-
1
-
-
84869105817
-
Developing for privacy: Civility frameworks and technical design
-
Ackerman, M. S. (2000). Developing for privacy: Civility frameworks and technical design. Proc. Computers, Freedom, & Privacy, 19-23.
-
(2000)
Proc. Computers Freedom, & Privacy
, pp. 19-23
-
-
Ackerman, M.S.1
-
2
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
Ackerman, M. S., Cranor, L. F., and Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proc. ACM Conference on Electronic Commerce, 1-8.
-
(1999)
Proc ACM Conference on Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
3
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. ECSCW-93, 77- 92.
-
(1993)
ECSCW-93
, pp. 77-92
-
-
Bellotti, V.1
Sellen, A.2
-
4
-
-
84965695389
-
Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory
-
Butler, J. K. (1991). Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. Journal of Management, 17, 643-663.
-
(1991)
Journal of Management
, vol.17
, pp. 643-663
-
-
Butler, J.K.1
-
7
-
-
24944533651
-
Managing personal information disclosure in ubiquitous computing environments
-
Lederer, S., Beckmann, C., Dey, A., & Mankoff, J. (2003). Managing personal information disclosure in ubiquitous computing environments. Intel Research Berkeley Technical Report 03-015.
-
(2003)
Intel Research Berkeley Technical Report
, pp. 03-015
-
-
Lederer, S.1
Beckmann, C.2
Dey, A.3
Mankoff, J.4
-
8
-
-
84869078915
-
-
Lederer, S., Dey, A. K., & Mankoff, J. (2003). Who wants to know what when? Privacy preference determinants in ubiquitous computing CY 2003 Shortpapers, 724-725.
-
(2003)
Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing CY 2003 Shortpapers
, pp. 724-725
-
-
Lederer, S.1
Dey, A.K.2
Mankoff, J.3
-
9
-
-
34547685339
-
Toward understanding preferences for sharing and privacy
-
Olson, J.S., Grudin, J., & Horvitz, E. (2004). Toward understanding preferences for sharing and privacy. MSR Technical Report 2004-138.ftp://ftp. research.microsoft.com/pub/tr/TR-2004-138.pdf
-
(2004)
MSR Technical Report 2004-138
-
-
Olson, J.S.1
Grudin, J.2
Horvitz, E.3
-
10
-
-
0033489645
-
Optimistic security: A new access control paradigm
-
Povey, D. (1999). Optimistic security: A new access control paradigm. Proc. ACM New Security Paradigms Workshop, 40-45.
-
(1999)
Proc ACM New Security Paradigms Workshop
, pp. 40-45
-
-
Povey, D.1
-
11
-
-
0038336804
-
A new dimension in access control: Studying maintenance engineering across organizational boundaries
-
Stevens, G. & Wulf, V. (2002). A new dimension in access control: Studying maintenance engineering across organizational boundaries. Proc. CSCW 2002, 196-205.
-
(2002)
Proc. CSCW
, vol.2002
, pp. 196-205
-
-
Stevens, G.1
Wulf, V.2
-
12
-
-
0034382528
-
Beyond 'yes or no'- Extending access control in groupware with awareness and negotiation
-
Stiemerling. O., & Wulf, V. (2000). Beyond 'yes or no'- Extending access control in groupware with awareness and negotiation. Group Decision and Negotiation, 9, 221-235.
-
(2000)
Group Decision and Negotiation
, vol.9
, pp. 221-235
-
-
Stiemerling, O.1
Wulf, V.2
|