-
1
-
-
33748924513
-
Collective information practice: Exploring privacy and security as social and cultural phenomena
-
Lawrence Erlbaum Assoc
-
P. Dourish, and K. Anderson, "Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena", HCI, Lawrence Erlbaum Assoc., 2006.
-
(2006)
HCI
-
-
Dourish, P.1
Anderson, K.2
-
4
-
-
78249253959
-
Enabling privacy-preserving credential-based access control with XACML and SAML
-
IEEE Computer Society, Bradford
-
C. A. Ardagna, S. D. C. Di Vimercati, G. Neven, S. Paraboschi, F. S. Preiss, P. Samarati and M. Verdicchio, "Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML", 10th IEEE International Conference on Computer and Information Technology,. IEEE Computer Society, Bradford. 2010, pp. 1090.
-
(2010)
10th IEEE International Conference on Computer and Information Technology
, pp. 1090
-
-
Ardagna, C.A.1
Vimercati, S.D.C.D.2
Neven, G.3
Paraboschi, S.4
Preiss, F.S.5
Samarati, P.6
Verdicchio, M.7
-
5
-
-
70449982150
-
The need for enhanced privacy and consent dialogues
-
D. Bogdanovic, C. Crawford and L. Coles-Kemp, "The need for enhanced privacy and consent dialogues, Information Security Technical Report, Vol.14, No.3, 2009, pp. 167-172.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.3
, pp. 167-172
-
-
Bogdanovic, D.1
Crawford, C.2
Coles-Kemp, L.3
-
7
-
-
34250717425
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
-
C. A. Brodie, C. M. Karat and J. Karat, "An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench", Proceedings of the second symposium on Usable privacy and security, ACM, 2006, pp. 8.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security, ACM
, pp. 8
-
-
Brodie, C.A.1
Karat, C.M.2
Karat, J.3
-
8
-
-
51449102195
-
Social computing: An overview
-
M. Parameswaran, A. B. Whinston, "Social Computing: An Overview", Communications of the Association for Information Systems, Vol.19, No.37, 2007, pp. 762-780.
-
(2007)
Communications of the Association for Information Systems
, vol.19
, Issue.37
, pp. 762-780
-
-
Parameswaran, M.1
Whinston, A.B.2
-
9
-
-
33846372664
-
Development of measures of on-line privacy concern and protection for use on the Internet
-
T. Buchanan, U-D. Reips, C. Paine and A. N. Joinson, "Development of measures of on-line privacy concern and protection for use on the Internet", Journal of the American Society for Information Science and Technology, Vol. 58, No.2, 2007, pp. 157 - 165.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Reips, U.-D.2
Paine, C.3
Joinson, A.N.4
-
11
-
-
78751622191
-
On-line privacy and consent: A dialogue not a monologue
-
21-23rd September, ACM Press, USA
-
L. Coles-Kemp, E. Kani-Zabihi, "On-line privacy and consent: a dialogue not a monologue", In proceeding of NSPW 2010, 21-23rd September, ACM Press, USA, 2010.
-
(2010)
Proceeding of NSPW 2010
-
-
Coles-Kemp, L.1
Kani-Zabihi, E.2
-
12
-
-
46449098913
-
User-controllable security and privacy for pervasive computing
-
J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor and J. Hong 2007, "User-controllable security and privacy for pervasive computing", Mobile Computing Systems and Applications, HotMobile 2007. Eighth IEEE Workshop, 2007, pp. 14.
-
(2007)
Mobile Computing Systems and Applications, HotMobile 2007. Eighth IEEE Workshop, 2007
, pp. 14
-
-
Cornwell, J.1
Fette, I.2
Hsieh, G.3
Prabaker, M.4
Rao, J.5
Tang, K.6
Vaniea, K.7
Bauer, L.8
Cranor, L.9
Hong, J.10
-
13
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday practical problem
-
DOI: 10.1007/s00779-004-0308-5
-
P. Dourish, B. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the wild: user strategies for managing security as an everyday practical problem", Personal and Ubiquitous Computing, Vol.8, No.6, 2004, pp. 391-401, DOI: 10.1007/s00779-004-0308-5.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, B.2
Delgado De La Flor, J.3
Joseph, M.4
-
14
-
-
19944420514
-
Privacy practices of Internet users: Self-reports versus observed behavior
-
DOI 10.1016/j.ijhcs.2005.04.019, PII S1071581905000650, HCI Research in Privacy and Security
-
C. Jensen, C. Potts, C. Jensen, "Privacy practices of Internet Users: Self-reports Versus Observed Behaviour", International Journal of Human-Computer Studies, Vol.63, 2005, No.1-2, pp. 203-227. (Pubitemid 40753499)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
15
-
-
84856145794
-
Experiences with developing a user-centered digital library
-
E. Kani-Zabihi, G. Ghinea, and S. Y. Chen, "Experiences with developing a user-centered digital library", International Journal of Digital Library Systems, Vol.1, No.1, 2010, pp.1-23.
-
(2010)
International Journal of Digital Library Systems
, vol.1
, Issue.1
, pp. 1-23
-
-
Kani-Zabihi, E.1
Ghinea, G.2
Chen, S.Y.3
-
17
-
-
0003111536
-
Activity theory as a potential framework for human computer interaction research
-
eds. B. A. Nardi
-
K. Kuutti, "Activity Theory as a Potential Framework for Human Computer Interaction Research", in Context and Consciousness, eds. B. A. Nardi, 1996, pp.17-44.
-
(1996)
Context and Consciousness
, pp. 17-44
-
-
Kuutti, K.1
-
18
-
-
79955602670
-
An empirical study of how people perceive online behavioral advertising
-
A. M. McDonald and L. F. Cranor, "An Empirical Study of How People Perceive Online Behavioral Advertising", CyLab, 2009, pp. 2.
-
(2009)
CyLab
, pp. 2
-
-
Mcdonald, A.M.1
Cranor, L.F.2
-
19
-
-
0001968728
-
Familiarity, Confidence, Trust: Problems and alternatives
-
in Diego, G (ed), University of Oxford, Oxford
-
N. Luhmann, "Familiarity, Confidence, Trust: Problems and alternatives", in Diego, G (ed) Trust: Making and Breaking Cooperative Relations, University of Oxford, Oxford, 2000.
-
(2000)
Trust: Making and Breaking Cooperative Relations
-
-
Luhmann, N.1
-
21
-
-
84856207365
-
(Re)- Conceptualising E-government: Studying and using patterns of practice
-
Submitted to OR52 Paper to appear in proceedings
-
J. R. Cordoba, L. Coles-Kemp, J. Ahwere-Bafo, "(Re)- conceptualising E-government: Studying and Using Patterns of Practice". Submitted to OR52 (Operational Research Society Annual Conference) Paper to appear in proceedings.
-
Operational Research Society Annual Conference
-
-
Cordoba, J.R.1
Coles-Kemp, L.2
Ahwere-Bafo, J.3
|