-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the Facebook
-
Springer
-
Acquisti, A. and Gross, R. (2006). Imagined communities: awareness, information sharing, and privacy on the Facebook. Proc. PET 2006, Springer, 36-56.
-
(2006)
Proc. PET 2006
, pp. 36-56
-
-
Acquisti, A.1
Gross, R.2
-
2
-
-
84993894931
-
Privacy Regulation: Culturally Universal or Culturally Specific?
-
Altman, I. (1977). Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues, 33 (3), 66-84.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 66-84
-
-
Altman, I.1
-
3
-
-
85143190536
-
Nudging Users Towards Privacy on Mobile Devices
-
Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N. (2011) Nudging Users Towards Privacy on Mobile Devices, CHI 2011 workshop article, May 2011
-
(2011)
CHI 2011 Workshop Article, May 2011
-
-
Balebako, R.1
Leon, P.G.2
Mugan, J.3
Acquisti, A.4
Cranor, L.F.5
Sadeh, N.6
-
5
-
-
80054902317
-
Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs
-
Forthcoming
-
Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F., (2010). Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs. Personal and Ubiquitous Computing (PUC). Forthcoming.
-
(2010)
Personal and Ubiquitous Computing (PUC)
-
-
Benisch, M.1
Kelley, P.G.2
Sadeh, N.3
Cranor, L.F.4
-
6
-
-
70450193106
-
Eight Friends Are Enough: Social Graph Approximation via Public Listings
-
Bonneau, J., Anderson, J., Anderson, R. and Stajano, F. (2009) Eight Friends Are Enough: Social Graph Approximation via Public Listings. SNS'09.
-
(2009)
SNS'09
-
-
Bonneau, J.1
Anderson, J.2
Anderson, R.3
Stajano, F.4
-
7
-
-
46449097423
-
Criminal Exploitation of Online Systems by Organised Crime Groups
-
(2008)
-
Choo, K-K. R. and Smith, R. G. (2008). Criminal Exploitation of Online Systems by Organised Crime Groups. Asian Criminology (2008) 3:37-59
-
(2008)
Asian Criminology
, vol.3
, pp. 37-59
-
-
Choo, K.-K.R.1
Smith, R.G.2
-
8
-
-
44249122799
-
The collective dynamics of smoking in a large social network
-
DOI 10.1056/NEJMsa0706154
-
Christakis, N., Fowler, J.H. (2008). The collective dynamics of smoking in a large social network. The New England journal of medicine 358(21): 2249-58. (Pubitemid 351724454)
-
(2008)
New England Journal of Medicine
, vol.358
, Issue.21
, pp. 2249-2258
-
-
Christakis, N.A.1
Fowler, J.H.2
-
9
-
-
80054071473
-
-
Criminal Intelligence Service Canada. Available At: [Last Accessed 25th October 2010]. ISBN 978-1-100-51931-9
-
CISC (2010) Report on Organized Crime. Criminal Intelligence Service Canada. Available At: http:// www.cisc.gc.ca [Last Accessed 25th October 2010]. ISBN 978-1-100-51931-9.
-
(2010)
Report on Organized Crime
-
-
-
10
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
-
Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. (2005). Location disclosure to social relations: why, when, & what people want to share. CHI 2005, 81-90. (Pubitemid 41818729)
-
(2005)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
14
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
Hong, J. I. and Landay, J. A. (2004) An architecture for privacy-sensitive ubiquitous computing. MobiSys '04, 177-189.
-
(2004)
MobiSys '04
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
15
-
-
79958164126
-
Feasibility of structural network clustering for group-based privacy control in social networks
-
ACM, New York, NY, USA, Article 9
-
Jones, S., and O'Neill, E. (2010). Feasibility of structural network clustering for group-based privacy control in social networks. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 9, 13 pages
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10)
, pp. 13
-
-
Jones, S.1
O'Neill, E.2
-
16
-
-
70349246372
-
User-controllable learning of security and privacy policies
-
Kelley, P. G., Hankes Drielsma, P., Sadeh, N., and Cranor, L. F. (2008). User-controllable learning of security and privacy policies. AISec 2008, 11-18.
-
(2008)
AISec 2008
, pp. 11-18
-
-
Kelley, P.G.1
Hankes Drielsma, P.2
Sadeh, N.3
Cranor, L.F.4
-
18
-
-
80054066068
-
Designing Trustworthy Situated Services: An Implicit and Explicit Assessment of Locative Images' Effect on Trust
-
Kostakos, V. and Oakley, I. (2009). Designing Trustworthy Situated Services: an Implicit and Explicit Assessment of Locative Images' Effect on Trust. CHI, Boston, USA, pp. 329-332.
-
(2009)
CHI, Boston, USA
, pp. 329-332
-
-
Kostakos, V.1
Oakley, I.2
-
19
-
-
78649287427
-
Making friends in life and online: Equivalence, microcorrelation and value in spatial and transpatial social networks
-
Kostakos, V. and Venkatanathan, J. (2010). Making friends in life and online: Equivalence, microcorrelation and value in spatial and transpatial social networks. IEEE SocialCom, Minneapolis, USA, pp. 587-594.
-
(2010)
IEEE SocialCom, Minneapolis, USA
, pp. 587-594
-
-
Kostakos, V.1
Venkatanathan, J.2
-
20
-
-
84869078915
-
Who wants to know what when? Privacy preference determinants in ubiquitous computing
-
ACM Press
-
Lederer, S., Mankoff, J., and Dey, A. K. (2003). Who wants to know what when? privacy preference determinants in ubiquitous computing. CHI 2003, ACM Press, 724-725.
-
(2003)
CHI 2003
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
23
-
-
33847382472
-
The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors
-
Norberg, Patricia A, Daniel R. Horne, and David A. Horne (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, 41(1):100-126.
-
(2007)
Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
26
-
-
0001615157
-
Effects of a favor and liking on compliance
-
Regan, D.T. (1971). Effects of a favor and liking on compliance. Journal of Experimental Social Psychology, 7(6):627-639.
-
(1971)
Journal of Experimental Social Psychology
, vol.7
, Issue.6
, pp. 627-639
-
-
Regan, D.T.1
-
27
-
-
80054065857
-
Sharing Ephemeral Information in Online Social Networks: Privacy perceptions and behaviours
-
Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V. (2011). Sharing Ephemeral Information in Online Social Networks: privacy perceptions and behaviours. In proceedings of INTERACT.
-
(2011)
Proceedings of INTERACT
-
-
Reynolds, B.1
Venkatanathan, J.2
Goncalves, J.3
Kostakos, V.4
-
28
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. (2008). Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401-412.
-
(2008)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
29
-
-
55549139103
-
Network reconnaissance
-
Shaikh, S. A., Chivers, H., Nobles, P., Clark, J. A. and Chen, H. (2008). Network reconnaissance. Network Security, 2008(11):12-16.
-
(2008)
Network Security
, vol.2008
, Issue.11
, pp. 12-16
-
-
Shaikh, S.A.1
Chivers, H.2
Nobles, P.3
Clark, J.A.4
Chen, H.5
-
31
-
-
78649998804
-
Empirical Models of Privacy in Location Sharing
-
Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J. Y., Kelley, P. G., Cranor, L., Hong, J., Sadeh, N. (2010) Empirical Models of Privacy in Location Sharing, in Proceedings of the Twelfth International Conference on Ubiquitous Computing. Ubicomp 2010
-
(2010)
Proceedings of the Twelfth International Conference on Ubiquitous Computing. Ubicomp 2010
-
-
Toch, E.1
Cranshaw, J.2
Drielsma, P.H.3
Tsai, J.Y.4
Kelley, P.G.5
Cranor, L.6
Hong, J.7
Sadeh, N.8
-
32
-
-
80055052185
-
Location- Sharing Technologies: Privacy Risks and Controls
-
2010
-
Tsai, J., Kelley, P.G., Cranor, L.F., and Sadeh N. (2010). Location- Sharing Technologies: Privacy Risks and Controls. Journal of Law and Policy for the Information Society, 2010.
-
(2010)
Journal of Law and Policy for the Information Society
-
-
Tsai, J.1
Kelley, P.G.2
Cranor, L.F.3
Sadeh, N.4
-
33
-
-
84892447976
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., and Sadeh, N. (2009). Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI '09, 2003-2012.
-
(2009)
CHI '09
, pp. 2003-2012
-
-
Tsai, J.Y.1
Kelley, P.2
Drielsma, P.3
Cranor, L.F.4
Hong, J.5
Sadeh, N.6
-
34
-
-
47549115596
-
Can You See Me Now? Audience and Disclosure Management in Online Social Network Sites
-
June 2008
-
Tufekci Z. (2008). Can You See Me Now? Audience and Disclosure Management in Online Social Network Sites. Bulletin of Science and Technology Studies. Volume 11, Number 4, June 2008, pp. 544-564(21).
-
(2008)
Bulletin of Science and Technology Studies
, vol.11
, Issue.4
-
-
Tufekci, Z.1
-
35
-
-
78249241507
-
Hide and Seek: Location Sharing Practices with Social Media
-
Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T. (2010). Hide And Seek: Location Sharing Practices With Social Media. MobileHCI '10, 55-58.
-
(2010)
MobileHCI '10
, pp. 55-58
-
-
Wagner, D.1
Lopez, M.2
Doria, A.3
Pavlyshak, I.4
Kostakos, V.5
Oakley, I.6
Spiliotopoulos, T.7
-
36
-
-
84936823640
-
Different Strokes from Different Folks: Community Ties and Social Support
-
Wellman, B. and Wortley, S. (1990). Different Strokes from Different Folks: Community Ties and Social Support. American Journal of Sociology 96, 3, 558-588.
-
(1990)
American Journal of Sociology
, vol.96
, Issue.3
, pp. 558-588
-
-
Wellman, B.1
Wortley, S.2
-
37
-
-
36949010345
-
SCAN: A structural clustering algorithm for networks
-
Xu, X., Yuruk, N., Feng, Z. and Schwieger, T. A. J. (2007) SCAN: a structural clustering algorithm for networks. Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, 824-833.
-
(2007)
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 824-833
-
-
Xu, X.1
Yuruk, N.2
Feng, Z.3
Schwieger, T.A.J.4
|