-
2
-
-
33746889004
-
The watcher and the watched: Social judgments about privacy in a public place
-
B. F. Batya, P. H. Kahn Jr., J. Hagman, R. L. Severson, and B. Gill. The watcher and the watched: social judgments about privacy in a public place. Human Computer Interaction, 21(2):235-272, 2006.
-
(2006)
Human Computer Interaction
, vol.21
, Issue.2
, pp. 235-272
-
-
Batya, B.F.1
Kahn Jr., P.H.2
Hagman, J.3
Severson, R.L.4
Gill, B.5
-
4
-
-
33749608129
-
Profiles as conversation: Networked identity performance on friendster
-
January
-
D. Boyd and J. Heer. Profiles as conversation: Networked identity performance on Friendster. In HICSS-39, January 2006.
-
(2006)
HICSS-39
-
-
Boyd, D.1
Heer, J.2
-
5
-
-
77956251588
-
-
BrickHouseSecurity.com. Cell phone spy, 2009. http://brickhousesecurity. com/cellphone-spy-simcardreader.html.
-
(2009)
Cell Phone Spy
-
-
-
7
-
-
84857066817
-
Panic passwords: Authenticating under duress
-
Berkeley, CA, USA USENIX Association
-
J. Clark and U. Hengartner. Panic passwords: authenticating under duress. In HOTSEC'08: Proceedings of the 3rd conference on Hot topics in security, pages 1-6, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
HOTSEC'08: Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 1-6
-
-
Clark, J.1
Hengartner, U.2
-
8
-
-
33749387098
-
Simulations for urban planning: Designing for human values
-
J. Davis, P. Lin, A. Borning, B. Friedman, P. H. Kahn Jr., and P. A. Waddell. Simulations for urban planning: Designing for human values. Computer, 39:66-72, 2006.
-
(2006)
Computer
, vol.39
, pp. 66-72
-
-
Davis, J.1
Lin, P.2
Borning, A.3
Friedman, B.4
Kahn Jr., P.H.5
Waddell, P.A.6
-
10
-
-
77954020097
-
Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices
-
ACM Press
-
T. Denning, A. Borning, B. Friedman, B. Gill, T. Kohno, and W. H. Maisel. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proc. CHI 2010, pages 917-926. ACM Press, 2010.
-
(2010)
Proc. CHI 2010
, pp. 917-926
-
-
Denning, T.1
Borning, A.2
Friedman, B.3
Gill, B.4
Kohno, T.5
Maisel, W.H.6
-
14
-
-
33749395687
-
Value sensitive design and information systems: Three case studies
-
M.E. Sharpe, Armonk, NY
-
B. Friedman, P. H. Kahn Jr., and A. Borning. Value Sensitive Design and information systems: Three case studies. In Human-Computer Interaction and Management Information Systems: Foundations. M.E. Sharpe, Armonk, NY, 2006.
-
(2006)
Human-Computer Interaction and Management Information Systems: Foundations
-
-
Friedman, B.1
Kahn Jr., P.H.2
Borning, A.3
-
16
-
-
33750317326
-
Development of a privacy addendum for open source licenses: Value sensitive design in industry
-
B. Friedman, I. E. Smith, P. H. Kahn Jr., S. Consolvo, and J. Selawski. Development of a privacy addendum for open source licenses: Value Sensitive Design in industry. In Ubicomp, pages 194-211, 2006.
-
(2006)
Ubicomp
, pp. 194-211
-
-
Friedman, B.1
Smith, I.E.2
Kahn Jr., P.H.3
Consolvo, S.4
Selawski, J.5
-
19
-
-
33750337486
-
Developing privacy guidelines for social location disclosure applications and services
-
G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. Abowd. Developing privacy guidelines for social location disclosure applications and services. In Symposium on Usable Privacy and Security, 2005.
-
(2005)
Symposium on Usable Privacy and Security
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Chen, M.4
Abowd, G.5
-
20
-
-
3042824178
-
A framework for comparing perspectives on privacy and pervasive technologies
-
A. Jacobs and G. Abowd. A framework for comparing perspectives on privacy and pervasive technologies. In IEEE Pervasive Computing, volume 2, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
-
-
Jacobs, A.1
Abowd, G.2
-
21
-
-
2442626985
-
Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
-
X. Jiang, J. I. Hong, and J. A. Landay. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In UbiComp, 2002.
-
(2002)
UbiComp
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.A.3
-
23
-
-
24944559058
-
Place lab: Device positioning using radio beacons in the wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place Lab: Device positioning using radio beacons in the wild. In Pervasive Computing, 2005.
-
(2005)
Pervasive Computing
-
-
LaMarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
Scott, J.6
Sohn, T.7
Howard, J.8
Hughes, J.9
Potter, F.10
Tabert, J.11
Powledge, P.12
Borriello, G.13
Schilit, B.14
-
24
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
J. Landis and G. Koch. The Measurement of Observer Agreement for Categorical Data. Biometrics, 33, 1977.
-
Biometrics
, vol.33
, pp. 1977
-
-
Landis, J.1
Koch, G.2
-
25
-
-
33745674146
-
An efficient two-party public key cryptosystem secure against adaptive chosen ciphertext attack
-
P. MacKenzie. An efficient two-party public key cryptosystem secure against adaptive chosen ciphertext attack. In PKC, 2003.
-
(2003)
PKC
-
-
MacKenzie, P.1
-
26
-
-
84869057324
-
Safe & sound: A wireless leash
-
ACM Press
-
N. Marmasse and C. Schmandt. Safe & sound: a wireless leash. In Ext. Abstracts CHI 2003, pages 726-727. ACM Press, 2003.
-
(2003)
Ext. Abstracts CHI 2003
, pp. 726-727
-
-
Marmasse, N.1
Schmandt, C.2
-
27
-
-
70049114841
-
Value tensions in design: The value sensitive design, development, and appropriation of a corporation's groupware system
-
J. K. Miller, B. Friedman, and G. Jancke. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system. In GROUP, pages 281-290, 2007.
-
(2007)
GROUP
, pp. 281-290
-
-
Miller, J.K.1
Friedman, B.2
Jancke, G.3
-
28
-
-
0035031024
-
Cookies and web browser design: Toward realizing informed consent online
-
ACM Press
-
L. I. Millett, B. Friedman, and E. W. Felten. Cookies and web browser design: toward realizing informed consent online. In Proc. CHI 2001, pages 46-52. ACM Press, 2001.
-
(2001)
Proc. CHI 2001
, pp. 46-52
-
-
Millett, L.I.1
Friedman, B.2
Felten, E.W.3
-
32
-
-
77956250826
-
-
Inc.
-
My Mobile Witness, Inc. My Mobile Witness(sm), 2008. http://www. mymobilewitness.com.
-
(2008)
My Mobile Witness(sm)
-
-
-
33
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. In IEEE Pervasive Computing, 2003.
-
(2003)
IEEE Pervasive Computing
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
34
-
-
35348883633
-
Value scenarios: A technique for envisioning systemic effects of new technologies
-
ACM Press
-
L. P. Nathan, P. V. Klasnja, and B. Friedman. Value scenarios: a technique for envisioning systemic effects of new technologies. In Ext. Abstracts CHI 2007, pages 2585-2590. ACM Press, 2007.
-
(2007)
Ext. Abstracts CHI 2007
, pp. 2585-2590
-
-
Nathan, L.P.1
Klasnja, P.V.2
Friedman, B.3
-
35
-
-
77956240100
-
-
NaVee Technologies, LLC
-
NaVee Technologies, LLC. FreeFamilyWatch, 2008. http://www. freefamilywatch.com.
-
(2008)
-
-
-
39
-
-
50049118379
-
Analysis on the prospects of parent-adolescent communication served by mobile technology
-
Washington, DC, USA IEEE Computer Society
-
S. Yang, Q. Li, X. Wang, Y. Li, and R. Huang. Analysis on the prospects of parent-adolescent communication served by mobile technology. In WMUTE '08: Proceedings of the Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education, pages 213-215, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
WMUTE '08: Proceedings of the Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education
, pp. 213-215
-
-
Yang, S.1
Li, Q.2
Wang, X.3
Li, Y.4
Huang, R.5
|