메뉴 건너뛰기




Volumn , Issue , 2010, Pages 55-58

Hide and seek: Location sharing practices with social media

Author keywords

location sharing; privacy; social network

Indexed keywords

ONLINE SOCIAL NETWORKS; PRIVACY; PRIVACY CONCERNS; SOCIAL MEDIA; SOCIAL NETWORKS;

EID: 78249241507     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1851600.1851612     Document Type: Conference Paper
Times cited : (22)

References (12)
  • 3
    • 84861295423 scopus 로고    scopus 로고
    • Location disclosure to social relations: Why, when, & what people want to share
    • Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. (2005). Location disclosure to social relations: why, when, & what people want to share. CHI 2005, 81-90.
    • (2005) CHI 2005 , pp. 81-90
    • Consolvo, S.1    Smith, I.E.2    Matthews, T.3    LaMarca, A.4    Tabert, J.5    Powledge, P.6
  • 4
    • 4544259863 scopus 로고    scopus 로고
    • An architecture for privacy-sensitive ubiquitous computing
    • Hong, J. I. and Landay, J. A. (2004) An architecture for privacy-sensitive ubiquitous computing. MobiSys '04, 177-189.
    • (2004) MobiSys '04 , pp. 177-189
    • Hong, J.I.1    Landay, J.A.2
  • 5
    • 77956159286 scopus 로고    scopus 로고
    • User needs for location-aware mobile services
    • Kaasinen, E. (2003). User needs for location-aware mobile services. Personal and Ubiquitous Computing 7, 1, 70-79.
    • (2003) Personal and Ubiquitous Computing , vol.7 , Issue.1 , pp. 70-79
    • Kaasinen, E.1
  • 6
    • 70349246372 scopus 로고    scopus 로고
    • User-controllable learning of security and privacy policies
    • ACM Press
    • Kelley, P. G., Hankes Drielsma, P., Sadeh, N., and Cranor, L. F. (2008). User-controllable learning of security and privacy policies. AISec 2008, ACM Press, 11-18.
    • (2008) AISec 2008 , pp. 11-18
    • Kelley, P.G.1    Hankes Drielsma, P.2    Sadeh, N.3    Cranor, L.F.4
  • 8
    • 78249273432 scopus 로고    scopus 로고
    • Privacy in Ubiquitous Computing
    • John Krumm (Ed.), CRC Press
    • Langheinrich, M. (2009). Privacy in Ubiquitous Computing. In John Krumm (Ed.), Ubiquitous Computing. CRC Press.
    • (2009) Ubiquitous Computing
    • Langheinrich, M.1
  • 9
    • 84869078915 scopus 로고    scopus 로고
    • Who wants to know what when? Privacy preference determinants in ubiquitous computing
    • ACM Press
    • Lederer, S., Mankoff, J., and Dey, A. K. (2003). Who wants to know what when? privacy preference determinants in ubiquitous computing. CHI 2003, ACM Press, 724-725.
    • (2003) CHI 2003 , pp. 724-725
    • Lederer, S.1    Mankoff, J.2    Dey, A.K.3
  • 10
    • 67650293214 scopus 로고    scopus 로고
    • Understanding and capturing people's privacy policies in a mobile social networking application
    • Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. (2008). Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401-412.
    • (2008) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 401-412
    • Sadeh, N.1    Hong, J.2    Cranor, L.3    Fette, I.4    Kelley, P.5    Prabaker, M.6    Rao, J.7
  • 12
    • 84892447976 scopus 로고    scopus 로고
    • Who's viewed you?: The impact of feedback in a mobile location-sharing application
    • Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., and Sadeh, N. (2009). Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009, 2003-2012.
    • (2009) CHI 2009 , pp. 2003-2012
    • Tsai, J.Y.1    Kelley, P.2    Drielsma, P.3    Cranor, L.F.4    Hong, J.5    Sadeh, N.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.