-
2
-
-
54149089255
-
From Awareness to Repartee: Sharing Location Within Social Groups
-
Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M., Chalmers, M. (2008). From Awareness to Repartee: Sharing Location Within Social Groups. CHI 2008, 497-506.
-
(2008)
CHI 2008
, pp. 497-506
-
-
Barkhuus, L.1
Brown, B.2
Bell, M.3
Sherwood, S.4
Hall, M.5
Chalmers, M.6
-
3
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. (2005). Location disclosure to social relations: why, when, & what people want to share. CHI 2005, 81-90.
-
(2005)
CHI 2005
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
4
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
Hong, J. I. and Landay, J. A. (2004) An architecture for privacy-sensitive ubiquitous computing. MobiSys '04, 177-189.
-
(2004)
MobiSys '04
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
5
-
-
77956159286
-
User needs for location-aware mobile services
-
Kaasinen, E. (2003). User needs for location-aware mobile services. Personal and Ubiquitous Computing 7, 1, 70-79.
-
(2003)
Personal and Ubiquitous Computing
, vol.7
, Issue.1
, pp. 70-79
-
-
Kaasinen, E.1
-
6
-
-
70349246372
-
User-controllable learning of security and privacy policies
-
ACM Press
-
Kelley, P. G., Hankes Drielsma, P., Sadeh, N., and Cranor, L. F. (2008). User-controllable learning of security and privacy policies. AISec 2008, ACM Press, 11-18.
-
(2008)
AISec 2008
, pp. 11-18
-
-
Kelley, P.G.1
Hankes Drielsma, P.2
Sadeh, N.3
Cranor, L.F.4
-
8
-
-
78249273432
-
Privacy in Ubiquitous Computing
-
John Krumm (Ed.), CRC Press
-
Langheinrich, M. (2009). Privacy in Ubiquitous Computing. In John Krumm (Ed.), Ubiquitous Computing. CRC Press.
-
(2009)
Ubiquitous Computing
-
-
Langheinrich, M.1
-
9
-
-
84869078915
-
Who wants to know what when? Privacy preference determinants in ubiquitous computing
-
ACM Press
-
Lederer, S., Mankoff, J., and Dey, A. K. (2003). Who wants to know what when? privacy preference determinants in ubiquitous computing. CHI 2003, ACM Press, 724-725.
-
(2003)
CHI 2003
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
10
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. (2008). Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401-412.
-
(2008)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
11
-
-
24944459064
-
Social Disclosure of Place: From Location Technology to Communication Practice
-
Smith, I., Consolvo, S., Hightower, J., Iachello, G., LaMarca, A., Scott, J., Sohn, T., Abowd, G. (2005). Social Disclosure of Place: From Location Technology to Communication Practice. Pervasive '05, 134-151.
-
(2005)
Pervasive '05
, pp. 134-151
-
-
Smith, I.1
Consolvo, S.2
Hightower, J.3
Iachello, G.4
LaMarca, A.5
Scott, J.6
Sohn, T.7
Abowd, G.8
-
12
-
-
84892447976
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., and Sadeh, N. (2009). Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009, 2003-2012.
-
(2009)
CHI 2009
, pp. 2003-2012
-
-
Tsai, J.Y.1
Kelley, P.2
Drielsma, P.3
Cranor, L.F.4
Hong, J.5
Sadeh, N.6
|