메뉴 건너뛰기




Volumn 6947 LNCS, Issue PART 2, 2011, Pages 524-532

Tensions in developing a secure collective information practice - The case of agile ridesharing

Author keywords

design; HCI; participation; trust; Usable privacy and security; user experience based approaches

Indexed keywords

CONTEXT-AWARE; INFORMATION PRACTICES; ITERATIVE DESIGN; PARTICIPATION; PERSONAL INFORMATION; PRIVACY AND SECURITY; RESEARCH COMMUNITIES; RIDE-SHARING; SECURITY AND PRIVACY; SOCIAL SOFTWARE; TRUST; USABLE PRIVACY; USER EXPERIENCE;

EID: 80052794467     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23771-3_39     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • IEEE, Los Alamitos
    • Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. In: Security & Privacy. IEEE, Los Alamitos (2005)
    • (2005) Security & Privacy
    • Acquisti, A.1    Grossklags, J.2
  • 2
    • 33846696729 scopus 로고    scopus 로고
    • Yesterday's tomorrows: Notes on ubiquitous computing's dominant vision
    • Heidelberg
    • Bell, G., Dourish, P.: Yesterday's tomorrows: notes on ubiquitous computing's dominant vision. In: Personal and Ubiquitous Computing. Springer, Heidelberg (2007)
    • (2007) Personal and Ubiquitous Computing. Springer
    • Bell, G.1    Dourish, P.2
  • 3
    • 80052789601 scopus 로고    scopus 로고
    • Designing for participation in local social ridesharing networks: Grass roots prototyping of IT systems
    • ACM, New York
    • Brereton, M., Ghelawat, S.: Designing for participation in local social ridesharing networks: grass roots prototyping of IT systems. In: PDC. ACM, New York (2010)
    • (2010) PDC
    • Brereton, M.1    Ghelawat, S.2
  • 4
    • 77953012284 scopus 로고    scopus 로고
    • Designing participation in agile ridesharing with mobile social software
    • New York
    • Brereton, M., Roe, P., Foth, M., Bunker, J.M., Buys, L.: Designing participation in agile ridesharing with mobile social software. In: OzCHI. ACM, New York (2009)
    • (2009) OzCHI. ACM
    • Brereton, M.1    Roe, P.2    Foth, M.3    Bunker, J.M.4    Buys, L.5
  • 6
    • 70350605916 scopus 로고    scopus 로고
    • Adaptive security dialogs for improved security behavior of users
    • Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) LNCS Springer, Heidelberg
    • De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.: Adaptive security dialogs for improved security behavior of users. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 510-523. Springer, Heidelberg (2009)
    • (2009) INTERACT 2009 , vol.5726 , pp. 510-523
    • De Keukelaere, F.1    Yoshihama, S.2    Trent, S.3    Zhang, Y.4    Luo, L.5    Zurko, M.6
  • 7
    • 33748924513 scopus 로고    scopus 로고
    • Collective information practice: Exploring privacy and security as social and cultural phenomena
    • Lawrence Erlbaum Assoc., Mahwah
    • Dourish, P., Anderson, K.: Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. In: HCI. Lawrence Erlbaum Assoc., Mahwah (2006)
    • (2006) HCI
    • Dourish, P.1    Anderson, K.2
  • 8
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P., Grinter, B., Delgado de la Flor, J., Joseph, M.: Security in the wild: user strategies for managing security as an everyday, practical problem. In: PUC (2004)
    • (2004) PUC
    • Dourish, P.1    Grinter, B.2    Delgado De La Flor, J.3    Joseph, M.4
  • 9
    • 84960377818 scopus 로고    scopus 로고
    • Interaction, privacy and profiling considerations in local mobile social software: A prototype agile ride share system
    • ACM, New York
    • Ghelawat, S., Radke, K., Brereton, M.: Interaction, privacy and profiling considerations in local mobile social software: a prototype agile ride share system. In: OzCHI. ACM, New York (2010)
    • (2010) OzCHI
    • Ghelawat, S.1    Radke, K.2    Brereton, M.3
  • 10
    • 78149316218 scopus 로고    scopus 로고
    • Design from the everyday: Continuously evolving, embedded exploratory prototypes
    • ACM, New York
    • Heyer, C., Brereton, M.: Design from the everyday: continuously evolving, embedded exploratory prototypes. In: DIS 2010. ACM, New York (2010)
    • (2010) DIS 2010
    • Heyer, C.1    Brereton, M.2
  • 11
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Elsevier, Amsterdam
    • Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. In: Decision Support Systems. Elsevier, Amsterdam (2007)
    • (2007) Decision Support Systems
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 13
    • 79953085999 scopus 로고    scopus 로고
    • Who gets to know what when: Configuring privacy permissions in an awareness application
    • ACM, New York
    • Patil, S., Lai, J.: Who gets to know what when: configuring privacy permissions in an awareness application. In: SIGCHI. ACM, New York (2005)
    • (2005) SIGCHI
    • Patil, S.1    Lai, J.2
  • 14
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Tech. Journal 19(3), 122-131 (2001)
    • (2001) BT Tech. Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 16
    • 78650924671 scopus 로고    scopus 로고
    • A new privacy-enhanced matchmaking protocol
    • Citeseer
    • Shin, J.S., Gligor, V.D.: A new privacy-enhanced matchmaking protocol. In: NDSS. Citeseer (2007)
    • (2007) NDSS
    • Shin, J.S.1    Gligor, V.D.2
  • 18
    • 80052801507 scopus 로고    scopus 로고
    • "I did it because I trusted you,": Challenges with the study environment biasing participant
    • Sotirakopoulos, A., Hawkey, K., Beznosov, K.: "I did it because I trusted you": Challenges with the Study Environment Biasing Participant. In: SOUPS (2010)
    • (2010) SOUPS
    • Sotirakopoulos, A.1    Hawkey, K.2    Beznosov, K.3
  • 19
    • 50049120424 scopus 로고    scopus 로고
    • E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
    • ACM, New York
    • Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: EC-2001. ACM, New York (2001)
    • (2001) EC-2001
    • Spiekermann, S.1    Grossklags, J.2    Berendt, B.3
  • 20
    • 0033236359 scopus 로고    scopus 로고
    • American behavioral scientist, Sage Publications, Thousand Oaks
    • Star, S.L.: The ethnography of infrastructure. American behavioral scientist, Sage Publications, Thousand Oaks (1999)
    • (1999) The Ethnography of Infrastructure
    • Star, S.L.1
  • 21
    • 80052797506 scopus 로고    scopus 로고
    • http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32006L0024: EN:NOT
  • 22
    • 80052787542 scopus 로고    scopus 로고
    • http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte- spitz
  • 23
    • 80052812763 scopus 로고    scopus 로고
    • http://www.ridenow.org/carpool/#locations


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.