-
1
-
-
24944459064
-
Social disclosure of place: From location technology to communication practices
-
G.D. Abowd Social disclosure of place: from location technology to communication practices Lecture Notes in Computer Science 3468 2005 134 151
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 134-151
-
-
Abowd, G.D.1
-
2
-
-
84900515472
-
Privacy in pervasive environments: Next generation labeling protocols
-
M.S. Ackeman Privacy in pervasive environments: next generation labeling protocols Personal and Ubiquitous Computing 8 6 2004 430 439
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 430-439
-
-
Ackeman, M.S.1
-
5
-
-
18844394838
-
XPref: A preference language for P3P
-
DOI 10.1016/j.comnet.2005.01.004, PII S1389128605000095, Web Traffic
-
R. Agrawal, J. Kiernan, R. Srikant, and Y.R. Xu XPref: a preference language for P3P Computer Networks 48 5 2005 809 827 (Pubitemid 40684163)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 809-827
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
7
-
-
16444368611
-
Privacy in e-commerce : Stated preferences vs. actual behavior
-
DOI 10.1145/1053291.1053295
-
B. Berendt, O. Ganther, and S. Spiekermann Privacy in e-commerce: stated preferences vs. actual behavior Communications of the ACM 48 4 2005 101 106 (Pubitemid 40475977)
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Gunther, O.2
Spiekermann, S.3
-
8
-
-
0001847769
-
Database marketing-new rules for policy and practice
-
F.V. Cespedes, and H.J. Smith Database marketing-new rules for policy and practice Sloan Management Review 34 4 1993 7 22
-
(1993)
Sloan Management Review
, vol.34
, Issue.4
, pp. 7-22
-
-
Cespedes, F.V.1
Smith, H.J.2
-
10
-
-
4544247079
-
Protocols for automated negotiations with buyer anonymity and seller reputations
-
L.F. Cranor, and P. Resnick Protocols for automated negotiations with buyer anonymity and seller reputations Netnomics 2 1 2000 1 23
-
(2000)
Netnomics
, vol.2
, Issue.1
, pp. 1-23
-
-
Cranor, L.F.1
Resnick, P.2
-
12
-
-
0001501223
-
How did they get my name-an exploratory investigation of consumer attitudes toward secondary information use
-
M.J. Culnan How did they get my name-an exploratory investigation of consumer attitudes toward secondary information use MIS Quarterly 17 3 1993 341 361
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-361
-
-
Culnan, M.J.1
-
13
-
-
0006364793
-
Context-aware computing: The CyberDesk project, AAAI 1998 Spring Symposium on Intelligent Environments
-
A.K. Dey Context-aware computing: the CyberDesk project, AAAI 1998 Spring Symposium on Intelligent Environments Technical Report SS-98-02 1998 51 54
-
(1998)
Technical Report SS-98-02
, pp. 51-54
-
-
Dey, A.K.1
-
14
-
-
24944432404
-
-
M. Duckham, and L. Kulik A Formal Model of Obfuscation and Negotiation for Location Privacy, Pervasive 2005, Munich, Germany 2005 152 170
-
(2005)
A Formal Model of Obfuscation and Negotiation for Location Privacy, Pervasive 2005, Munich, Germany
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
15
-
-
18544382993
-
Examining Internet privacy policies within the context of user privacy values
-
DOI 10.1109/TEM.2005.844927
-
J.B. Earp, A.I. Anton, L. Aiman-Smith, and W.H. Stufflebeam Examining internet privacy policies within the context of user privacy values IEEE Transactions on Engineering Management 52 2 2005 227 237 (Pubitemid 40654472)
-
(2005)
IEEE Transactions on Engineering Management
, vol.52
, Issue.2
, pp. 227-237
-
-
Earp, J.B.1
Anton, A.I.2
Aiman-Smith, L.3
Stufflebeam, W.H.4
-
17
-
-
33746587752
-
Enabling privacy management in ubiquitous computing environments through trust and reputation systems
-
J. Goecks, and E. Mynatt Enabling privacy management in ubiquitous computing environments through trust and reputation systems Proceedings of CSCW 2002, New Orleans, LA 2002
-
(2002)
Proceedings of CSCW 2002, New Orleans, la
-
-
Goecks, J.1
Mynatt, E.2
-
18
-
-
77953802502
-
Dynamic privacy management: A plug-in service for the middleware in pervasive computing
-
D. Hong, M. Yuan, and V.Y. Shen Dynamic privacy management: a plug-in service for the middleware in pervasive computing Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services, Salzburg, Austria 2005 1 8
-
(2005)
Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services, Salzburg, Austria
, pp. 1-8
-
-
Hong, D.1
Yuan, M.2
Shen, V.Y.3
-
20
-
-
2442557513
-
Modeling privacy control in context-aware systems
-
DOI 10.1109/MPRV.2002.1037723
-
X. Jiang, and J. Landay Modeling privacy control in context-aware systems IEEE Pervasive Computing 1 3 2002 59 63 (Pubitemid 44939973)
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.3
, pp. 59-63
-
-
Jiang, X.1
Landay, J.A.2
-
21
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
-
A. Josang, R. Ismail, and C. Boyd A survey of trust and reputation systems for online service provision Decision Support Systems 43 2 2007 618 644 (Pubitemid 46216533)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
22
-
-
33344479307
-
PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web
-
DOI 10.1016/j.is.2005.02.004, PII S0306437905000293, The Systematic Web and Web Services
-
D.N. Jutla, P. Bodorik, and Y.J. Zhang PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web Information Systems 31 4-5 2006 295 320 (Pubitemid 43290446)
-
(2006)
Information Systems
, vol.31
, Issue.4-5
, pp. 295-320
-
-
Jutla, D.N.1
Bodorik, P.2
Zhang, Y.3
-
24
-
-
36249020892
-
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents
-
D.J. Kim, D.L. Ferrin, and H.R. Rao A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents Decision Support Systems 44 2 2008 544 564
-
(2008)
Decision Support Systems
, vol.44
, Issue.2
, pp. 544-564
-
-
Kim, D.J.1
Ferrin, D.L.2
Rao, H.R.3
-
25
-
-
2342479832
-
Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping
-
O. Kwon, and N. Sadeh Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping Decision Support Systems 37 2 2004 199 213
-
(2004)
Decision Support Systems
, vol.37
, Issue.2
, pp. 199-213
-
-
Kwon, O.1
Sadeh, N.2
-
26
-
-
33744781785
-
The potential roles of context-aware computing technology in optimization-based intelligent decision-making
-
DOI 10.1016/j.eswa.2005.09.075, PII S0957417405002757
-
O. Kwon The potential roles of context-aware computing technology in optimization-based intelligent decision-making Expert Systems with Applications 31 3 2005 629 642 (Pubitemid 43831638)
-
(2006)
Expert Systems with Applications
, vol.31
, Issue.3
, pp. 629-642
-
-
Kwon, O.1
-
27
-
-
29144533004
-
Multi-agent system approach to context-aware coordinated web services under general market mechanism
-
DOI 10.1016/j.dss.2004.07.005, PII S0167923604001484
-
O. Kwon Multi-agent system approach to context-aware coordinated web services under general market mechanism Decision Support Systems 41 2 2006 380 399 (Pubitemid 41808443)
-
(2006)
Decision Support Systems
, vol.41
, Issue.2
, pp. 380-399
-
-
Kwon, O.1
-
28
-
-
33745053987
-
European disappearing computer privacy design guidelines V1.0. Ambient Agoras, Report D15.4
-
S. Lahlou, and F. Jegou European disappearing computer privacy design guidelines V1.0. Ambient Agoras, Report D15.4 Disappearing Computer Initiative Oct. 2003
-
(2003)
Disappearing Computer Initiative
-
-
Lahlou, S.1
Jegou, F.2
-
29
-
-
14544292118
-
Privacy and trust issues with invisible computers
-
DOI 10.1145/1047671.1047705
-
S. Lahlou, M. Langheinrich, and C. Rocker Privacy and trust issues with invisible computers Communications of the ACM 48 3 2005 59 60 (Pubitemid 40303807)
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 59-60
-
-
Lahlou, S.1
Langheinrich, M.2
Rocker, C.3
-
30
-
-
84945556728
-
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
-
Ubicomp 2001: Ubiquitous Computing
-
M. Langheinrich Privacy by design-principles of privacy-aware ubiquitous systems Proceedings of the Ubicomp 2001, Atlanta, GA 2001 273 291 (Pubitemid 33347314)
-
(2001)
Lecture Notes in Computer Science
, Issue.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
31
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
M. Langheinrich A privacy awareness system for ubiquitous computing environments Proceedings of the Ubicomp2002 2002 237 245
-
(2002)
Proceedings of the Ubicomp2002
, pp. 237-245
-
-
Langheinrich, M.1
-
32
-
-
35048824772
-
Privacy-Aware Mobile Agent: Protecting Privacy in Open Systems by Modelling Social Behaviour of Software Agents
-
Engineering Societies in the Agents World IV 4th International Workshop, ESAW 2003 London, UK, October 29-31, 2003 Revised Selected and Invited Papers
-
A.P. Meyer Privacy-aware mobile agent: protecting privacy in open systems by modelling social behaviour of software agents ESAW 2003, London, UK 2003 123 135 (Pubitemid 38945472)
-
(2004)
Lecture Notes in Computer Science
, Issue.3071
, pp. 123-135
-
-
Meyer, A.P.1
-
33
-
-
21344485586
-
Direct mail privacy-efficiency trade-offs within an implied social-contract framework
-
G.R. Milne, and M.E. Gordon Direct mail privacy-efficiency trade-offs within an implied social-contract framework Journal of Public Policy & Marketing 12 2 1993 206 215
-
(1993)
Journal of Public Policy & Marketing
, vol.12
, Issue.2
, pp. 206-215
-
-
Milne, G.R.1
Gordon, M.E.2
-
34
-
-
0142156637
-
The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness
-
UbiComp 2003: Ubiquitous Computing
-
C. Neustaedter, and S. Greenberg The design of a context-aware home media space for balancing privacy and awareness Lecture Notes in Computer Science 2864 2003 297 314 (Pubitemid 37312094)
-
(2003)
Lecture Notes in Computer Science
, Issue.2864
, pp. 297-314
-
-
Neustaedter, C.1
Greenberg, S.2
-
35
-
-
63449142665
-
An Anonymous Credential System and a Privacy-Aware PKI
-
Information Security and Privacy
-
P. Persiano, and I. Visconti An anonymous credential system and a privacy-aware PKI Lecture Notes in Computer Science 2727/2003 2003 27 38 (Pubitemid 36892620)
-
(2003)
Lecture Notes in Computer Science
, Issue.2727
, pp. 27-38
-
-
Persiano, P.1
Visconti, I.2
-
36
-
-
19944372788
-
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
-
DOI 10.1016/j.ijhcs.2005.04.008, PII S1071581905000662, HCI Research in Privacy and Security
-
B. Price, K. Adam, and B. Nuseibeh Keeping ubiquitous computing to yourself: a practical model for user control of privacy International Journal of Human Computer Studies 63 1-2 2005 228 253 (Pubitemid 40753500)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 228-253
-
-
Price, B.A.1
Adam, K.2
Nuseibeh, B.3
-
37
-
-
24944485226
-
A behavior characteristics-based reputation evaluation method for Grid entities
-
Advances in Grid Computing - EGC 2005: European Grid Conference, Revised Selected Papers
-
X. Qu, X. Yang, Y. Tang, and H. Zhou A behavior characteristics-based reputation evaluation method for grid entities Lecture Notes in Computer Science 3470 2005 567 577 (Pubitemid 41313238)
-
(2005)
Lecture Notes in Computer Science
, vol.3470
, pp. 567-577
-
-
Qu, X.1
Yang, X.2
Tang, Y.3
Zhou, H.4
-
39
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara Reputation systems Communications of the ACM 43 12 2000 45 48
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
40
-
-
0037341461
-
Pervasive computing: A paradigm for the 21st century
-
D. Saha, and A. Mukherjee Pervasive computing: a paradigm for the 21st century IEEE Computer 36 3 2003 25 31
-
(2003)
IEEE Computer
, vol.36
, Issue.3
, pp. 25-31
-
-
Saha, D.1
Mukherjee, A.2
-
41
-
-
0003311857
-
Bounded rationality and organizational learning
-
H. Simon Bounded rationality and organizational learning Organization Science 2 1 1991 125 134
-
(1991)
Organization Science
, vol.2
, Issue.1
, pp. 125-134
-
-
Simon, H.1
-
42
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
H.J. Smith, S.J. Milburg, and S.J. Burke Information privacy: measuring individuals' concerns about organizational practices MIS Quarterly 20 2 1996 167 196
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milburg, S.J.2
Burke, S.J.3
-
43
-
-
27344441997
-
Privacy-preserving surveillance using databases from daily life
-
L. Sweeney Privacy-preserving surveillance using databases from daily life IEEE Intelligent Systems 20 5 2000 83 (Pubitemid 41527277)
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 83-84
-
-
Sweeney, L.1
-
44
-
-
41149149582
-
Context-based market basket analysis in a multiple-store environment
-
K. Tang, Y.L. Chen, and H.W. Hu Context-based market basket analysis in a multiple-store environment Decision Support Systems 45 1 2008 150 163
-
(2008)
Decision Support Systems
, vol.45
, Issue.1
, pp. 150-163
-
-
Tang, K.1
Chen, Y.L.2
Hu, H.W.3
-
45
-
-
78049477689
-
-
The Feedback Forum, eBay
-
The Feedback Forum, eBay. http://pages.ebay.com/services/forum/feedback. html
-
-
-
-
47
-
-
78049483110
-
-
W3C http://www.w3.org/TandS/QL/QL98/pp/APPEL-QLW.html 1998
-
(1998)
W3C
-
-
-
48
-
-
0032010369
-
Consumer privacy concerns about Internet marketing
-
H. Wang, M.K.O. Lee, and C. Wang Consumer privacy concerns about Internet marketing Communications of the ACM 41 3 1988 63 70
-
(1988)
Communications of the ACM
, vol.41
, Issue.3
, pp. 63-70
-
-
Wang, H.1
Lee, M.K.O.2
Wang, C.3
-
49
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
M. Weiser Some computer science issues in ubiquitous computing Communications of the ACM 36 7 1993 75 84
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
50
-
-
27344433306
-
Homeland security
-
J. Yen, R. Popp, G. Cybenko, K.A. Taipale, L. Sweeny, and P. Rosenzweig Homeland security IEEE Intelligent Systems 20 5 2005 76 86 (Pubitemid 41527273)
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 76
-
-
Yen, J.1
Popp, R.2
|