-
1
-
-
54349106663
-
'How we fragment the world: View from inside versus view from outside'
-
Alexandrov, Y. (2008) 'How we fragment the world: view from inside versus view from outside', Social science information sur les sciences sociales 47 (3). 423-63.
-
(2008)
Social Science Information Sur Les Sciences Sociales
, vol.47
, Issue.3
, pp. 423-63
-
-
Alexandrov, Y.1
-
2
-
-
0000308434
-
'Position, role and status: A reformulation of concepts'
-
Bates, F. (1956) 'Position, role and status: a reformulation of concepts', Social forces 34 (4). 313-21.
-
(1956)
Social Forces
, vol.34
, Issue.4
, pp. 313-21
-
-
Bates, F.1
-
4
-
-
35048824687
-
'Laws, PETs and other technologies for privacy protection'
-
Borking, J. & Raab, C. (2001) 'Laws, PETs and other technologies for privacy protection', The journal of information, law and technology (JILT) 1: http://elj.warwick.ac.uk/jilt/01-1/borking.html/.
-
(2001)
The Journal of Information, Law and Technology (JILT)
, pp. 1
-
-
Borking, J.1
Raab, C.2
-
5
-
-
0002265515
-
Multifaceted analyses of chemyon ("social face"): An indigenous Korean perspective
-
K. Leung, U. Kim, S. Yamaguchi & Y. Kashima (eds) Singapore: John Wiley.
-
Choi, S.-C., Kim, U. & Kim, D.-I. (1997) 'Multifaceted analyses of chemyon ("social face"). an indigenous Korean perspective', in K. Leung, U. Kim, S. Yamaguchi & Y. Kashima (eds) Progress in Asian social psychology, vol.1: pp. 3-22. Singapore: John Wiley.
-
(1997)
Progress in Asian Social Psychology, vol.1
, pp. 3-22
-
-
Choi, S.-C.1
Kim, U.2
Kim, D.-I.3
-
6
-
-
54349094410
-
-
Laboratory of Design for Cognition, EDF R&D, Clamart, France.
-
Cicourel, A. & Lahlou, S. (2002) 'Technology, privacy, and limited capacity processing: a case study', Working paper, Laboratory of Design for Cognition, EDF R&D, Clamart, France.
-
(2002)
'Technology, Privacy, and Limited Capacity Processing: A Case Study'
-
-
Cicourel, A.1
Lahlou, S.2
-
7
-
-
84888301236
-
'The digital persona and its application to data surveillance'
-
Clarke, R. (1994) 'The digital persona and its application to data surveillance', The information society 10 (2). http://www.anu.edu.au/people/ Roger.Clarke/DV/DigPersona.html.
-
(1994)
The Information Society
, vol.10
, Issue.2
-
-
Clarke, R.1
-
8
-
-
0039838050
-
'Role playing vs role-taking'
-
Coutu, W. (1951) 'Role playing vs role-taking', American sociological review 16 (2). 180-7.
-
(1951)
American Sociological Review
, vol.16
, Issue.2
, pp. 180-7
-
-
Coutu, W.1
-
9
-
-
0038684367
-
-
Sebastopol, CA: O'Reilly & Associates.
-
Cranor, L. (2002) Web privacy with P3P. Sebastopol, CA: O'Reilly & Associates.
-
(2002)
Web Privacy with P3P
-
-
Cranor, L.1
-
10
-
-
80051981623
-
'How much is location privacy worth?'
-
Danezis, G., Lewis, S. & Anderson, R. (2005) 'How much is location privacy worth?', in Fourth Workshop on the Economics of Information Security, Kennedy School of Government, Harvard University, 2-3 June 2005. http://homes.esat.kuleuven.be/∼gdanezis/
-
Fourth Workshop on the Economics of Information Security
-
-
Danezis, G.1
Lewis, S.2
Anderson, R.3
-
12
-
-
0038376885
-
'MyLifeBits: Fulfilling the Memex vision'
-
Gemmell, J., Bell, G., Lueder, R., Drucker, S. & Wong, C. (2002) 'MyLifeBits: fulfilling the Memex vision', Proceedings of ACM multimedia'02, 1-6 December 2002, Juan-les-Pins. http://research.microsoft.com/barc/MediaPresence/ MyLifeBits.aspx
-
Proceedings of ACM multimedia'02
-
-
Gemmell, J.1
Bell, G.2
Lueder, R.3
Drucker, S.4
Wong, C.5
-
16
-
-
38149044180
-
An "object-use fingerprint": The use of electronic sensors for human identification
-
Conference Held at Innsbruck
-
Hodges, M. & Pollack, M. (2007) 'An "object-use fingerprint": the use of electronic sensors for human identification', in J. Krumm, G. D. Abowd, A. Seneviratne & T. Strang (eds) UbiComp 2007: ubiquitous computing 9th international conference, pp. 289-303. Conference held at Innsbruck, Austria, 16-19 September 2007. Berlin: Springer (Lecture notes in computer science).
-
UbiComp 2007: Ubiquitous Computing 9th International Conference
-
-
Hodges, M.1
Pollack, M.2
-
17
-
-
33646073434
-
'Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service'
-
Iachello, G., Smith, I., Consolvo, S., Abowd, G., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J. & Lamarca, A. (2005) 'Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service', in UbiComp 2005 proceedings, pp. 213-31. Berlin: Springer (Lecture notes in computer science).
-
UbiComp 2005 Proceedings
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Abowd, G.4
Hughes, J.5
Howard, J.6
Potter, F.7
Scott, J.8
Sohn, T.9
Hightower, J.10
Lamarca, A.11
-
19
-
-
54349108012
-
-
LDC, EDF. R&D, October 2003
-
Jegou, F., Lahlou, S., Langheinrich, M. & Lieberman, J. (2003) 'Design of privacy enhancing technology', EU Ambient Agoras IST-DC program report D15.3. LDC, EDF. R&D, October 2003.
-
(2003)
'Design of Privacy Enhancing Technology', EU Ambient Agoras IST-DC Program Report D15.3
-
-
Jegou, F.1
Lahlou, S.2
Langheinrich, M.3
Lieberman, J.4
-
20
-
-
77956159286
-
'User needs for location-aware mobile services'
-
Kaasinen, E. (2003) 'User needs for location-aware mobile services', Personal and ubiquitous computing 7 (1). 70-9.
-
(2003)
Personal and Ubiquitous Computing
, vol.7
, Issue.1
, pp. 70-9
-
-
Kaasinen, E.1
-
21
-
-
85016682337
-
'Privacy pseudonymity in user-adaptive systems'
-
Kobsa, A. & Schreck, J. (2003) 'Privacy pseudonymity in user-adaptive systems', ACM transactions on internet technology 3 (2). 149-83. http://www/ics.uci.edu/∼kobsa/papers/2003TOIT-kobsa.pdf
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.2
, pp. 149-83
-
-
Kobsa, A.1
Schreck, J.2
-
22
-
-
54349127488
-
'Computational location privacy: Present and future'
-
Krumm, J. (2007 a) 'Computational location privacy: present and future', Cognitive Technologies symposium: geolocation, psychological and social impacts, oral presentation, Fondation Maison des Sciences de l'Homme, Paris, 12 November 2007.
-
Cognitive Technologies Symposium: Geolocation, Psychological and Social Impacts, Oral Presentation
-
-
Krumm, J.1
-
24
-
-
0038708229
-
'Attracteurs cognitifs et travail de bureau'
-
Lahlou, S. (2000) 'Attracteurs cognitifs et travail de bureau', Intellectica 30: 75-113.
-
(2000)
Intellectica
, vol.30
, pp. 75-113
-
-
Lahlou, S.1
-
25
-
-
3242691191
-
Functional aspects of social representations
-
K. Deaux & G. Philogene (eds) Oxford: Blackwell.
-
Lahlou, S. (2001) 'Functional aspects of social representations', in K. Deaux & G. Philogene (eds) Representations of the social, pp. 131-46. Oxford: Blackwell.
-
(2001)
Representations of the Social
, pp. 131-46
-
-
Lahlou, S.1
-
28
-
-
14544292118
-
'Privacy and trust issues with disappearing computers'
-
Lahlou, S., Langheinrich, M. & Roecker, C. (2005) 'Privacy and trust issues with disappearing computers', Communications of the ACM 48 (3). 59-60.
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 59-60
-
-
Lahlou, S.1
Langheinrich, M.2
Roecker, C.3
-
29
-
-
0038322558
-
'Un cadre méthodologique pour le design des environnements augmentés'
-
Lahlou, S., Nosulenko, V. & Samoylenko, E. (2002) 'Un cadre méthodologique pour le design des environnements augmentés', Social science information sur les sciences sociales 41 (4). 471-530.
-
(2002)
Social Science Information Sur Les Sciences Sociales
, vol.41
, Issue.4
, pp. 471-530
-
-
Lahlou, S.1
Nosulenko, V.2
Samoylenko, E.3
-
30
-
-
84945556728
-
'Privacy by design - Principles of privacy-aware ubiquitous systems'
-
Berlin: Springer-Verlag (Lecture notes in computer science).
-
Langheinrich, M. (2001) 'Privacy by design - principles of privacy-aware ubiquitous systems', Ubicomp 2001, pp. 273-91. Berlin: Springer-Verlag (Lecture notes in computer science).
-
(2001)
Ubicomp
, vol.2001
, pp. 273-91
-
-
Langheinrich, M.1
-
31
-
-
54349108745
-
'The DC-privacy troubadour - Assessing privacy implications of DC-projects'
-
Langheinrich, M. (2003) 'The DC-privacy troubadour - assessing privacy implications of DC-projects', position paper for Tales of the Disappearing Computer conference, Santorini, Greece, 1-4 June 2003. http://www.vs.inf.ethz. ch/publ/papers/dctales-privacy.pdf
-
Position Paper for Tales of the Disappearing Computer Conference
-
-
Langheinrich, M.1
-
37
-
-
54349085701
-
'Say versus do; Building a trust framework through users' actions, not their words'
-
Nodder, C. (2003) 'Say versus do; building a trust framework through users' actions, not their words', workshop on Privacy at Ubicomp 2003, Seattle, Washington, September 2003. http://guir.berkeley.edu/pubs/ubicomp2003/ privacyworkshop/
-
Workshop on Privacy at Ubicomp 2003
-
-
Nodder, C.1
-
41
-
-
85044916535
-
'From privacy to visibility: Context, identity, and power in ubiquitous computing environments'
-
Phillips, D.J. (2005) 'From privacy to visibility: context, identity, and power in ubiquitous computing environments', Social text 23: 95-108.
-
(2005)
Social Text
, vol.23
, pp. 95-108
-
-
Phillips, D.J.1
-
42
-
-
0039084976
-
An economic theory of privacy
-
F. Schoeman (ed.) Cambridge: Cambridge University Press.
-
Posner, R.A. (1984) 'An economic theory of privacy', in F. Schoeman (ed.) Philosophical dimensions of privacy, pp. 333-45. Cambridge: Cambridge University Press.
-
(1984)
Philosophical Dimensions of Privacy
, pp. 333-45
-
-
Posner, R.A.1
-
43
-
-
54349095518
-
'Toward cybernetic-city: Sensonomy and location aware computing'
-
Rekimoto, J. (2007) 'Toward cybernetic-city: sensonomy and location aware computing', Cognitive Technologies symposium: geolocation, psychological and social impacts, oral presentation, Fondation Maison des Sciences de l'Homme, Paris, 12 November 2007.
-
Cognitive Technologies Symposium: Geolocation, Psychological and Social Impacts, Oral Presentation
-
-
Rekimoto, J.1
-
44
-
-
38049081172
-
'LifeTag: WiFi-based continuous location logging for life pattern analysis'
-
Location- and Context-Awareness third international symposium
-
Rekimoto, J., Miyaki, T. & Ishizawa, T. (2007) 'LifeTag: WiFi-based continuous location logging for life pattern analysis', in J. Hightower, B. Schiele & T. Strang (eds) Location- and Context-Awareness third international symposium, LoCA 2007, pp. 35-49. Proceedings of the conference at Oberpfaffenhofen, Germany, 20-1 September 2007. Berlin: Springer (Lecture notes in computer science series).
-
Proceedings of the Conference at Oberpfaffenhofen
-
-
Rekimoto, J.1
Miyaki, T.2
Ishizawa, T.3
-
50
-
-
0004016411
-
-
Hillsdale, NJ: Lawrence Erlbaum Associates.
-
Shank, R. & Abelson, R.P. (1977) Scripts, plans, goals, and understanding. Hillsdale, NJ: Lawrence Erlbaum Associates.
-
(1977)
Scripts, Plans, Goals, and Understanding
-
-
Shank, R.1
Abelson, R.P.2
-
52
-
-
54349104807
-
Act on the protection of personal data used in teleservices (Teleservices data protection act - Teledienstedatenschutzgesetz TDDSG) of 22 July 1997, amended last by Article 3 of the bill on legal framework conditions for electronic commerce
-
Tddsg (2001) Act on the protection of personal data used in teleservices (Teleservices data protection act - Teledienstedatenschutzgesetz TDDSG) of 22 July 1997, amended last by Article 3 of the bill on legal framework conditions for electronic commerce, German Federal Law Gazette 1: 3721: http://www.iid.de/iukdg/aktuelles/fassung_tddsg_eng.pdf.
-
(2001)
German Federal Law Gazette
, vol.1
, pp. 3721
-
-
Tddsg1
-
54
-
-
54349122231
-
'Attentive user interfaces: The surveillance and sousveillance of gaze-aware objects'
-
Vertegaal, R. & Shell, J.S. (2008) 'Attentive user interfaces: the surveillance and sousveillance of gaze-aware objects', Social science information sur les sciences sociales 47 (3). 275-98.
-
(2008)
Social Science Information Sur Les Sciences Sociales
, vol.47
, Issue.3
, pp. 275-98
-
-
Vertegaal, R.1
Shell, J.S.2
-
55
-
-
14544270833
-
'When cards come collecting - How Safeway's new discount cards can be used against you'
-
Vogel, J. (1998) 'When cards come collecting - how Safeway's new discount cards can be used against you', Seattle weekly 24-30 September.
-
(1998)
Seattle Weekly
-
-
Vogel, J.1
|