-
3
-
-
77950885435
-
What is the Shape of Your Security Policy? Security as a Classification Problem
-
Turpe, S., 2009. What is the Shape of Your Security Policy? Security as a Classification Problem. In Proceedings of New Security Paradigms Workshop. http://www.nspw.org/proceedings/2009
-
(2009)
Proceedings of New Security Paradigms Workshop
-
-
Turpe, S.1
-
4
-
-
77950555884
-
The User is Not the Enemy: Fighting Malware by Tracking User Intentions
-
Shirley, J. and Evans, D. 2009. The User is Not the Enemy: Fighting Malware by Tracking User Intentions. In Proceedings of New Security Paradigms Workshop. http://www.nspw.org/proceedings/2009
-
(2009)
Proceedings of New Security Paradigms Workshop
-
-
Shirley, J.1
Evans, D.2
-
5
-
-
77950870041
-
Generative Usability: Security and User Centered Design beyond the Appliance
-
Church, L. and Whitten, A. 2009. Generative Usability: Security and User Centered Design beyond the Appliance. In Proceedings of New Security Paradigms Workshop. http://www.nspw.org/proceedings/2009
-
(2009)
Proceedings of New Security Paradigms Workshop
-
-
Church, L.1
Whitten, A.2
-
6
-
-
70449982150
-
The need for enhanced privacy and consent dialogues
-
Bogdanovic, D. Crawford, C. and Coles-Kemp, L. 2009. The need for enhanced privacy and consent dialogues. Information Security Technical Report, 14(3), p (167-172).
-
(2009)
Information Security Technical Report
, vol.14
, Issue.3
, pp. 167-172
-
-
Bogdanovic, D.1
Crawford, C.2
Coles-Kemp, L.3
-
7
-
-
2442539759
-
A Privacy Awareness System for Ubiquitous Computing Environments
-
Springer
-
Langheinrich, M. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. Ubiquitous Computing , 315-320, Springer.
-
(2002)
Ubiquitous Computing
, pp. 315-320
-
-
Langheinrich, M.1
-
10
-
-
0003745794
-
-
Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., Carter, C. 2000. Trust and Privacy Online: Why Americans Wants to Rewrite the Rules. The Pew Internet & American Life Project. http://www.pewinternet.org
-
(2000)
Trust and Privacy Online: Why Americans Wants to Rewrite the Rules
-
-
Fox, S.1
Rainie, L.2
Horrigan, J.3
Lenhart, A.4
Spooner, T.5
Carter, C.6
-
11
-
-
70449646929
-
Reflections on Privacy, Identity and Consent in Online Services
-
Bennett, L. 2009. Reflections on Privacy, Identity and Consent in Online Services. Information Security Technical Report, 14(3), p (119-123).
-
(2009)
Information Security Technical Report
, vol.14
, Issue.3
, pp. 119-123
-
-
Bennett, L.1
-
12
-
-
0000981743
-
Information Privacy: Measuring individuals' concerns about organisational practices
-
Smith, H., Milberg, S., Bruke, S. 1996. Information Privacy: Measuring individuals' concerns about organisational practices. MIS Quart. 20(2), p (167-196).
-
(1996)
MIS Quart.
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.1
Milberg, S.2
Bruke, S.3
-
17
-
-
19944420514
-
Privacy practices of Internet Users: Self-reports Versus Observed Behaviour
-
Jensen, C. Potts, C. Jensen, C. Privacy practices of Internet Users: Self-reports Versus Observed Behaviour. 2005. International Journal of Human-Computer Studies. 63(1-2), p (203-227).
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
19
-
-
78751634003
-
-
Clique.2010.Privacy. http://clique.primelife.eu/pg/expages/read/Privacy
-
(2010)
Privacy
-
-
-
20
-
-
78751631489
-
-
IDEMIX. http://www.zurich.ibm.com/pri/projects/idemix.html
-
IDEMIX
-
-
-
23
-
-
70449644839
-
Informational Privacy, Consent and the "Control" of Personal Data
-
Whitley, E.A. 2009. Informational Privacy, Consent and the "Control" of Personal Data. Information Security Technical Report, 14(3), p (154-159).
-
(2009)
Information Security Technical Report
, vol.14
, Issue.3
, pp. 154-159
-
-
Whitley, E.A.1
-
24
-
-
84935458527
-
Technology, power, and the social organization of work: Towards a paradigmatic theory of skilling and deskilling
-
Barley, S.R. 1988. Technology, power, and the social organization of work: Towards a paradigmatic theory of skilling and deskilling. Research in the Sociology of Organizations, 6, p (33-60).
-
(1988)
Research in the Sociology of Organizations
, vol.6
, pp. 33-60
-
-
Barley, S.R.1
-
25
-
-
0001656499
-
Relational Behaviour in Business Markets - Implications for Relationship Management
-
Leuthersser, l., Kohli, A, K. 1995. Relational Behaviour in Business Markets - Implications for Relationship Management, Journal of Business Research 34, pp. 221-233
-
(1995)
Journal of Business Research
, vol.34
, pp. 221-233
-
-
Leuthersser, L.1
Kohli, A.K.2
-
26
-
-
34147144752
-
Internet users'perceptions of 'privacy concerns' and 'privacy actions'
-
Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users'perceptions of 'privacy concerns' and 'privacy actions'. International Journal of Human-Computer Studies, 65(6), 526-536.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.6
, pp. 526-536
-
-
Paine, C.1
Reips, U.-D.2
Stieger, S.3
Joinson, A.4
Buchanan, T.5
-
27
-
-
33847382472
-
The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors
-
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs,41(1), 100-126.
-
(2007)
Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
28
-
-
0442294007
-
Theory, Development and Implementation of National Customer Satisfaction Indices: The Swiss Index of Customer Satisfaction (SWICS)
-
Bruhn M., Grund M. (2000) Theory, Development and Implementation of National Customer Satisfaction Indices: the Swiss Index of Customer Satisfaction (SWICS) Total Quality Management, Volume 11, Number 7
-
(2000)
Total Quality Management
, vol.11
, Issue.7
-
-
Bruhn, M.1
Grund, M.2
-
30
-
-
33846372664
-
Development of measures of on?line privacy concern and protection for use on the Internet
-
Buchanan, Tom, Ulf-Dietrich Reips, Carina Paine and Adam N. Joinson, (2007) "Development of measures of on?line privacy concern and protection for use on the Internet." Journal of the American Society for Information Science and Technology, Vol. 58, Issue 2, pp. 157-165
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Reips, U.-D.2
Paine, C.3
Joinson, A.N.4
-
32
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
ACM
-
Camenisch, J. & Van Herreweghen, E., 2002, Design and implementation of the idemix anonymous credential system, Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, pp. 30.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
33
-
-
70349833881
-
-
available from: last accessed 5th August 2010
-
Information Commissioner's Office (2008) "Privacy by Design" available from: http://www.ico.gov.uk/upload/documents/pdb-report-html/index. html (last accessed 5th August 2010)
-
(2008)
Privacy by Design
-
-
|