-
1
-
-
77954009273
-
Are your participants gaming the system? Screening Mechanical Turk workers
-
Downs, J.S. et al. (2010). Are your participants gaming the system? Screening Mechanical Turk workers. CHI '10, 2399-2402.
-
(2010)
CHI '10
, pp. 2399-2402
-
-
Downs, J.S.1
-
2
-
-
35348823171
-
Physical, social, and experiential knowledge in pervasive computing environments
-
DOI 10.1109/MPRV.2007.82
-
Hayes, G.R. et al. (2007). Physical, social, and experiential knowledge in pervasive computing environments. IEEE Pervasive Computing, 6(4), 56-63. (Pubitemid 47594395)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 56-63
-
-
Hayes, G.R.1
Poole, E.S.2
Iachello, G.3
Patel, S.N.4
Grimes, A.5
Abowd, G.D.6
Truong, K.N.7
-
3
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
Hong, J.I., Ng, J.D., Lederer, S., & Landay, J.A. (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. DIS '04, 91-100.
-
(2004)
DIS '04
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
4
-
-
67650302597
-
KidCam: Toward an effective technology for the capture of children's moments of interest
-
Kientz, J.A., & Abowd, G.D. (2009). KidCam: Toward an effective technology for the capture of children's moments of interest. Pervasive '09, 115-132.
-
(2009)
Pervasive '09
, pp. 115-132
-
-
Kientz, J.A.1
Abowd, G.D.2
-
5
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
Langheinrich, M. (2001). Privacy by design - Principles of privacy-aware ubiquitous systems. UbiComp '01, 273-291.
-
(2001)
UbiComp '01
, pp. 273-291
-
-
Langheinrich, M.1
-
6
-
-
77954821821
-
Understanding recording technologies in everyday life
-
Massimi, M. et al. (2010). Understanding recording technologies in everyday life. IEEE Pervasive Computing, 9(3), 64-71.
-
(2010)
IEEE Pervasive Computing
, vol.9
, Issue.3
, pp. 64-71
-
-
Massimi, M.1
-
8
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Palen, L., & Dourish, P. (2003). Unpacking "privacy" for a networked world. CHI '03, 129-136.
-
(2003)
CHI '03
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
9
-
-
77957011930
-
Running experiments on Amazon Mechanical Turk
-
Paolacci, G., Chandler, J., & Ipeirotis, P.G. (2010). Running experiments on Amazon Mechanical Turk. Judgment and Decision Making, 5(5), 411-419.
-
(2010)
Judgment and Decision Making
, vol.5
, Issue.5
, pp. 411-419
-
-
Paolacci, G.1
Chandler, J.2
Ipeirotis, P.G.3
-
11
-
-
59249104484
-
Protecting your daily inhome activity information from a wireless snooping attack
-
Srinivasan, V. et al. (2008). Protecting your daily inhome activity information from a wireless snooping attack. UbiComp '08, 202-211.
-
(2008)
UbiComp '08
, pp. 202-211
-
-
Srinivasan, V.1
-
12
-
-
34249879610
-
Homes that make us smart
-
Taylor, A. et al. (2007). Homes that make us smart. J.of Personal Technologies, 11(5), 383-393.
-
(2007)
J.of Personal Technologies
, vol.11
, Issue.5
, pp. 383-393
-
-
Taylor, A.1
-
13
-
-
77950787865
-
Deploying research technology in the home
-
Tolmie, P., & Crabtree, A. (2008). Deploying research technology in the home. CSCW '08, 639-648.
-
(2008)
CSCW '08
, pp. 639-648
-
-
Tolmie, P.1
Crabtree, A.2
-
14
-
-
0000320829
-
The right to privacy
-
Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(1), 193-220.
-
(1890)
Harvard Law Review
, vol.4
, Issue.1
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.2
|