-
2
-
-
85143190875
-
We're in it together: Interpersonal management of disclosure in social network services
-
Vancouver, BC, Canada
-
A. Lampinen, et al., "We're in it together: interpersonal management of disclosure in social network services, " Proc. of the 2011 annual conference on Human factors in computing systems, Vancouver, BC, Canada, 2011.
-
(2011)
Proc. of the 2011 Annual Conference on Human Factors in Computing Systems
-
-
Lampinen, A.1
-
5
-
-
19944410216
-
Why HCI research in privacy and security is critical now
-
DOI 10.1016/j.ijhcs.2005.04.016, PII S1071581905000716, HCI Research in Privacy and Security
-
C.-M. Karat, et al., "Editorial: why HCI research in privacy and security is critical now, " International Journal of Human-Computer Studies, vol. 63, pp. 1-4, 2005. (Pubitemid 40753490)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 1-4
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
-
6
-
-
0003508667
-
-
Monterey, CA: Brooks/Cloe Pub. Co. Inc
-
I. Altman, The Environment and Social Behavior: Privacy, Personal Space, Territory and Crowding. Monterey, CA: Brooks/Cloe Pub. Co., Inc., 1975.
-
(1975)
The Environment and Social Behavior: Privacy, Personal Space, Territory and Crowding.
-
-
Altman, I.1
-
7
-
-
10844259286
-
Unpacking "Privacy" for a networked world
-
Ft. Lauderdale, Florida, USA
-
L. Palen, and Dourish, P., "Unpacking "Privacy" for a Networked World, " Proc. of the CHI'03, Ft. Lauderdale, Florida, USA, 2003.
-
(2003)
Proc. of the CHI'03
-
-
Palen, L.1
Dourish, P.2
-
8
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum, "Privacy as Contextual Integrity, " Washington Law Review, vol. 79, pp. 119-158, 2004.
-
(2004)
Washington Law Review
, vol.79
, pp. 119-158
-
-
Nissenbaum, H.1
-
10
-
-
33845422335
-
What we talk about when we talk about context
-
P. Dourish, "What we talk about when we talk about context, " Personal Ubiquitous Comput., vol. 8, pp. 19- 30, 2004.
-
(2004)
Personal Ubiquitous Comput.
, vol.8
, pp. 19-30
-
-
Dourish, P.1
-
11
-
-
34547176767
-
Revisiting Whittaker & Sidner's "email overload" ten years later
-
DOI 10.1145/1180875.1180922, Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work, CSCW 2006
-
D. Fisher, et al., "Revisiting Whittaker & Sidner's "email overload" ten years later, " in Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (CSCW'06), ed. Banff, Alberta, Canada: ACM, 2006, pp. 309-312. (Pubitemid 47112419)
-
(2006)
Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW
, pp. 309-312
-
-
Fisher, D.1
Brush, A.J.2
Gleave, E.3
Smith, M.A.4
-
13
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
Estes Park, CO, USA
-
Q. Ni, et al., "An obligation model bridging access control policies and privacy policies, "Proc. of the 13th ACM symposium on Access control models and technologies, Estes Park, CO, USA, 2008.
-
(2008)
Proc. of the 13th ACM Symposium on Access Control Models and Technologies
-
-
Ni, Q.1
-
15
-
-
84856186485
-
Introduction to P3P
-
ed: O'Reilly and Associates
-
L. F. Cranor, "Introduction to P3P, " in Web Privacy with P3P, ed: O'Reilly and Associates, 2002, pp. 3-11.
-
(2002)
Web Privacy with P3P
, pp. 3-11
-
-
Cranor, L.F.1
-
16
-
-
33750337486
-
Developing privacy guidelines for social location disclosure applications and services
-
Pittsburgh, Pennsylvania
-
G. Iachello, et al., "Developing privacy guidelines for social location disclosure applications and services, " Proc. of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, 2005.
-
(2005)
Proc. of the 2005 Symposium on Usable Privacy and Security
-
-
Iachello, G.1
-
17
-
-
78651407156
-
Attribute-based messaging: Access control and confidentiality
-
R. Bobba, et al., "Attribute-Based Messaging: Access Control and Confidentiality, " ACM Trans. Inf. Syst. Secur., vol. 13, pp. 1-35, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 1-35
-
-
Bobba, R.1
-
18
-
-
77954519375
-
PriMa: An effective privacy protection mechanism for social networks
-
Beijing, China
-
A. Squicciarini, et al., "PriMa: an effective privacy protection mechanism for social networks, " Proc. of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010.
-
(2010)
Proc. of the 5th ACM Symposium on Information, Computer and Communications Security
-
-
Squicciarini, A.1
-
20
-
-
84885062887
-
Collaborative privacy - A community-based privacy infrastructure
-
D. Gritzalis and J. Lopez, Eds. ed: Springer Boston
-
J. Kolter, et al., "Collaborative Privacy - A Community-Based Privacy Infrastructure, " in Emerging Challenges for Security, Privacy and Trust. vol. 297, D. Gritzalis and J. Lopez, Eds., ed: Springer Boston, 2009, pp. 226-236.
-
(2009)
Emerging Challenges for Security, Privacy and Trust
, vol.297
, pp. 226-236
-
-
Kolter, J.1
-
21
-
-
77955711162
-
Collaborative privacy management
-
July 2010
-
J. Kolter, et al., "Collaborative privacy management, " Computers & Security, vol. 29, pp. 580-591, July 2010 2010.
-
(2010)
Computers & Security
, vol.29
, pp. 580-591
-
-
Kolter, J.1
-
23
-
-
63449116449
-
Game theoretic approach to location sharing with privacy in a community-based mobile safety application
-
Vancouver, British Columbia, Canada
-
H. Liu, et al., "Game theoretic approach to location sharing with privacy in a community-based mobile safety application, " Proc. of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, Vancouver, British Columbia, Canada, 2008.
-
(2008)
Proc. of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
-
-
Liu, H.1
-
24
-
-
33745834688
-
A collaborative privacy-enhanced alibi phone
-
Advances in Grid and Pervasive Computing - First International Conference, GPC 2006, Proceedings
-
H.-T. Cheng, et al., "A Collaborative Privacy- Enchanced Alibi Phone, " in Advances in Grid and pervasive Computing, Lecture Notes in Computer Science. vol. 3947, Y.-C. Chung and J. Moreira, Eds., ed Berlin/Heidelberg: Springer, 2006, pp. 405-414. (Pubitemid 44029217)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3947
, pp. 405-414
-
-
Cheng, H.-T.1
Lin, C.-L.2
Chuinst, H.-H.3
-
25
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Oakland, California
-
A. Barth, et al., "Privacy and Contextual Integrity: Framework and Applications, " in 27th IEEE Symposium on Security and Privacy, Oakland, California, 2006, p. 15.
-
(2006)
27th IEEE Symposium on Security and Privacy
, pp. 15
-
-
Barth, A.1
|