., TRUONG, K. N., IACHELLO, G., KIENTZ, J. A., FARMER, R., AND ABOWD, G. D. 2004. The personal audio loop: Designing a ubiquitous audio-based memory aid. In Proceedings of Mobile HCI. Lecture Notes in Computer Science, vol. 3160, Springer Verlag, 168-179.
-
(2004)
Lecture Notes in Computer Science
, vol.3160
, pp. 168-179
-
-
HAYES, G.R.1
PATEL, S.N.2
TRUONG, K.N.3
IACHELLO, G.4
KIENTZ, J.A.5
FARMER, R.6
ABOWD, G.D.7
-
26
-
-
8844249460
-
Assessing the human, social and environmental risks of pervasive computing
-
HILTY, L. M., SOM, C., AND KÖHLER, A. 2004. Assessing the human, social and environmental risks of pervasive computing. Hum. Ecolog. Risk Assess. 10, 853-874.
-
(2004)
Hum. Ecolog. Risk Assess
, vol.10
, pp. 853-874
-
-
HILTY, L.M.1
SOM, C.2
KÖHLER, A.3
-
29
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
ACM Press
-
HONG, J., NG, J. D., LEDERER, S., AND LANDAY, J. A. 2004. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the Symposium on Designing Interactive Systems (DIS'04). ACM Press, 91-100.
-
(2004)
Proceedings of the Symposium on Designing Interactive Systems (DIS'04)
, pp. 91-100
-
-
HONG, J.1
NG, J.D.2
LEDERER, S.3
LANDAY, J.A.4
-
30
-
-
36549045395
-
-
PhD Dissertation. College of Computing, Georgia Institute of Technology, Atlanta, GA
-
IACHELLO, G. 2006. Privacy and proportionality. PhD Dissertation. College of Computing, Georgia Institute of Technology, Atlanta, GA. http://etd.gatech.edu.
-
(2006)
Privacy and proportionality
-
-
IACHELLO, G.1
-
31
-
-
47249135894
-
An evaluation of the comprehensibility and usability of a design method for ubiquitous computing applications
-
GIT-GVU-05-32, Georgia Institute of Technology, Atlanta, GA
-
IACHELLO, G. AND ABOWD, G. D. 2005a. An evaluation of the comprehensibility and usability of a design method for ubiquitous computing applications. GVU Tech. rep. GIT-GVU-05-32, Georgia Institute of Technology, Atlanta, GA.
-
(2005)
GVU Tech. rep
-
-
IACHELLO, G.1
ABOWD, G.D.2
-
33
-
-
77953759665
-
Developing privacy guidelines for social location disclosure applications and services
-
ACM Press
-
IACHELLO, G., SMITH, I., CONSOLVO, S., CHEN, M., AND ABOWD, G. D. 2005. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). ACM Press, 65-76.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 65-76
-
-
IACHELLO, G.1
SMITH, I.2
CONSOLVO, S.3
CHEN, M.4
ABOWD, G.D.5
-
34
-
-
47249161422
-
Experience prototyping and sampling to evaluate ubicomp privacy in the real world
-
ACM Press
-
IACHELLO, G., TRUONG, K. N., ABOWD, G. D., HAYES, G. R., AND STEVENS, M. 2006. Experience prototyping and sampling to evaluate ubicomp privacy in the real world. In Proceedings of the Conference on Human Factors in Computer System (CHI'06). ACM Press.
-
(2006)
Proceedings of the Conference on Human Factors in Computer System (CHI'06)
-
-
IACHELLO, G.1
TRUONG, K.N.2
ABOWD, G.D.3
HAYES, G.R.4
STEVENS, M.5
-
35
-
-
47249121126
-
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000a. IS 15408: Common Criteria for Information Technology Security Evaluation.
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000a. IS 15408: Common Criteria for Information Technology Security Evaluation.
-
-
-
-
36
-
-
47249131926
-
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000b. IS 17799:2000 Information Technology - Code of Practice for Information Security Management.
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION/INTERNATIONAL ELECTROTECHNICAL COMMISSION 2000b. IS 17799:2000 Information Technology - Code of Practice for Information Security Management.
-
-
-
-
37
-
-
36549072774
-
-
PhD. Dissertation. Georgia Institute of Technology, College of Computing, Atlanta, GA
-
JENSEN, C. 2005. Designing for privacy in interactive systems. PhD. Dissertation. Georgia Institute of Technology, College of Computing, Atlanta, GA. http://etd.gatech.edu.
-
(2005)
Designing for privacy in interactive systems
-
-
JENSEN, C.1
-
38
-
-
47249098812
-
-
A structured analysis framework for privacy. GVU Tech. rep. 05-02. Georgia Institute of Technology, Atlanta, GA
-
JENSEN, C., TULLIO, J., POTTS, C., AND MYNATT, E. D. 2005. Strap: A structured analysis framework for privacy. GVU Tech. rep. 05-02. Georgia Institute of Technology, Atlanta, GA.
-
(2005)
Strap
-
-
JENSEN, C.1
TULLIO, J.2
POTTS, C.3
MYNATT, E.D.4
-
39
-
-
0036458261
-
Private and public digital domestic spaces
-
JUNESTRAND, S., KEIJER, U., AND TOLLMAR, K. 2001. Private and public digital domestic spaces. Int. J. Hum.-Comput. Studi. 54, 5, 753-778.
-
(2001)
Int. J. Hum.-Comput. Studi
, vol.54
, Issue.5
, pp. 753-778
-
-
JUNESTRAND, S.1
KEIJER, U.2
TOLLMAR, K.3
-
42
-
-
27644573327
-
Design rationale: The argument behind the artifact
-
ACM Press
-
MACLEAN, A., YOUNG, R. M., AND MORAN, T. P. 1989. Design rationale: The argument behind the artifact. In Proceedings of the Conference on Human Factors in Computing Systems (CHI'89). ACM Press, 247-252.
-
(1989)
Proceedings of the Conference on Human Factors in Computing Systems (CHI'89)
, pp. 247-252
-
-
MACLEAN, A.1
YOUNG, R.M.2
MORAN, T.P.3
-
44
-
-
0004284157
-
-
NIELSEN, J. AND MACK, R. L, Eds, John Wiley & Sons, New York, NY
-
NIELSEN, J. AND MACK, R. L., Eds. 1994. Usability Inspection Methods. John Wiley & Sons, New York, NY.
-
(1994)
Usability Inspection Methods
-
-
-
47
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
PALEN, L. AND DOURISH, P. 2003. Unpacking "privacy" for a networked world. CHI Lett. 5, 1, 129-136.
-
(2003)
CHI Lett
, vol.5
, Issue.1
, pp. 129-136
-
-
PALEN, L.1
DOURISH, P.2
-
48
-
-
35248872156
-
From privacy legislation to interface design: Implementing information privacy in human-computer interactions
-
Springer Verlag
-
PATRICK, A. S. AND KENNY, S. 2003. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. Lecture Notes in Computer Science, vol. 2760. Springer Verlag, 107-124.
-
(2003)
Lecture Notes in Computer Science
, vol.2760
, pp. 107-124
-
-
PATRICK, A.S.1
KENNY, S.2
-
49
-
-
47249165025
-
Consumer privacy attitudes: A major shift since 2000 and why
-
PRIVACY & AMERICAN BUSINESS
-
PRIVACY & AMERICAN BUSINESS 2003. Consumer privacy attitudes: A major shift since 2000 and why. Privacy Amer. Bus. News. 10, 6.
-
(2003)
Privacy Amer. Bus. News
, vol.10
, pp. 6
-
-
-
51
-
-
0034440052
-
A survey of design rationale systems: Approaches, representation capture and retrieval
-
REGLI, W. C., HU, X., ATWOOD, M., AND SUN, W. 2000. A survey of design rationale systems: Approaches, representation capture and retrieval. Eng. Comput. 16, 209-235.
-
(2000)
Eng. Comput
, vol.16
, pp. 209-235
-
-
REGLI, W.C.1
HU, X.2
ATWOOD, M.3
SUN, W.4
-
52
-
-
36549058537
-
The five most shocking things about the choice point debacle
-
5/01/05
-
SCALET, S. D. 2005. The five most shocking things about the choice point debacle. CSO Mag. 5/01/05.
-
(2005)
CSO Mag
-
-
SCALET, S.D.1
-
53
-
-
0036063961
-
Information management of automatic data capture: An overview of technical developments
-
SMITH, A. D. AND OFFODILE, F. 2002. Information management of automatic data capture: An overview of technical developments. Inform. Manag. Comput. Secur. 10, 3, 109-118.
-
(2002)
Inform. Manag. Comput. Secur
, vol.10
, Issue.3
, pp. 109-118
-
-
SMITH, A.D.1
OFFODILE, F.2
-
54
-
-
0026869935
-
Toward objective, systematic design-method comparisons
-
SONG, X. AND OSTERWEIL, L. J. 1992. Toward objective, systematic design-method comparisons. IEEE Softw. 9, 3, 43-53.
-
(1992)
IEEE Softw
, vol.9
, Issue.3
, pp. 43-53
-
-
SONG, X.1
OSTERWEIL, L.J.2
-
55
-
-
36549065994
-
On the effective use and reuse of HCI knowledge
-
J. M. Carroll, Ed. ACM Press
-
SUTCLIFFE, A. 2000. On the effective use and reuse of HCI knowledge. In Human-Computer Interaction in the New Millennium. J. M. Carroll, Ed. ACM Press, 3-29.
-
(2000)
Human-Computer Interaction in the New Millennium
, pp. 3-29
-
-
SUTCLIFFE, A.1
-
56
-
-
33646209527
-
-
TREASURY BOARD OF THE GOVERNMENT OF CANADA, Last accessed
-
TREASURY BOARD OF THE GOVERNMENT OF CANADA. 2002. Privacy impact assessment policy. http://www.tbs-sct.gc. ca/pubs_pol/ciopubs/pia-pefr/siglist_e.asp. Last accessed: 8/1/2006.
-
(2002)
Privacy impact assessment policy
, pp. 8-1
-
-
-
57
-
-
47249091648
-
-
UNITED STATES DEPARTMENT OF HEALTH EDUCATION AND WELFARE. 1973. Records, computers and the rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems.
-
UNITED STATES DEPARTMENT OF HEALTH EDUCATION AND WELFARE. 1973. Records, computers and the rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems.
-
-
-
-
58
-
-
35048817409
-
-
Springer Verlag
-
VEMURI, S., SCHMANDT, C., BENDER, W., TELLEX, S., AND LASSEY, B. 2004. An audio-based personal memory aid. Lecture Notes in Computer Science, vol. 3205, Springer Verlag, 400-417.
-
(2004)
An audio-based personal memory aid. Lecture Notes in Computer Science
, vol.3205
, pp. 400-417
-
-
VEMURI, S.1
SCHMANDT, C.2
BENDER, W.3
TELLEX, S.4
LASSEY, B.5
-
59
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
VENKATESH, V., MORRIS, M. G., DAVIS, G. B., AND DAVIS, F. D. 2003. User acceptance of information technology: Toward a unified view. MIS Quarterly 27, 3, 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
VENKATESH, V.1
MORRIS, M.G.2
DAVIS, G.B.3
DAVIS, F.D.4
|