-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
Acquisti, A. and Gross, R. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies. 36-58.
-
(2006)
Privacy Enhancing Technologies
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
2
-
-
67650500737
-
Predicting social security numbers from public data
-
2009
-
Acquisti, A. and Gross, R. 2009. Predicting Social Security Numbers from Public Data. PNAS. 106, 27 (2009), 10975-10980.
-
(2009)
PNAS
, vol.106
, Issue.27
, pp. 10975-10980
-
-
Acquisti, A.1
Gross, R.2
-
4
-
-
80051470467
-
Making space for stories
-
2005
-
Aoki, P. and Woodruff, A. 2005. Making Space for Stories. Proc. CHI 2005 (2005), 181-190.
-
(2005)
Proc. CHI 2005
, pp. 181-190
-
-
Aoki, P.1
Woodruff, A.2
-
5
-
-
74049138834
-
Disappearing for a while - Using white lies in pervasive computing
-
2007
-
Bagüés, S.A., Zeidler, A., Valdivielso, C.F. and Matias, I.R. 2007. Disappearing for a While - Using White Lies in Pervasive Computing. Proc. WPES 2007 (2007), 80-83.
-
(2007)
Proc. WPES 2007
, pp. 80-83
-
-
Bagüés, S.A.1
Zeidler, A.2
Valdivielso, C.F.3
Matias, I.R.4
-
6
-
-
54149089255
-
From awareness to repartee: Sharing location within social groups
-
2008
-
Barkhuus, L., Brown, B., Bell, M., Sherwood, S., Hall, M. and Chalmers, M. 2008. From Awareness to Repartee: Sharing Location within Social Groups. Proc. CHI 2008 (2008), 497-506.
-
(2008)
Proc. CHI 2008
, pp. 497-506
-
-
Barkhuus, L.1
Brown, B.2
Bell, M.3
Sherwood, S.4
Hall, M.5
Chalmers, M.6
-
7
-
-
84878528535
-
The problem of conflicting social spheres: Effects of network structure on experienced tension in social network sites
-
2009
-
Binder, J., Howes, A. and Sutcliffe, A. 2009. The Problem of Conflicting Social Spheres: Effects of Network Structure on Experienced Tension in Social Network Sites. Proc. CHI 2009 (2009), 965-974.
-
(2009)
Proc. CHI 2009
, pp. 965-974
-
-
Binder, J.1
Howes, A.2
Sutcliffe, A.3
-
9
-
-
77956181580
-
Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging
-
2010
-
Birnholtz, J. 2010. Adopt, Adapt, Abandon: Understanding Why Some Young Adults Start, and then Stop, Using Instant Messaging. Computers in Human Behavior. 26, 6 (2010), 1427-1433.
-
(2010)
Computers in Human Behavior
, vol.26
, Issue.6
, pp. 1427-1433
-
-
Birnholtz, J.1
-
10
-
-
77950892034
-
On my way: Deceptive texting and interpersonal awareness narratives
-
2010
-
Birnholtz, J., Guillory, J., Hancock, J. and Bazarova, N. 2010. "on my way": Deceptive Texting and Interpersonal Awareness Narratives. Proc. CSCW 2010 (2010), 1-4.
-
(2010)
Proc. CSCW 2010
, pp. 1-4
-
-
Birnholtz, J.1
Guillory, J.2
Hancock, J.3
Bazarova, N.4
-
11
-
-
78650014424
-
The domestic panopticon: Location tracking in families
-
2010
-
Boesen, J., Rode, J.A. and Mancini, C. 2010. The Domestic Panopticon: Location Tracking in Families. Proc. UbiComp 2010 (2010), 65-74.
-
(2010)
Proc. UbiComp 2010
, pp. 65-74
-
-
Boesen, J.1
Rode, J.A.2
Mancini, C.3
-
12
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
2007
-
Boyd, D.M. and Ellison, N.B. 2007. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication. 13, 1 (2007), 210-230.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
13
-
-
38149063519
-
Locating family values: A field trial of the whereabouts clock
-
2007
-
Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. 2007. Locating Family Values: A Field Trial of the Whereabouts Clock. Proc. UbiComp 2007 (2007), 354-371.
-
(2007)
Proc. UbiComp 2007
, pp. 354-371
-
-
Brown, B.1
Taylor, A.2
Izadi, S.3
Sellen, A.4
Kaye, J.5
Eardley, R.6
-
14
-
-
0030201356
-
Interpersonal deception theory
-
1996
-
Buller, D.B. and Burgoon, J.K. 1996. Interpersonal Deception Theory. Communication Theory. 6, 3 (1996), 203-242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
15
-
-
0017120884
-
Construct validity of the lie scale as a measure of defensiveness
-
1976
-
Burish, T.G. and Houston, B.K. 1976. Construct Validity of the Lie scale as a Measure of Defensiveness. Journal of Clinical Psychology. 32, 2 (1976), 310-314.
-
(1976)
Journal of Clinical Psychology
, vol.32
, Issue.2
, pp. 310-314
-
-
Burish, T.G.1
Houston, B.K.2
-
16
-
-
3843149546
-
Deception in computer- mediated communication
-
2004
-
Carlson, J.R., George, J.F., Burgoon, J.K., Adkins, M. and White, C.H. 2004. Deception in Computer- Mediated Communication. Group Decision and Negotiation. 13, (2004), 5-28.
-
(2004)
Group Decision and Negotiation
, vol.13
, pp. 5-28
-
-
Carlson, J.R.1
George, J.F.2
Burgoon, J.K.3
Adkins, M.4
White, C.H.5
-
17
-
-
33644938092
-
Online deception: Prevalence, motivation, and emotion
-
2006
-
Caspi, A. and Gorsky, P. 2006. Online Deception: Prevalence, Motivation, and Emotion. CyberPsychology & Behavior. 9, (2006), 54-59.
-
(2006)
CyberPsychology & Behavior
, vol.9
, pp. 54-59
-
-
Caspi, A.1
Gorsky, P.2
-
18
-
-
84861295423
-
Location disclosure to social relations: Why, when, & what people want to share
-
2005
-
Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J. and Powledge, P. 2005. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI 2005 (2005), 81- 90.
-
(2005)
Proc. CHI 2005
, pp. 81-90
-
-
Consolvo, S.1
Smith, I.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
20
-
-
0030136790
-
Lying in everyday life
-
1996
-
DePaulo, B.M., Kashy, D.A., Kirkendol, S.E., Wyer, M.M. and Epstein, J.A. 1996. Lying in Everyday Life. Journal of Personality and Social Psychology. 70, 5 (1996), 979-995.
-
(1996)
Journal of Personality and Social Psychology
, vol.70
, Issue.5
, pp. 979-995
-
-
DePaulo, B.M.1
Kashy, D.A.2
Kirkendol, S.E.3
Wyer, M.M.4
Epstein, J.A.5
-
21
-
-
84890783585
-
Microblogging inside and outside the workplace
-
2010
-
Ehrlich, K. and Shami, N.S. 2010. Microblogging Inside and Outside the Workplace. Proc. ICWSM 2010 (2010).
-
(2010)
Proc. ICWSM 2010
-
-
Ehrlich, K.1
Shami, N.S.2
-
24
-
-
0000670471
-
The dual nature of the EPQ lie scale among college students in England
-
1991
-
Francis, L.J. 1991. The Dual Nature of the EPQ Lie Scale Among College Students in England. Personality and Individual Differences. 12, 12 (1991), 1255-1260.
-
(1991)
Personality and Individual Differences
, vol.12
, Issue.12
, pp. 1255-1260
-
-
Francis, L.J.1
-
27
-
-
77950902501
-
Butler lies: Awareness, deception and design
-
2009
-
Hancock, J., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J. and Amos, B. 2009. Butler Lies: Awareness, Deception and Design. Proc. CHI 2009 (2009), 517-526.
-
(2009)
Proc. CHI 2009
, pp. 517-526
-
-
Hancock, J.1
Birnholtz, J.2
Bazarova, N.3
Guillory, J.4
Perlin, J.5
Amos, B.6
-
28
-
-
4444290892
-
Deception and design: The impact of communication technology on lying behavior
-
2004
-
Hancock, J.T., Thom-Santelli, J. and Ritchie, T. 2004. Deception and design: the impact of communication technology on lying behavior. Proc. CHI 2004 (2004), 129-134.
-
(2004)
Proc. CHI 2004
, pp. 129-134
-
-
Hancock, J.T.1
Thom-Santelli, J.2
Ritchie, T.3
-
29
-
-
85061351254
-
Escaping information poverty through internet newsgroups
-
2011
-
Hasler, L. and Ruthven, I. 2011. Escaping Information Poverty through Internet Newsgroups. Proc. ICWSM 2011 (2011).
-
(2011)
Proc. ICWSM 2011
-
-
Hasler, L.1
Ruthven, I.2
-
31
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
2004
-
Hong, J. and Landay, J. 2004. An architecture for privacy-sensitive ubiquitous computing. Proc. MobiSys 2004 (2004), 177 - 189.
-
(2004)
Proc. MobiSys 2004
, pp. 177-189
-
-
Hong, J.1
Landay, J.2
-
32
-
-
37249070894
-
Mobile social networks and social practice: A case study of dodgeball
-
2007
-
Humphreys, L. 2007. Mobile Social Networks and Social Practice: A Case Study of Dodgeball. Journal of Computer-Mediated Communication. 13, 1 (2007), 341-360.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 341-360
-
-
Humphreys, L.1
-
33
-
-
33646073434
-
Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service
-
2005
-
Iachello, G., Smith, I., Consolvo, S., Abowd, G.D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J. and LaMarca, A. 2005. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. Proc. UbiComp 2005 (2005), 213-231.
-
(2005)
Proc. UbiComp 2005
, pp. 213-231
-
-
Iachello, G.1
Smith, I.2
Consolvo, S.3
Abowd, G.D.4
Hughes, J.5
Howard, J.6
Potter, F.7
Scott, J.8
Sohn, T.9
Hightower, J.10
LaMarca, A.11
-
38
-
-
0002557991
-
Impression management: A literature review and two- component model
-
1990
-
Leary, M.R. and Kowalski, R.M. 1990. Impression Management: A Literature Review and Two- Component Model. Psychological Bulletin. 107, 1 (1990), 34-47.
-
(1990)
Psychological Bulletin
, vol.107
, Issue.1
, pp. 34-47
-
-
Leary, M.R.1
Kowalski, R.M.2
-
39
-
-
0028540788
-
Self-presentation can be hazardous to your health: Impression management and health risk
-
1994
-
Leary, M.R., Tchividijian, L.R. and Kraxberger, B.E. 1994. Self-Presentation Can Be Hazardous to Your Health: Impression Management and Health Risk. Health Psychology. 13, 6 (1994), 461-470.
-
(1994)
Health Psychology
, vol.13
, Issue.6
, pp. 461-470
-
-
Leary, M.R.1
Tchividijian, L.R.2
Kraxberger, B.E.3
-
40
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
2004
-
Lederer, S., Hong, J.I., Dey, A.K. and Landay, J.A. 2004. Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing. 8, 6 (2004), 440-454.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
41
-
-
84869078915
-
Who wants to know what when? Privacy preference determinants in ubiquitous computing
-
2003
-
Lederer, S., Mankoff, J. and Dey, A.K. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. Ext. Abstracts CHI 2003 (2003), 724-725.
-
(2003)
Ext. Abstracts CHI 2003
, pp. 724-725
-
-
Lederer, S.1
Mankoff, J.2
Dey, A.K.3
-
43
-
-
77956979952
-
Sharing location in online social networks
-
Li, N. and Chen, G. 2010. Sharing location in online social networks. IEEE Network.
-
(2010)
IEEE Network
-
-
Li, N.1
Chen, G.2
-
44
-
-
0000019857
-
Comparison of EPI and psychoticism scales with measures of the five-factor model of personality
-
1985
-
McCrae, R.R. and Costa Jr., P.T. 1985. Comparison of EPI and Psychoticism Scales with Measures of the Five-Factor Model of Personality. Personality and Individual Differences. 6, 5 (1985), 587-597.
-
(1985)
Personality and Individual Differences
, vol.6
, Issue.5
, pp. 587-597
-
-
McCrae, R.R.1
Costa Jr., P.T.2
-
45
-
-
20344361892
-
Blogging as social activity, or, would you let 900 million people read your diary?
-
2004
-
Nardi, B.A., Schiano, D.J. and Gumbrecht, M. 2004. Blogging as Social Activity, or, Would You Let 900 Million People Read your Diary? Proc. CSCW 2004 (2004), 222-231.
-
(2004)
Proc. CSCW 2004
, pp. 222-231
-
-
Nardi, B.A.1
Schiano, D.J.2
Gumbrecht, M.3
-
47
-
-
0034214459
-
What you don't know won't hurt me: Impression management functions of communication channels in relationships
-
2000
-
O'Sullivan, B. 2000. What You Don't Know Won't Hurt Me: Impression Management Functions of Communication Channels in Relationships. Human Communication Research. 26, 3 (2000), 403-431.
-
(2000)
Human Communication Research
, vol.26
, Issue.3
, pp. 403-431
-
-
O'Sullivan, B.1
-
49
-
-
0001229464
-
Information technology and the structuring of organizations
-
1991
-
Orlikowski, W. and Robey, D. 1991. Information Technology and the Structuring of Organizations. Information Systems Research. 2, 2 (1991), 143-169.
-
(1991)
Information Systems Research
, vol.2
, Issue.2
, pp. 143-169
-
-
Orlikowski, W.1
Robey, D.2
-
50
-
-
81255198121
-
Navigating the social terrain with google latitude
-
2010
-
Page, X. and Kobsa, A. 2010. Navigating the Social Terrain with Google Latitude. iConference 2010 (2010).
-
(2010)
IConference 2010
-
-
Page, X.1
Kobsa, A.2
-
51
-
-
70849136128
-
The circles of latitude: Adoption and usage of location tracking in online social networking
-
2009
-
Page, X. and Kobsa, A. 2009. The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social Networking. CSE 2009 (2009), 1027-1030.
-
(2009)
CSE 2009
, pp. 1027-1030
-
-
Page, X.1
Kobsa, A.2
-
52
-
-
84890665186
-
Don't disturb my circles! Boundary preservation is at the center of location-sharing concerns
-
2012
-
Page, X., Kobsa, A. and Knijnenburg, B.P. 2012. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns. Proc. ICWSM 2012 (2012).
-
(2012)
Proc. ICWSM 2012
-
-
Page, X.1
Kobsa, A.2
Knijnenburg, B.P.3
-
53
-
-
0038037379
-
Unpacking privacy for a networked world
-
2003
-
Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proc. CHI 2003 (2003), 129-136.
-
(2003)
Proc. CHI 2003
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
54
-
-
79955151003
-
With a little help from my friends: Can social navigation inform interpersonal privacy preferences?
-
2011
-
Patil, S., Page, X. and Kobsa, A. 2011. With a little help from my friends: can social navigation inform interpersonal privacy preferences? CSCW 2011 (2011), 391-394.
-
(2011)
CSCW 2011
, pp. 391-394
-
-
Patil, S.1
Page, X.2
Kobsa, A.3
-
55
-
-
34548548610
-
Two-component models of socially desirable responding
-
1984
-
Paulhus, D.L. 1984. Two-component Models of Socially Desirable Responding. Journal of Personality and Social Psychology. 46, 3 (1984), 598-609.
-
(1984)
Journal of Personality and Social Psychology
, vol.46
, Issue.3
, pp. 598-609
-
-
Paulhus, D.L.1
-
56
-
-
0001548407
-
The dual nature of the eysenckian lie scales: Are religious adolescents more truthful?
-
1989
-
Pearson, P.R. and Francis, L.J. 1989. The Dual Nature of the Eysenckian Lie Scales: Are Religious Adolescents More Truthful? Personality and Individual Differences. 10, 10 (1989), 1041-1048.
-
(1989)
Personality and Individual Differences
, vol.10
, Issue.10
, pp. 1041-1048
-
-
Pearson, P.R.1
Francis, L.J.2
-
57
-
-
51649088942
-
Designing for privacy and self-presentation in social awareness
-
2008
-
Raento, M. and Oulasvirta, A. 2008. Designing for Privacy and Self-presentation in Social Awareness. Personal and Ubiquitous Computing. 12, 7 (2008), 527-542.
-
(2008)
Personal and Ubiquitous Computing
, vol.12
, Issue.7
, pp. 527-542
-
-
Raento, M.1
Oulasvirta, A.2
-
58
-
-
0029556440
-
Eysenck personality inventory l-scores in patients with hodgkin's disease and non-hodgkin's lymphoma
-
1995
-
Ratcliffe, M.A., Dawson, A.A. and Walker, L.G. 1995. Eysenck Personality Inventory L-scores in Patients with Hodgkin's Disease and Non-Hodgkin's Lymphoma. Psycho-Oncology. 4, 1 (1995), 39-45.
-
(1995)
Psycho-Oncology
, vol.4
, Issue.1
, pp. 39-45
-
-
Ratcliffe, M.A.1
Dawson, A.A.2
Walker, L.G.3
-
59
-
-
0018405269
-
Self-deception, other-deception, and self-reported psychopathology
-
1979
-
Sackeim, H.A. and Gur, R.C. 1979. Self-deception, Other-deception, and Self-reported Psychopathology. Journal of Consulting and Clinical Psychology. 47, 1 (1979), 213-215.
-
(1979)
Journal of Consulting and Clinical Psychology
, vol.47
, Issue.1
, pp. 213-215
-
-
Sackeim, H.A.1
Gur, R.C.2
-
60
-
-
77952989341
-
Beyond the user: Use and non-use in HCI
-
2009
-
Satchell, C. and Dourish, P. 2009. Beyond the User: Use and Non-use in HCI. Proc. OZCHI 2009 (2009), 9-16.
-
(2009)
Proc. OZCHI 2009
, pp. 9-16
-
-
Satchell, C.1
Dourish, P.2
-
63
-
-
10044229196
-
Managing one's social network: Does age make a difference?
-
2003
-
Smith, H.J. and Rogers, Y. 2003. Managing One's Social Network: Does Age Make a Difference? Proc. Interact 2003 (2003).
-
(2003)
Proc. Interact 2003
-
-
Smith, H.J.1
Rogers, Y.2
-
65
-
-
77953979544
-
Friends only: Examining a privacy-enhancing behavior in facebook
-
2010
-
Stutzman, F. and Kramer-Duffield, J. 2010. Friends Only: Examining a Privacy-enhancing Behavior in Facebook. Proc. CHI 2010 (2010), 1553-1562.
-
(2010)
Proc. CHI 2010
, pp. 1553-1562
-
-
Stutzman, F.1
Kramer-Duffield, J.2
-
66
-
-
78649999089
-
Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing
-
2010
-
Tang, K.P., Lin, J., Hong, J.I., Siewiorek, D.P. and Sadeh, N. 2010. Rethinking Location Sharing: Exploring the Implications of Social-driven vs. Purpose-driven Location Sharing. Proc. UbiComp 2010 (2010), 85-94.
-
(2010)
Proc. UbiComp 2010
, pp. 85-94
-
-
Tang, K.P.1
Lin, J.2
Hong, J.I.3
Siewiorek, D.P.4
Sadeh, N.5
-
67
-
-
80055052185
-
Location-sharing technologies: Privacy risks and controls
-
2010
-
Tsai, J.Y., Kelley, P., Cranor, L.F. and Sadeh, N. 2010. Location-Sharing Technologies: Privacy Risks and Controls. I/S: A Journal of Law and Policy for the Information Society. 6, 1 (2010), 119-151.
-
(2010)
I/S: A Journal of Law and Policy for the Information Society
, vol.6
, Issue.1
, pp. 119-151
-
-
Tsai, J.Y.1
Kelley, P.2
Cranor, L.F.3
Sadeh, N.4
-
68
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
2008
-
Tufekci, Z. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society. 28, 1 (2008), 20 -36.
-
(2008)
Bulletin of Science, Technology & Society
, vol.28
, Issue.1
, pp. 20-36
-
-
Tufekci, Z.1
-
69
-
-
84874880467
-
White cyberlies: The use of deceptive instant messaging statuses as a social norm
-
2008
-
Vanden Abeele, M. and Roe, K. 2008. White Cyberlies: the Use of Deceptive Instant Messaging Statuses as a Social Norm. Proc. ICA 2008 (2008).
-
(2008)
Proc. ICA 2008
-
-
Vanden Abeele, M.1
Roe, K.2
-
70
-
-
0026483978
-
The active badge location system
-
1992
-
Want, R., Hopper, A., Falcão, V. and Gibbons, J. 1992. The Active Badge Location System. ACM Transactions on Information Systerms. 10, 1 (1992), 91-102.
-
(1992)
ACM Transactions on Information Systerms
, vol.10
, Issue.1
, pp. 91-102
-
-
Want, R.1
Hopper, A.2
Falcão, V.3
Gibbons, J.4
-
71
-
-
0000320829
-
The right to privacy
-
1890
-
Warren, S. and Brandeis, L.D. 1890. The Right to Privacy. Harvard Law Review. 4, 5 (1890), 193-220.
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.D.2
-
73
-
-
80054081236
-
Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share
-
2011
-
Wiese, J., Kelley, P.G., Cranor, L.F., Dabbish, L., Hong, J.I. and Zimmerman, J. 2011. Are You Close with Me? Are You Nearby?: Investigating Social Groups, Closeness, and Willingness to Share. Proc. UbiComp 2011 (2011), 197-206.
-
(2011)
Proc. UbiComp 2011
, pp. 197-206
-
-
Wiese, J.1
Kelley, P.G.2
Cranor, L.F.3
Dabbish, L.4
Hong, J.I.5
Zimmerman, J.6
-
74
-
-
84874928398
-
Three-quarters of smartphone owners use location-based services
-
Zickuhr, K. 2012. Three-quarters of smartphone owners use location-based services. Pew Internet & American Life Project.
-
(2012)
Pew Internet & American Life Project
-
-
Zickuhr, K.1
|