-
3
-
-
0001656499
-
Relational Behavior in Business Markets: Implications for Relationship Management
-
Leuthesser, L., Kohli, A.K.: Relational Behavior in Business Markets: Implications for Relationship Management. Journal of Business Research 34, 221-223 (1995)
-
(1995)
Journal of Business Research
, vol.34
, pp. 221-223
-
-
Leuthesser, L.1
Kohli, A.K.2
-
4
-
-
33845422335
-
What we talk about when we talk about the context
-
Dourish, P.: What we talk about when we talk about the context. Personal and Ubiquitous Computing 8(1), 19-30 (2004)
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.1
, pp. 19-30
-
-
Dourish, P.1
-
5
-
-
84991061352
-
Social translucence: An approach to designing systems that support social processes
-
Erickson, T., Kellogg, W.A.: Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction 7(1), 59-83 (2000)
-
(2000)
ACM Transactions on Computer-Human Interaction
, vol.7
, Issue.1
, pp. 59-83
-
-
Erickson, T.1
Kellogg, W.A.2
-
6
-
-
79959352770
-
Ubiquitous Data Collection: Rethinking Privacy Debates
-
Breznitz, D., Murphree, M., Goodman, S.: Ubiquitous Data Collection: Rethinking Privacy Debates. Computer 44, 100-102 (2011)
-
(2011)
Computer
, vol.44
, pp. 100-102
-
-
Breznitz, D.1
Murphree, M.2
Goodman, S.3
-
10
-
-
70449636545
-
A model for privacy policy visualization
-
Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: 33rd Annual IEEE International Computer Software and Applications Conference, pp. 335-340 (2009)
-
(2009)
33rd Annual IEEE International Computer Software and Applications Conference
, pp. 335-340
-
-
Ghazinour, K.1
Majedi, M.2
Barker, K.3
-
11
-
-
19944420514
-
Privacy practices of Internet users: Self-reports versus observed behaviour
-
Jensen, C., Potts, C., Jensen, C.: Privacy practices of Internet users: self-reports versus observed behaviour. International Journal of Human-Computer Studies 63, 203-227 (2005)
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
12
-
-
33748252054
-
Digital libraries: What do users want?
-
Kani-Zabihi, E., Ghinea, G., Chen, S.Y.: Digital libraries: what do users want? Online Information Review 30, 395-412 (2006)
-
(2006)
Online Information Review
, vol.30
, pp. 395-412
-
-
Kani-Zabihi, E.1
Ghinea, G.2
Chen, S.Y.3
-
13
-
-
84862154942
-
Service users' requirements for tools to support effective on-line privacy and consent practices
-
The 15th Nordic Conference in Secure IT Systems (NordSec 2010), October 24-30. ACM Press
-
Kani-Zabihi, E., Coles-Kemp, L.: Service users' requirements for tools to support effective on-line privacy and consent practices. In: The 15th Nordic Conference in Secure IT Systems (NordSec 2010), October 24-30. LNCS, pp. 106-120. ACM Press (2010)
-
(2010)
LNCS
, pp. 106-120
-
-
Kani-Zabihi, E.1
Coles-Kemp, L.2
-
14
-
-
84856145794
-
Experiences with Developing a User-Centered Digital Library
-
Kani-Zabihi, E., Ghinea, G., Chen, S.Y.: Experiences with Developing a User-Centered Digital Library. International Journal of Digital Library Systems 1, 1-23 (2010)
-
(2010)
International Journal of Digital Library Systems
, vol.1
, pp. 1-23
-
-
Kani-Zabihi, E.1
Ghinea, G.2
Chen, S.Y.3
-
15
-
-
69549083077
-
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications
-
Karahasanovic, A., Brandtzæg, P.B., Vanattenhoven, J., Lievens, B., Nielsen, K.T., Pierson, J.: Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. Computer 42, 42-49 (2009)
-
(2009)
Computer
, vol.42
, pp. 42-49
-
-
Karahasanovic, A.1
Brandtzæg, P.B.2
Vanattenhoven, J.3
Lievens, B.4
Nielsen, K.T.5
Pierson, J.6
-
16
-
-
33745183962
-
Usable privacy and security for personal information management
-
Karat, C.M., Brodie, C., Karat, J.: Usable privacy and security for personal information management. Communications of the ACM 49, 56-57 (2006)
-
(2006)
Communications of the ACM
, vol.49
, pp. 56-57
-
-
Karat, C.M.1
Brodie, C.2
Karat, J.3
-
17
-
-
70349833881
-
-
last accessed August 5, 2010
-
Information Commissioner's Office "Privacy by Design", http://www.ico.gov.uk/upload/documents/pdb-report-html/index.html (last accessed August 5, 2010)
-
Privacy by Design
-
-
-
19
-
-
77955711162
-
Collaborative Privacy Management
-
Pernul, G., Kolter, J., Kernchen, T.: Collaborative Privacy Management. Computers & Security 29, 580-591 (2010)
-
(2010)
Computers & Security
, vol.29
, pp. 580-591
-
-
Pernul, G.1
Kolter, J.2
Kernchen, T.3
-
20
-
-
29144441877
-
Online Communities; Usability, Sociability, Theory and Methods
-
Earnshaw, R., Guedj, R., van Dam, A., Vince, T. (eds.) Springer, Amsterdam
-
Preece, J.: Online Communities; Usability, Sociability, Theory and Methods. In: Earnshaw, R., Guedj, R., van Dam, A., Vince, T. (eds.) Frontiers of Human-Centred Computing, Online Communities and Virtual Environments, pp. 263-277. Springer, Amsterdam (2001)
-
(2001)
Frontiers of Human-Centred Computing, Online Communities and Virtual Environments
, pp. 263-277
-
-
Preece, J.1
|