-
4
-
-
2342484676
-
Location-based services for mobile telephony: A study of users' privacy concerns
-
L. Barkhuus and A. Dey. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. In Proc. Interact, 2003.
-
(2003)
Proc. Interact
-
-
Barkhuus, L.1
Dey, A.2
-
5
-
-
78650014112
-
Exploring end user preferences for location obfuscation, location-based services, and the value of location
-
A. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In ACM UbiComp, pages 95-104, 2010.
-
(2010)
ACM UbiComp
, pp. 95-104
-
-
Brush, A.1
Krumm, J.2
Scott, J.3
-
6
-
-
78650021719
-
The wi-fi privacy ticker: Improving awareness & control of personal information exposure on wi-fi
-
S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis, and D. Avrahami. The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi. In ACM UbiComp, pages 321-330, 2010.
-
(2010)
ACM UbiComp
, pp. 321-330
-
-
Consolvo, S.1
Jung, J.2
Greenstein, B.3
Powledge, P.4
Maganis, G.5
Avrahami, D.6
-
7
-
-
70450233866
-
Activity sensing in the wild: A field trial of ubifit garden
-
S. Consolvo, D. McDonald, T. Toscos, M. Chen, J. Froehlich, B. Harrison, P. Klasnja, A. LaMarca, L. LeGrand, R. Libby, et al. Activity sensing in the wild: a field trial of ubifit garden. In ACM SIGCHI, 2008.
-
(2008)
ACM SIGCHI
-
-
Consolvo, S.1
McDonald, D.2
Toscos, T.3
Chen, M.4
Froehlich, J.5
Harrison, B.6
Klasnja, P.7
LaMarca, A.8
LeGrand, L.9
Libby, R.10
-
8
-
-
33645988390
-
Location disclosure to social relations: Why, when, & what people want to share
-
S. Consolvo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In ACM SIGCHI, 2005.
-
(2005)
ACM SIGCHI
-
-
Consolvo, S.1
Smith, I.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
9
-
-
0003461406
-
Towards a better understanding of context and context-awareness
-
A. Dey and G. Abowd. Towards a Better Understanding of Context and Context-Awareness. In ACM SIGCHI workshop, 2000.
-
(2000)
ACM SIGCHI Workshop
-
-
Dey, A.1
Abowd, G.2
-
11
-
-
84866489655
-
PoolView: Stream privacy for grassroots participatory sensing
-
R. Ganti, N. Pham, Y. Tsai, and T. Abdelzaher. PoolView: Stream Privacy for Grassroots Participatory Sensing. In ACM SenSys, 2008.
-
(2008)
ACM SenSys
-
-
Ganti, R.1
Pham, N.2
Tsai, Y.3
Abdelzaher, T.4
-
12
-
-
78650856531
-
AutoWitness: Locating and tracking stolen property while tolerating GPS and radio outages
-
S. Guha, K. Plarre, D. Lissner, S. Mitra, B. Krishna, P. Dutta, and S. Kumar. AutoWitness: Locating and Tracking Stolen Property while Tolerating GPS and Radio Outages. In ACM SenSys, 2010.
-
(2010)
ACM SenSys
-
-
Guha, S.1
Plarre, K.2
Lissner, D.3
Mitra, S.4
Krishna, B.5
Dutta, P.6
Kumar, S.7
-
14
-
-
84861294968
-
Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing
-
CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
-
G. Iachello and G. Abowd. Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In ACM SIGCHI, pages 91-100, 2005. (Pubitemid 41809046)
-
(2005)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 91-100
-
-
Iachello, G.1
Abowd, G.D.2
-
15
-
-
33745842288
-
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
G. Iachello, K. Truong, G. Abowd, G. Hayes, and M. Stevens. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In ACM SIGCHI, pages 1009-1018, 2006. (Pubitemid 44032194)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.2
, pp. 1009-1018
-
-
Iachello, G.1
Truong, K.N.2
Abowd, G.D.3
Hayes, G.R.4
Stevens, M.5
-
16
-
-
46949103941
-
Privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring, the
-
W. Karim. Privacy Implications of Personal Locators: Why You Should Think Twice before Voluntarily Availing Yourself to GPS Monitoring, The. Wash. UJL & Pol'y, 14, 2004.
-
Wash. UJL & Pol'y
, vol.14
, pp. 2004
-
-
Karim, W.1
-
17
-
-
67650337565
-
Exploring privacy concerns about personal sensing
-
P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower. Exploring privacy concerns about personal sensing. Pervasive Computing, pages 176-183, 2009.
-
(2009)
Pervasive Computing
, pp. 176-183
-
-
Klasnja, P.1
Consolvo, S.2
Choudhury, T.3
Beckwith, R.4
Hightower, J.5
-
18
-
-
79958101213
-
Ẅhen I am on wi-fi, I am fearless:p̈rivacy concerns & practices in everyday wi-fi use
-
P. Klasnja, S. Consolvo, J. Jung, B. Greenstein, L. LeGrand, P. Powledge, and D. Wetherall. Ẅhen I am on Wi-Fi, I am fearless:p̈rivacy concerns & practices in everyday Wi-Fi use. In ACM SIGCHI, pages 1993-2002, 2009.
-
(2009)
ACM SIGCHI
, pp. 1993-2002
-
-
Klasnja, P.1
Consolvo, S.2
Jung, J.3
Greenstein, B.4
LeGrand, L.5
Powledge, P.6
Wetherall, D.7
-
19
-
-
59249083345
-
Inference attacks on location tracks
-
J. Krumm. Inference Attacks on Location Tracks. Pervasive Computing, 2007.
-
(2007)
Pervasive Computing
-
-
Krumm, J.1
-
21
-
-
35448965488
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE ICDE, 2007.
-
(2007)
IEEE ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
22
-
-
77952247439
-
Mercury: A wearable sensor network platform for high-fidelity motion analysis
-
K. Lorincz, B. Chen, G. Challen, A. Chowdhury, S. Patel, P. Bonato, and M. Welsh. Mercury: A Wearable Sensor Network Platform for High-Fidelity Motion Analysis. In ACM SenSys, 2009.
-
(2009)
ACM SenSys
-
-
Lorincz, K.1
Chen, B.2
Challen, G.3
Chowdhury, A.4
Patel, S.5
Bonato, P.6
Welsh, M.7
-
24
-
-
70450172446
-
From spaces to places: Emerging contexts in mobile privacy
-
C. Mancini, K. Thomas, Y. Rogers, B. Price, L. Jedrzejczyk, A. Bandara, A. Joinson, and B. Nuseibeh. From spaces to places: emerging contexts in mobile privacy. In ACM UbiComp, 2009.
-
(2009)
ACM UbiComp
-
-
Mancini, C.1
Thomas, K.2
Rogers, Y.3
Price, B.4
Jedrzejczyk, L.5
Bandara, A.6
Joinson, A.7
Nuseibeh, B.8
-
26
-
-
70450248480
-
Peir, the personal environmental impact report, as a platform for participatory sensing systems research
-
M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda. Peir, The Personal Environmental Impact Report, as a Platform for Participatory Sensing Systems Research. In ACM MobiSys, 2009.
-
(2009)
ACM MobiSys
-
-
Mun, M.1
Reddy, S.2
Shilton, K.3
Yau, N.4
Burke, J.5
Estrin, D.6
Hansen, M.7
Howard, E.8
West, R.9
Boda, P.10
-
30
-
-
10844259286
-
Unpacking privacy for a networked world
-
L. Palen and P. Dourish. Unpacking Privacy for a Networked World. In ACM SIGCHI, 2003.
-
(2003)
ACM SIGCHI
-
-
Palen, L.1
Dourish, P.2
-
31
-
-
79953085999
-
Who gets to know what when: Configuring privacy permissions in an awareness application
-
S. Patil and J. Lai. Who gets to know what when: configuring privacy permissions in an awareness application. In ACM SIGCHI, 2005.
-
(2005)
ACM SIGCHI
-
-
Patil, S.1
Lai, J.2
-
33
-
-
78649998804
-
Empirical models of privacy in location sharing
-
E. Toch, J. Cranshaw, P. Drielsma, J. Tsai, P. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical Models of Privacy in Location Sharing. In ACM UbiComp, 2010.
-
(2010)
ACM UbiComp
-
-
Toch, E.1
Cranshaw, J.2
Drielsma, P.3
Tsai, J.4
Kelley, P.5
Springfield, J.6
Cranor, L.7
Hong, J.8
Sadeh, N.9
-
34
-
-
77953097167
-
Generating default privacy policies for online social networks
-
E. Toch, N. Sadeh, and J. Hong. Generating default privacy policies for online social networks. In ACM SIGCHI extended abstracts, pages 4243-4248, 2010.
-
(2010)
ACM SIGCHI Extended Abstracts
, pp. 4243-4248
-
-
Toch, E.1
Sadeh, N.2
Hong, J.3
-
35
-
-
79958134111
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
J. Tsai, P. Kelley, P. Drielsma, L. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: the impact of feedback in a mobile location-sharing application. In ACM SIGCHI, 2009.
-
(2009)
ACM SIGCHI
-
-
Tsai, J.1
Kelley, P.2
Drielsma, P.3
Cranor, L.4
Hong, J.5
Sadeh, N.6
-
36
-
-
79958086482
-
-
Zephyr Technology. BioHarness BT. http://www.zephyr-technology.com/ bioharness-bt.html.
-
BioHarness BT
-
-
|