-
1
-
-
26444547160
-
Privacy: Personal information, threats, and technologies
-
IEEE, Los Alamitos
-
Beckwith, R., Mainwaring, S.: Privacy: Personal information, threats, and technologies. In: Proc. ISTAS 2005, pp. 9-16. IEEE, Los Alamitos (2005)
-
(2005)
Proc. ISTAS
, pp. 9-16
-
-
Beckwith, R.1
Mainwaring, S.2
-
2
-
-
59249099442
-
Flowers or robot armies? Encouraging awareness & activity with personal, mobile displays
-
ACM Press, New York
-
Consolvo, S., Klasnja, P., McDonald, D.W., Avrahami, D., Froehlich, J., LeGrand, L., Libby, R., Mosher, K., Landay, J.: Flowers or robot armies? Encouraging awareness & activity with personal, mobile displays. In: Proc. UbiComp 2008, pp. 54-63. ACM Press, New York (2008)
-
(2008)
Proc. UbiComp
, pp. 54-63
-
-
Consolvo, S.1
Klasnja, P.2
McDonald, D.W.3
Avrahami, D.4
Froehlich, J.5
LeGrand, L.6
Libby, R.7
Mosher, K.8
Landay, J.9
-
3
-
-
35048898461
-
The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid
-
Dunlop, M.D, ed, Mobile HCI 2004, Springer, Heidelberg
-
Hayes, G.R., Patel, S.N., Truong, K.N., Iachello, G., Kientz, J.A., Farmer, R., Abowd, G.D.: The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid. In: Dunlop, M.D. (ed.) Mobile HCI 2004. LNCS, vol. 3160, pp. 168-179. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3160
, pp. 168-179
-
-
Hayes, G.R.1
Patel, S.N.2
Truong, K.N.3
Iachello, G.4
Kientz, J.A.5
Farmer, R.6
Abowd, G.D.7
-
4
-
-
35348823171
-
Physical, social, and experiential knowledge in pervasive computing environments
-
Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, A., Abowd, G., Truong, K.N.: Physical, social, and experiential knowledge in pervasive computing environments. IEEE Pervasive Computing 6(4), 56-63 (2007)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 56-63
-
-
Hayes, G.R.1
Poole, E.S.2
Iachello, G.3
Patel, S.N.4
Grimes, A.5
Abowd, G.6
Truong, K.N.7
-
5
-
-
33745842288
-
-
Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M.: Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In: Proc. CHI 2006, pp. 1009-1018. ACM Press, New York (2006)
-
Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M.: Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In: Proc. CHI 2006, pp. 1009-1018. ACM Press, New York (2006)
-
-
-
-
6
-
-
47249131693
-
-
Iachello, G., Abowd, G.: From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. In: ACM Transactions of CHI, 15(2), pp. 8:1-8:30 (2008)
-
Iachello, G., Abowd, G.: From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. In: ACM Transactions of CHI, vol. 15(2), pp. 8:1-8:30 (2008)
-
-
-
-
7
-
-
59249087086
-
An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies
-
ACM Press, New York
-
Nguyen, D., Kobsa, A., Hayes, G.: An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies. In: Proc. UbiComp 2008, pp. 182-191. ACM Press, New York (2008)
-
(2008)
Proc. UbiComp
, pp. 182-191
-
-
Nguyen, D.1
Kobsa, A.2
Hayes, G.3
-
9
-
-
34547536273
-
Capturing spontaneous conversation and social dynamics: A privacy sensitive data collection effort
-
Wyatt, D., Choudhury, T., Kautz, H.: Capturing spontaneous conversation and social dynamics: A privacy sensitive data collection effort. In: Proc. ICASSP (2007)
-
(2007)
Proc. ICASSP
-
-
Wyatt, D.1
Choudhury, T.2
Kautz, H.3
|