-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
G. Danezis P. Golle (eds). Springer Berlin 10.1007/119574543
-
A. Acquisti R. Gross 2006 Imagined communities: Awareness, information sharing, and privacy on the facebook G. Danezis P. Golle (eds) Privacy enhancing technologies, Lecture notes in computer science, vol 4258 Springer Berlin 36 58 10.1007/119574543
-
(2006)
Privacy Enhancing Technologies, Lecture Notes in Computer Science, Vol 4258
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
2
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Danezis, G.; Golle, P. (eds) Springer, Berlin doi: 10.1007/119574543
-
Acquisti A.; Gross R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G.; Golle, P. (eds) Privacy enhancing technologies, Lecture notes in computer science, vol 4258, pp. 36-58. Springer, Berlin (2006). doi: 10.1007/119574543
-
(2006)
Privacy Enhancing Technologies, Lecture Notes in Computer Science
, vol.4258
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
3
-
-
77249085149
-
How internet users' privacy concerns have evolved since 2002
-
10.1109/MSP.2010.38
-
A.I. Anton J.B. Earp J.D. Young 2010 How internet users' privacy concerns have evolved since 2002 IEEE. Secur. Priv. 8 1 21 27 10.1109/MSP.2010.38
-
(2010)
IEEE. Secur. Priv.
, vol.8
, Issue.1
, pp. 21-27
-
-
Anton, A.I.1
Earp, J.B.2
Young, J.D.3
-
5
-
-
33750687395
-
The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization
-
N.F. Awad M.S. Krishnan 2006 The personalization privacy paradox: an empirical evaluation of information transparency and the willingeness to be profiled online for personalization MIS Quarterly 30 1 13 28 (Pubitemid 44971423)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.1
, pp. 13-28
-
-
Awad, N.F.1
Krishnan, M.S.2
-
6
-
-
54149089255
-
From awareness to repartee: Sharing location within social groups
-
ACM Press, New York
-
Barkhuus L.; Brown B.; Bell M.; Sherwood S.; Hall M.; Chalmers M.: From awareness to repartee: sharing location within social groups. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pp. 497-506. ACM Press, New York (2008)
-
(2008)
Proceeding of the Twenty-sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 497-506
-
-
Barkhuus, L.1
Brown, B.2
Bell, M.3
Sherwood, S.4
Hall, M.5
Chalmers, M.6
-
7
-
-
80054886190
-
Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
-
10.1007/s00779-010-0346-0
-
M. Benisch P. Kelley N. Sadeh L. Cranor 2011 Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs Pers. Ubiquitous Comput. 15 7 679 694 10.1007/s00779-010-0346-0
-
(2011)
Pers. Ubiquitous Comput.
, vol.15
, Issue.7
, pp. 679-694
-
-
Benisch, M.1
Kelley, P.2
Sadeh, N.3
Cranor, L.4
-
8
-
-
2942524994
-
Location privacy in pervasive computing
-
10.1109/MPRV.2003.1186725
-
A.R. Beresford F. Stajano 2003 Location privacy in pervasive computing IEEE. Pervasive Comput. 2 1 46 55 10.1109/MPRV.2003.1186725
-
(2003)
IEEE. Pervasive Comput.
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
10
-
-
79955854747
-
The privacy jungle: On the market for data protection in social networks
-
T. Moore D. Pym C. Ioannidis (eds). Springer New York
-
Bonneau J.; Preibusch S.: The privacy jungle: On the market for data protection in social networks. In: Moore, T.; Pym, D.; Ioannidis, C. (eds) Economics of information security and privacy, pp. 121-167. Springer, New York (2009)
-
(2009)
Economics of Information Security and Privacy
, pp. 121-167
-
-
Bonneau, J.1
Preibusch, S.2
-
13
-
-
84944392349
-
Model-Driven Design of Web Applications with Client-Side Adaptation
-
Web Engineering
-
Ceri, S.; Dolog, P.; Matera, M.; Nejdl, W.: Model-driven design of web applications with client-side adaptation. In: International conference on web engineering, ICWE'04, vol. 3140, pp. 201-214. Springer, Munich (2004) (Pubitemid 39073536)
-
(2004)
Lecture Notes in Computer Science
, Issue.3140
, pp. 201-214
-
-
Ceri, S.1
Dolog, P.2
Matera, M.3
Nejdl, W.4
-
14
-
-
38849175971
-
Personalized vehicle insurance rates-a case for client-side personalization in ubiquitous computing
-
V. Coroama M. Langheinrich 2006 Personalized vehicle insurance rates-a case for client-side personalization in ubiquitous computing Ubiquitous Comput. Workshop Priv. Enhanced Personal. CHI' 06 22 56 59
-
(2006)
Ubiquitous Comput. Workshop Priv. Enhanced Personal. CHI'
, vol.6
, Issue.22
, pp. 56-59
-
-
Coroama, V.1
Langheinrich, M.2
-
15
-
-
1642301688
-
I didn't buy it for myself: Privacy and ecommerce personalization
-
ACM Press, Washington, DC
-
Cranor, L.F.: I didn't buy it for myself: privacy and ecommerce personalization. In: 2003 ACM workshop on privacy in the electronic society, pp. 111-117 ACM Press, Washington, DC (2003)
-
(2003)
2003 ACM Workshop on Privacy in the Electronic Society
, pp. 111-117
-
-
Cranor, L.F.1
-
17
-
-
35348863728
-
Personalized social & real-time collaborative search
-
DOI 10.1145/1242572.1242810, 16th International World Wide Web Conference, WWW2007
-
Dalal, M.: Personalized social & real-time collaborative search. In: Proceedings of the 16th international conference on World Wide Web, WWW '07, pp. 1285-1286. ACM Press, New York (2007) (Pubitemid 47582423)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 1285-1286
-
-
Dalal, M.1
-
18
-
-
84862792088
-
Report: Marketers limit behavioral targeting due to privacy worries
-
Media Post Report
-
Davis, W.: Report: Marketers limit behavioral targeting due to privacy worries. Tech. rep.; Media Post Report (2010)
-
(2010)
Tech. Rep.
-
-
Davis, W.1
-
20
-
-
84892467344
-
Timing is everything? the effects of timing and placement of online privacy indicators
-
ACM Press, New York
-
Egelman, S.; Tsai, J.; Cranor, L.; Acquisti, A.: Timing is everything? The effects of timing and placement of online privacy indicators. In: Proceedings of the 27th international conference on Human factors in computing systems, pp. 319-328. ACM Press, New York (2009)
-
(2009)
Proceedings of the 27th International Conference on Human Factors in Computing Systems
, pp. 319-328
-
-
Egelman, S.1
Tsai, J.2
Cranor, L.3
Acquisti, A.4
-
21
-
-
84862832338
-
-
Facebook Accessed26April2010
-
Facebook (2010) Facebook instant personalization. http://blog.facebook. com/blog.php?post=384733792130. Accessed 26 April 2010
-
(2010)
Facebook Instant Personalization
-
-
-
22
-
-
84862816968
-
-
Federal Trade Commission: self-regulatory principles for online behavioral advertising
-
Federal Trade Commission: self-regulatory principles for online behavioral advertising. Tech. rep.; Federal Trade Commission (2009)
-
(2009)
Tech. Rep.; Federal Trade Commission
-
-
-
23
-
-
84906449750
-
-
Forrester Consulting: Outbound email and dataloss prevention in today's enterprise AccessedMarch2008
-
Forrester Consulting: Outbound email and dataloss prevention in today's enterprise. http://www.proofpoint.com/outbound (2008). Accessed March 2008
-
(2008)
-
-
-
24
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik L. Liu 2008 Protecting location privacy with personalized k-anonymity: architecture and algorithms IEEE Trans. Mobile Comput. 7 1 1 18 10.1109/TMC.2007.1062 (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
25
-
-
77954613866
-
PersonisJ: Mobile, Client-Side user modeling
-
Springer, Berlin
-
Gerber, S.; Fry, M.; Kay, J.; Kummerfeld, B.; Pink, G.; Wasinger, R. PersonisJ: mobile, Client-Side user modelling. In: International conference on user modeling, adaptation, and personalization, lecture notes in computer science, vol. 6075, pp. 111-122. Springer, Berlin (2010)
-
(2010)
International Conference on User Modeling, Adaptation, and Personalization, Lecture Notes in Computer Science
, vol.6075
, pp. 111-122
-
-
Gerber, S.1
Fry, M.2
Kay, J.3
Kummerfeld, B.4
Pink, G.5
Wasinger, R.6
-
26
-
-
84906451804
-
-
Google
-
Google (2008) Social graph API. http://code.google.com/apis/socialgraph/. Accessed 01 Feb 2008
-
(2008)
Social Graph API
-
-
-
27
-
-
84906452847
-
-
Google
-
Google (2011) Google +1 button - social search. http://www.google.com/+1/ button/. Accessed 01 June 2011
-
(2011)
Google +1 Button - Social Search
-
-
-
28
-
-
2342562393
-
Protecting privacy, in continuous location-tracking applications
-
10.1109/MSECP.2004.1281242
-
M. Gruteser X. Liu 2004 Protecting privacy, in continuous location-tracking applications Secur. Priv. IEEE. 2 2 28 34 10.1109/MSECP.2004. 1281242
-
(2004)
Secur. Priv. IEEE.
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
31
-
-
24644515478
-
Secure identity management for pseudo-anonymous service access
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
Hitchens, M.; Kay, J.; Kummerfeld, B.; Brar, A. Secure identity management for pseudo-anonymous service access. In: Hutter, D.; Ullmann, M. (eds.) Security in pervasive computing: second international conference, pp. 48-55, Boppard (2005) (Pubitemid 41274190)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 48-55
-
-
Hitchens, M.1
Kay, J.2
Kummerfeld, B.3
Brar, A.4
-
32
-
-
33847315663
-
Protecting location privacy through path confusion
-
IEEE Computer Society, Washington
-
Hoh, B.; Gruteser, M.: Protecting location privacy through path confusion. In: Security and privacy for emerging areas in communications networks, 2005. SecureComm 2005. First international conference on security and privacy for emerging areas in communications networks, pp. 194-205. IEEE Computer Society, Washington (2005)
-
(2005)
Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
33
-
-
33646073434
-
Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service
-
Springer-Verlag, Berlin
-
Iachello, G.; Smith, I.; Consolovo, S.; Abowd, G.; Hughes, J.; Howard, J.; Potter, F.; Scott, J.; Sohn, T.; Hightower, J.; LaMarca, A.: Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In: Ubicomp '05, pp. 213-231. Springer-Verlag, Berlin (2005)
-
(2005)
Ubicomp '05
, pp. 213-231
-
-
Iachello, G.1
Smith, I.2
Consolovo, S.3
Abowd, G.4
Hughes, J.5
Howard, J.6
Potter, F.7
Scott, J.8
Sohn, T.9
Hightower, J.10
Lamarca, A.11
-
35
-
-
28244455298
-
Managing private user models and shared personas
-
Johnstown
-
Kay, J.; Kummerfeld, B.; Lauder, P. Managing private user models and shared personas. In: Workshop on user modelling for ubiquitous computing, 9th international conference on user modeling, pp. 1-11. Johnstown (2003)
-
(2003)
Workshop on User Modelling for Ubiquitous Computing, 9th International Conference on User Modeling
, pp. 1-11
-
-
Kay, J.1
Kummerfeld, B.2
Lauder, P.3
-
36
-
-
70349246372
-
User-controllable learning of security and privacy policies
-
ACM Press, Alexandria
-
Kelley, P.G.; Drielsma, P.H.; Sadeh, N.; Cranor, L.F.: User-controllable learning of security and privacy policies. In: Proceedings of the 1st ACM workshop on AISec, pp. 11-18. ACM Press, Alexandria (2008)
-
(2008)
Proceedings of the 1st ACM Workshop on AISec
, pp. 11-18
-
-
Kelley, P.G.1
Drielsma, P.H.2
Sadeh, N.3
Cranor, L.F.4
-
37
-
-
84866024894
-
Explaining the user experience of recommender systems
-
doi: 10.1007/s11257-011-9118-4
-
Knijnenburg, B.P.; Willemsen, M.C.; Gantner, Z.; Soncu, H.; Newell, C.: Explaining the user experience of recommender systems. User Model. User Adapt. Interact. 22 (2012). doi: 10.1007/s11257-011-9118-4
-
(2012)
User Model. User Adapt. Interact.
, vol.22
-
-
Knijnenburg, B.P.1
Willemsen, M.C.2
Gantner, Z.3
Soncu, H.4
Newell, C.5
-
38
-
-
0035042834
-
Generic user modeling systems
-
DOI 10.1023/A:1011187500863
-
A. Kobsa 2001 Generic user modeling systems User Model. User Adapt. Interact. 11 1-2 49 63 1030.68731 10.1023/A:1011187500863 (Pubitemid 32409024)
-
(2001)
User Modelling and User-Adapted Interaction
, vol.11
, Issue.1-2
, pp. 49-63
-
-
Kobsa, A.1
-
41
-
-
85016682337
-
Privacy through pseudonymity in User-Adaptive systems
-
10.1145/767193.767196
-
A. Kobsa J. Schreck 2003 Privacy through pseudonymity in User-Adaptive systems ACM. Trans. Internet Technol. 3 2 149 183 10.1145/767193.767196
-
(2003)
ACM. Trans. Internet Technol.
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
42
-
-
0001290002
-
Personalized hypermedia presentation techniques for improving online customer relationships
-
0987.68821 10.1017/S0269888901000108
-
A. Kobsa J. Koenemann W. Pohl 2001 Personalized hypermedia presentation techniques for improving online customer relationships Knowl. Eng. Rev. 16 111 155 0987.68821 10.1017/S0269888901000108
-
(2001)
Knowl. Eng. Rev.
, vol.16
, pp. 111-155
-
-
Kobsa, A.1
Koenemann, J.2
Pohl, W.3
-
43
-
-
77950494574
-
All my people right here, right now: Management of group co-presence on a social networking site
-
ACM Press, New York
-
Lampinen, A.; Tamminen, S.; Oulasvirta, A.: All my people right here, right now: management of group co-presence on a social networking site. In: GROUP '09: Proceedings of the ACM 2009 international conference on supporting group work, pp. 281-290. ACM Press, New York (2009)
-
(2009)
GROUP '09: Proceedings of the ACM 2009 International Conference on Supporting Group Work
, pp. 281-290
-
-
Lampinen, A.1
Tamminen, S.2
Oulasvirta, A.3
-
44
-
-
56649104920
-
The taste for privacy: An analysis of college student privacy settings in an online social network
-
10.1111/j.1083-6101.2008.01432.x
-
K. Lewis J. Kaufman N. Christakis 2008 The taste for privacy: an analysis of college student privacy settings in an online social network J. Comput. Mediat. Commun. 14 1 79 100 10.1111/j.1083-6101.2008.01432.x
-
(2008)
J. Comput. Mediat. Commun.
, vol.14
, Issue.1
, pp. 79-100
-
-
Lewis, K.1
Kaufman, J.2
Christakis, N.3
-
45
-
-
77956015372
-
Personalize web search results with user's location
-
Geneva
-
Lu, Y.; Peng, F.; Wei, X.; Dumoulin, B.: Personalize web search results with user's location. In: Proceeding of the 33rd international acm sigir conference on research and development in information retrieval, SIGIR 2010, pp. 763-764, Geneva (2010)
-
(2010)
Proceeding of the 33rd International Acm Sigir Conference on Research and Development in Information Retrieval, SIGIR 2010
, pp. 763-764
-
-
Lu, Y.1
Peng, F.2
Wei, X.3
Dumoulin, B.4
-
46
-
-
3543072506
-
Trail re-identification: Learning who you are from where you have been
-
Carnegie Mellon University, Laboratory for international data privacy
-
Malin, B.; Sweeney, L.; Newton, E.: Trail re-identification: learning who you are from where you have been. Technical Report LIDAP-WP12, Carnegie Mellon University, Laboratory for international data privacy (2003)
-
(2003)
Technical Report LIDAP-WP12
-
-
Malin, B.1
Sweeney, L.2
Newton, E.3
-
49
-
-
33750687238
-
Cross system personalization by learning manifold alignments
-
Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, AAAI-06/IAAI-06
-
Mehta, B.: Cross system personalization by learning manifold alignments. In: Proceedings of the 21st national conference on artificial intelligence, Vol. 2, pp. 1920-1921. AAAI Press, Menlo Park (2006) (Pubitemid 44705581)
-
(2006)
Proceedings of the National Conference on Artificial Intelligence
, vol.2
, pp. 1920-1921
-
-
Mehta, B.1
-
51
-
-
26944476274
-
Ontologically-enriched unified user modeling for cross-system personalization
-
L. Ardissono P. Brna A. Mitrovic (eds). Springer Berlin
-
Mehta B.; Niederee C.; Stewart A, Degemmis M.; Lops P.; Semeraro G.: Ontologically-enriched unified user modeling for cross-system personalization. In: Ardissono, L.; Brna, P.; Mitrovic, A. (eds) User Modeling 2005, Lecture notes in computer science, vol. 3538, pp. 119-123. Springer, Berlin (2005)
-
(2005)
User Modeling 2005, Lecture Notes in Computer Science, Vol. 3538
, pp. 119-123
-
-
Mehta, B.1
Niederee, C.2
Stewart, A.3
Degemmis, M.4
Lops, P.5
Semeraro, G.6
-
52
-
-
84906474287
-
-
Microsoft Internet explorer tracking protection lists AccessedSept2010
-
Microsoft Internet explorer tracking protection lists. http://ie.microsoft.com/testdrive/Browser/TrackingProtectionLists (2010). Accessed Sept 2010
-
(2010)
-
-
-
53
-
-
3843049042
-
PocketLens: Toward a personal recommender system
-
10.1145/1010614.1010618
-
B.N. Miller J.A. Konstan J. Riedl 2004 PocketLens: toward a personal recommender system ACM. Trans. Inf. Syst. 22 3 437 476 10.1145/1010614.1010618
-
(2004)
ACM. Trans. Inf. Syst.
, vol.22
, Issue.3
, pp. 437-476
-
-
Miller, B.N.1
Konstan, J.A.2
Riedl, J.3
-
54
-
-
19844376487
-
Your place or mine?: Privacy concerns and solutions for server and client-side storage of personal information
-
ACM Press, Toronto
-
Mulligan, D.; Schwartz, A.: Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information. In: Proceedings of the tenth conference on computers, Freedom and privacy: challenging the assumptions, pp. 81-84. ACM Press, Toronto (2000)
-
(2000)
Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions
, pp. 81-84
-
-
Mulligan, D.1
Schwartz, A.2
-
57
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum 2004 Privacy as contextual integrity Wash. Law Rev. Assoc. 79 119 158
-
(2004)
Wash. Law Rev. Assoc.
, vol.79
, pp. 119-158
-
-
Nissenbaum, H.1
-
59
-
-
84858705793
-
Discovery of web user communities and their role in personalization. User Model
-
Paliouras, G.: Discovery of web user communities and their role in personalization. User Model. User Adapt. Interact. 22(1-2), 151-175 (2012)
-
(2012)
User Adapt. Interact.
, vol.22
, Issue.1-2
, pp. 151-175
-
-
Paliouras, G.1
-
60
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
IEEE Computer Society, Los Alamitos
-
Polat, H.; Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: IEEE international conference on data mining (ICDM'03). IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE International Conference on Data Mining (ICDM'03)
-
-
Polat, H.1
Du, W.2
-
61
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
Santa Fe
-
Polat, H.; Du, W.: SVD-based collaborative filtering with privacy. In: 20th ACM symposium on applied computing, pp. 791-795. Santa Fe (2005)
-
(2005)
20th ACM Symposium on Applied Computing
, pp. 791-795
-
-
Polat, H.1
Du, W.2
-
62
-
-
0035510303
-
Guest editor's introduction: Personalization and privacy
-
DOI 10.1109/4236.968828
-
J. Riedl 2001 Personalization and privacy Internet Comput. IEEE. 5 6 29 31 10.1109/4236.968828 (Pubitemid 33137912)
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 29-31
-
-
Riedl, J.1
-
63
-
-
79551689384
-
Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs
-
USENIX Association, San Jose
-
Ristenpart, T.; Maganis, G.; Krishnamurthy, A.; Kohno, T.: Privacy-preserving location tracking of lost or stolen devices: cryptographic techniques and replacing trusted third parties with DHTs. In: Proceedings of the 17th conference on security symposium, pp. 275-290. USENIX Association, San Jose (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 275-290
-
-
Ristenpart, T.1
Maganis, G.2
Krishnamurthy, A.3
Kohno, T.4
-
64
-
-
34249990939
-
Collaborative filtering recommender systems
-
The Adaptive Web: Methods and Strategies of Web Personalization
-
Schafer J.; Frankowski D.; Herlocker J.; Sen S.: Collaborative filtering recommender systems. In: Brusilovsky, P.; Kobsa, A.; Nejdl, W. (eds) The Adaptive Web, pp. 291-324. Springer-Verlag, Berlin (2007) (Pubitemid 351189201)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4321
, pp. 291-324
-
-
Schafer, J.B.1
Frankowski, D.2
Herlocker, J.3
Sen, S.4
-
67
-
-
77953979544
-
Friends only: Examining a privacy-enhancing behavior in facebook
-
E.D. Mynatt D. Schoner G. Fitzpatrick S.E. Hudson K. Edwards T. Rodden (eds). ACM New York
-
Stutzman F.; Kramer-Duffield J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Mynatt, ED, Schoner, D, Fitzpatrick, G, Hudson, SE, Edwards, K, Rodden, T (eds) CHI, pp. 1553-1562. ACM, New York (2010)
-
(2010)
CHI
, pp. 1553-1562
-
-
Stutzman, F.1
Kramer-Duffield, J.2
-
69
-
-
33745836765
-
Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
Tang, K.P.; Keyani, P.; Fogarty, J.; Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp. 93-102. ACM Press, Montréal (2006) (Pubitemid 44032091)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 93-102
-
-
Tang, K.P.1
Keyani, P.2
Fogarty, J.3
Hong, J.I.4
-
70
-
-
78649998804
-
Empirical models of privacy in location sharing
-
ACM Press, New York
-
Toch, E.; Cranshaw, J.; Drielsma, P.H.; Tsai, J.Y.; Kelley, P.G.; Springfield, J.; Cranor, L.; Hong, J.; Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp. 129-138. ACM Press, New York (2010)
-
(2010)
Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Ubicomp '10
, pp. 129-138
-
-
Toch, E.1
Cranshaw, J.2
Drielsma, P.H.3
Tsai, J.Y.4
Kelley, P.G.5
Springfield, J.6
Cranor, L.7
Hong, J.8
Sadeh, N.9
-
71
-
-
84862792091
-
-
TRUSTe, TNS: 2009 study: consumer attitudes about behavioral targeting
-
TRUSTe, TNS: 2009 study: consumer attitudes about behavioral targeting. Tech. rep.; TRUSTe (2009)
-
(2009)
Tech. Rep.; TRUSTe
-
-
-
73
-
-
79957667271
-
The effect of online privacy information on purchasing behavior: An experimental study
-
10.1287/isre.1090.0260
-
J.Y. Tsai S. Egelman L. Cranor A. Acquisti 2011 The effect of online privacy information on purchasing behavior: an experimental study Inf. Syst. Res. 22 254 268 10.1287/isre.1090.0260
-
(2011)
Inf. Syst. Res.
, vol.22
, pp. 254-268
-
-
Tsai, J.Y.1
Egelman, S.2
Cranor, L.3
Acquisti, A.4
-
74
-
-
77956141828
-
-
Turow, J.; King, J.; Hoofnagle, C.J.; Bleakley, A.; Hennessy, M.: Americans reject tailored advertising and three activities that enable it. http://papers.ssrn.com/sol3/papers.cfm?abstract-id=1478214 (2009). Accessed 29 Sept 2009
-
Americans Reject Tailored Advertising and Three Activities That Enable It
-
-
Turow, J.1
King, J.2
Hoofnagle, C.J.3
Bleakley, A.4
Hennessy, M.5
-
75
-
-
0003034904
-
Personalization and privacy
-
10.1145/345124.345155
-
E. Volokh 2000 Personalization and privacy Commun ACM 43 84 88 10.1145/345124.345155
-
(2000)
Commun ACM
, vol.43
, pp. 84-88
-
-
Volokh, E.1
-
77
-
-
34548290001
-
Impacts of privacy laws and regulations on personalized systems
-
Kobsa, A.; Chellappa, R.K.; Spiekermann, S. (eds.) Montréal
-
Wang, Y.; Kobsa, A.: Impacts of privacy laws and regulations on personalized systems. In: Kobsa, A.; Chellappa, R.K.; Spiekermann, S. (eds.) PEP06 CHI06 workshop on privacy-enhanced personalization, pp. 44-46. Montréal (2006)
-
(2006)
PEP06 CHI06 Workshop on Privacy-enhanced Personalization
, pp. 44-46
-
-
Wang, Y.1
Kobsa, A.2
-
78
-
-
37249048008
-
Respecting users' individual privacy constraints in web personalization
-
User Modeling 2007 - 11th International Conference, UM 2007, Proceedings
-
Wang, Y.; Kobsa, A.: Respecting users' individual privacy constraints in web personalization. In: Conati, C.; McCoy, K.; Paliouras, G. (eds.) UM07, 11th international conference on user modeling, Berlin-Heidelberg-New York, pp. 157-166. Springer-Verlag, Corfu (2007) (Pubitemid 350270978)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4511
, pp. 157-166
-
-
Wang, Y.1
Kobsa, A.2
-
79
-
-
84893087533
-
Who is concerned about what? a study of american, chinese and indian users' privacy concerns on social networking sites
-
Springer, Pittsburgh
-
Wang, Y.; Norcie, G.; Cranor, L.F.: Who is concerned about what? a study of american, chinese and indian users' privacy concerns on social networking sites. In: 4th international conference on trust and trustworthy computing (TRUST2011), Springer, Pittsburgh 2011
-
(2011)
4th International Conference on Trust and Trustworthy Computing (TRUST2011)
-
-
Wang, Y.1
Norcie, G.2
Cranor, L.F.3
-
80
-
-
80055033536
-
Discovering users' specific geo intention in web search
-
CM Press, New York
-
Yi, X.; Raghavan, H.; Leggetter, C.: Discovering users' specific geo intention in web search. In: WWW '09: Proceedings of the 18th international conference on World wide web, pp. 481-490. ACM Press, New York 2009
-
(2009)
WWW '09: Proceedings of the 18th International Conference on World Wide Web
, pp. 481-490
-
-
Yi, X.1
Raghavan, H.2
Leggetter, C.3
|