메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety

Author keywords

Direct and indirect stakeholders; Maturation; Mobile phones; Parenting technologies; Privacy; Safety; Security; Teenagers; Value dams and flows; Value Sensitive Design; Value tensions

Indexed keywords

DIRECT AND INDIRECT STAKEHOLDERS; MATURATION; PARENTING TECHNOLOGIES; PRIVACY; SAFETY; SECURITY; TEENAGERS; VALUE DAMS AND FLOWS; VALUE SENSITIVE DESIGN; VALUE TENSIONS;

EID: 77956249169     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837110.1837130     Document Type: Conference Paper
Times cited : (56)

References (39)
  • 2
  • 4
    • 33749608129 scopus 로고    scopus 로고
    • Profiles as conversation: Networked identity performance on friendster
    • January
    • D. Boyd and J. Heer. Profiles as conversation: Networked identity performance on Friendster. In HICSS-39, January 2006.
    • (2006) HICSS-39
    • Boyd, D.1    Heer, J.2
  • 5
    • 77956251588 scopus 로고    scopus 로고
    • BrickHouseSecurity.com. Cell phone spy, 2009. http://brickhousesecurity. com/cellphone-spy-simcardreader.html.
    • (2009) Cell Phone Spy
  • 10
    • 77954020097 scopus 로고    scopus 로고
    • Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
    • ACM Press
    • T. Denning, A. Borning, B. Friedman, B. Gill, T. Kohno, and W. H. Maisel. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proc. CHI 2010, pages 917-926. ACM Press, 2010.
    • (2010) Proc. CHI 2010 , pp. 917-926
    • Denning, T.1    Borning, A.2    Friedman, B.3    Gill, B.4    Kohno, T.5    Maisel, W.H.6
  • 16
    • 33750317326 scopus 로고    scopus 로고
    • Development of a privacy addendum for open source licenses: Value sensitive design in industry
    • B. Friedman, I. E. Smith, P. H. Kahn Jr., S. Consolvo, and J. Selawski. Development of a privacy addendum for open source licenses: Value Sensitive Design in industry. In Ubicomp, pages 194-211, 2006.
    • (2006) Ubicomp , pp. 194-211
    • Friedman, B.1    Smith, I.E.2    Kahn Jr., P.H.3    Consolvo, S.4    Selawski, J.5
  • 20
    • 3042824178 scopus 로고    scopus 로고
    • A framework for comparing perspectives on privacy and pervasive technologies
    • A. Jacobs and G. Abowd. A framework for comparing perspectives on privacy and pervasive technologies. In IEEE Pervasive Computing, volume 2, 2003.
    • (2003) IEEE Pervasive Computing , vol.2
    • Jacobs, A.1    Abowd, G.2
  • 21
    • 2442626985 scopus 로고    scopus 로고
    • Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
    • X. Jiang, J. I. Hong, and J. A. Landay. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In UbiComp, 2002.
    • (2002) UbiComp
    • Jiang, X.1    Hong, J.I.2    Landay, J.A.3
  • 24
    • 0017360990 scopus 로고    scopus 로고
    • The measurement of observer agreement for categorical data
    • J. Landis and G. Koch. The Measurement of Observer Agreement for Categorical Data. Biometrics, 33, 1977.
    • Biometrics , vol.33 , pp. 1977
    • Landis, J.1    Koch, G.2
  • 25
    • 33745674146 scopus 로고    scopus 로고
    • An efficient two-party public key cryptosystem secure against adaptive chosen ciphertext attack
    • P. MacKenzie. An efficient two-party public key cryptosystem secure against adaptive chosen ciphertext attack. In PKC, 2003.
    • (2003) PKC
    • MacKenzie, P.1
  • 26
    • 84869057324 scopus 로고    scopus 로고
    • Safe & sound: A wireless leash
    • ACM Press
    • N. Marmasse and C. Schmandt. Safe & sound: a wireless leash. In Ext. Abstracts CHI 2003, pages 726-727. ACM Press, 2003.
    • (2003) Ext. Abstracts CHI 2003 , pp. 726-727
    • Marmasse, N.1    Schmandt, C.2
  • 27
    • 70049114841 scopus 로고    scopus 로고
    • Value tensions in design: The value sensitive design, development, and appropriation of a corporation's groupware system
    • J. K. Miller, B. Friedman, and G. Jancke. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system. In GROUP, pages 281-290, 2007.
    • (2007) GROUP , pp. 281-290
    • Miller, J.K.1    Friedman, B.2    Jancke, G.3
  • 28
    • 0035031024 scopus 로고    scopus 로고
    • Cookies and web browser design: Toward realizing informed consent online
    • ACM Press
    • L. I. Millett, B. Friedman, and E. W. Felten. Cookies and web browser design: toward realizing informed consent online. In Proc. CHI 2001, pages 46-52. ACM Press, 2001.
    • (2001) Proc. CHI 2001 , pp. 46-52
    • Millett, L.I.1    Friedman, B.2    Felten, E.W.3
  • 32
    • 77956250826 scopus 로고    scopus 로고
    • Inc.
    • My Mobile Witness, Inc. My Mobile Witness(sm), 2008. http://www. mymobilewitness.com.
    • (2008) My Mobile Witness(sm)
  • 33
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. In IEEE Pervasive Computing, 2003.
    • (2003) IEEE Pervasive Computing
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 34
    • 35348883633 scopus 로고    scopus 로고
    • Value scenarios: A technique for envisioning systemic effects of new technologies
    • ACM Press
    • L. P. Nathan, P. V. Klasnja, and B. Friedman. Value scenarios: a technique for envisioning systemic effects of new technologies. In Ext. Abstracts CHI 2007, pages 2585-2590. ACM Press, 2007.
    • (2007) Ext. Abstracts CHI 2007 , pp. 2585-2590
    • Nathan, L.P.1    Klasnja, P.V.2    Friedman, B.3
  • 35
    • 77956240100 scopus 로고    scopus 로고
    • NaVee Technologies, LLC
    • NaVee Technologies, LLC. FreeFamilyWatch, 2008. http://www. freefamilywatch.com.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.