-
1
-
-
3242743529
-
Losses, gains, and hyperbolic discounting: An experimental approach to personal information security attitudes and behavior
-
May
-
A. Acquisti and J. Grossklags. Losses, gains, and hyperbolic discounting: An experimental approach to personal information security attitudes and behavior. In Workshop on Economics and Information Security (WEIS), May 2003.
-
(2003)
Workshop on Economics and Information Security (WEIS)
-
-
Acquisti, A.1
Grossklags, J.2
-
2
-
-
14744275332
-
Privacy and rationality in individual decision making
-
DOI 10.1109/MSP.2005.22
-
A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1):26-33, 2005. (Pubitemid 40325579)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
35348834249
-
Privacy in location-aware computing environments
-
DOI 10.1109/MPRV.2007.83
-
D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. IEEE Pervasive Computing, 6:64-72, 2007. (Pubitemid 47594396)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 64-72
-
-
Anthony, D.1
Kotz, D.2
Henderson, T.3
-
4
-
-
80054886190
-
Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
-
M. Benisch, P. Kelley, N. Sadeh, and L. Cranor. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing, 15(7):679-694, 2011.
-
(2011)
Personal and Ubiquitous Computing
, vol.15
, Issue.7
, pp. 679-694
-
-
Benisch, M.1
Kelley, P.2
Sadeh, N.3
Cranor, L.4
-
5
-
-
2942524994
-
Location privacy in pervasive computing
-
IEEE
-
A. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1):46-55, 2003.
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
7
-
-
78650014112
-
Exploring end user preferences for location obfuscation, location-based services, and the value of location
-
A. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 95-104, 2010.
-
(2010)
Proceedings of the 12th ACM International Conference on Ubiquitous Computing
, pp. 95-104
-
-
Brush, A.1
Krumm, J.2
Scott, J.3
-
8
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
-
S. Consolvo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05), pages 81-90, 2005. (Pubitemid 41818729)
-
(2005)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.E.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
9
-
-
84885205576
-
A study on the value of location privacy
-
D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis. A study on the value of location privacy. In Proceedings of the 5th ACM workshop on Privacy in electronic society, pages 109-118, 2006.
-
(2006)
Proceedings of the 5th ACM Workshop on Privacy in Electronic Society
, pp. 109-118
-
-
Cvrcek, D.1
Kumpost, M.2
Matyas, V.3
Danezis, G.4
-
14
-
-
0030421978
-
Re-place-ing space: The roles of place and space in collaborative systems
-
New York, NY, USA, ACM
-
S. Harrison and P. Dourish. Re-place-ing space: the roles of place and space in collaborative systems. In Proceedings of the 1996 ACM conference on Computer supported cooperative work, CSCW '96, pages 67-76, New York, NY, USA, 1996. ACM.
-
(1996)
Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, CSCW '96
, pp. 67-76
-
-
Harrison, S.1
Dourish, P.2
-
15
-
-
27644505323
-
Valuating privacy
-
DOI 10.1109/MSP.2005.137
-
B. A. Huberman, E. Adar, and L. R. Fine. Valuating privacy. IEEE Security and Privacy, 3:22-25, 2005. (Pubitemid 41560440)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
16
-
-
37249070894
-
Mobile social networks and social practice: A case study of Dodgeball
-
L. Humphreys. Mobile social networks and social practice: A case study of Dodgeball. Journal of Computer-Mediated Communication, 13(1):341-360, 2008.
-
(2008)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 341-360
-
-
Humphreys, L.1
-
17
-
-
77957951836
-
Privacy in instant messaging: An impression management model
-
A. Kobsa, S. Patil, and B. Meyer. Privacy in instant messaging: An impression management model. Behaviour & Information Technology, 31(4):355-370, 2012.
-
(2012)
Behaviour & Information Technology
, vol.31
, Issue.4
, pp. 355-370
-
-
Kobsa, A.1
Patil, S.2
Meyer, B.3
-
18
-
-
79958162705
-
I'm the mayor of my house: Examining why people use foursquare - A social-driven location sharing application
-
J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: Examining why people use foursquare - a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11), pages 2409-2418, 2011.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11
, pp. 2409-2418
-
-
Lindqvist, J.1
Cranshaw, J.2
Wiese, J.3
Hong, J.4
Zimmerman, J.5
-
19
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
DOI 10.1287/isre.1040.0032
-
N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet Users' Information Privacy Concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15:336-355, December 2004. (Pubitemid 40192456)
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
20
-
-
79951887862
-
I tweet honestly, i tweet passionately: Twitter users, context collapse, and the imagined audience
-
A. E. Marwick and d. boyd. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1):114-133, 2011.
-
(2011)
New Media & Society
, vol.13
, Issue.1
, pp. 114-133
-
-
Marwick, A.E.1
Boyd, D.2
-
22
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum. Privacy as contextual integrity. Wash. L. Rev., 79:119, 2004.
-
(2004)
Wash. L. Rev.
, Issue.79
, pp. 119
-
-
Nissenbaum, H.1
-
23
-
-
70849136128
-
The circles of latitude: Adoption and usage of location tracking in online social networking
-
X. Page and A. Kobsa. The circles of latitude: Adoption and usage of location tracking in online social networking. In CSE (4), pages 1027-1030, 2009.
-
(2009)
CSE
, Issue.4
, pp. 1027-1030
-
-
Page, X.1
Kobsa, A.2
-
24
-
-
84861301596
-
Who gets to know what when: Configuring privacy permissions in an awareness application
-
CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
-
S. Patil and J. Lai. Who gets to know what when: Configuring privacy permissions in an awareness application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05), pages 101-110, 2005. (Pubitemid 41809047)
-
(2005)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 101-110
-
-
Patil, S.1
Lai, J.2
-
25
-
-
85081878213
-
Check out where i am!": Location sharing motivations, preferences, and practices
-
To appear, May
-
S. Patil, G. Norcie, A. Kapadia, and A. J. Lee. \Check out where I am!": Location sharing motivations, preferences, and practices. In Extended Abstracts of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI EA '12), To appear, May 2012.
-
(2012)
Extended Abstracts of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI EA '12)
-
-
Patil, S.1
Norcie, G.2
Kapadia, A.3
Lee, A.J.4
-
26
-
-
84865020167
-
-
PCWorld: Twitter Now Supports Location-Based Tweets, Mar
-
PCWorld: Twitter Now Supports Location-Based Tweets. http://www.pcworld. com/article/191467/twitter-now-supports-locationbased-tweets.html, Mar. 2010.
-
(2010)
-
-
-
27
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6):401-412, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
29
-
-
33745909933
-
Exploring the privacy implications of addressable advertising and viewer profiling
-
Two Decades of the Language-action Perspective
-
W. Spangler, K. Hartzel, and M. Gal-Or. Exploring the privacy implications of addressable advertising and viewer profiling. Communications of the ACM, 49(5):119-123, 2006. (Pubitemid 44046414)
-
(2006)
Communications of the ACM
, vol.49
, Issue.5
, pp. 119-123
-
-
Spangler, W.E.1
Hartzel, K.S.2
Gal-Or, M.3
-
30
-
-
78649999089
-
Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing
-
K. Tang, J. Lin, J. Hong, D. Siewiorek, and N. Sadeh. Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 85-94, 2010.
-
(2010)
Proceedings of the 12th ACM International Conference on Ubiquitous Computing
, pp. 85-94
-
-
Tang, K.1
Lin, J.2
Hong, J.3
Siewiorek, D.4
Sadeh, N.5
-
32
-
-
78649999355
-
Locaccino: A privacy-centric location sharing application
-
E. Toch, J. Cranshaw, P. Hankes-Drielsma, J. Springfield, P. G. Kelley, L. Cranor, J. Hong, and N. Sadeh. Locaccino: a privacy-centric location sharing application. In Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing, Ubicomp '10, pages 381-382, 2010.
-
(2010)
Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, Ubicomp '10
, pp. 381-382
-
-
Toch, E.1
Cranshaw, J.2
Hankes-Drielsma, P.3
Springfield, J.4
Kelley, P.G.5
Cranor, L.6
Hong, J.7
Sadeh, N.8
-
33
-
-
80055052185
-
Location-sharing technologies: Privacy risks and controls
-
J. Tsai, P. Kelley, L. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. ISJLP, 6:119-317, 2010.
-
(2010)
ISJLP
, vol.6
, pp. 119-317
-
-
Tsai, J.1
Kelley, P.2
Cranor, L.3
Sadeh, N.4
-
34
-
-
84865020169
-
-
Symposium on Usable Privacy and Security
-
Y. Wang, S. Komanduri, P. Leon, G. Norcie, A. Acquisti, and L. Cranor. \I regretted the minute I pressed share": A qualitative study of regrets on facebook. In Symposium on Usable Privacy and Security, 2011.
-
(2011)
I Regretted the Minute i Pressed Share": A Qualitative Study of Regrets on Facebook
-
-
Wang, Y.1
Komanduri, S.2
Leon, P.3
Norcie, G.4
Acquisti, A.5
Cranor, L.6
-
35
-
-
0026483978
-
The active badge location system
-
R. Want, A. Hopper, V. Falcão, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 10(1):91-102, 1992.
-
(1992)
ACM Transactions on Information Systems (TOIS)
, vol.10
, Issue.1
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Falcão, V.3
Gibbons, J.4
|