-
1
-
-
33846981890
-
Trust in PRIME
-
December 18-21, Athens, Greece
-
Andersson, C., Camenisch, J., Crane, S., Fischer-Hübner, S., Leenes, R., Pearson, S., Pettersson, J.S., and Sommer, D., Trust in PRIME, in Proceedings of the 5th IEEE Int. Symposium on Signal Processing and IT, December 18-21, 2005, Athens, Greece.
-
(2005)
Proceedings of the 5th IEEE Int. Symposium on Signal Processing and IT
-
-
Andersson, C.1
Camenisch, J.2
Crane, S.3
Fischer-Hübner, S.4
Leenes, R.5
Pearson, S.6
Pettersson, J.S.7
Sommer, D.8
-
2
-
-
67650342512
-
-
11987/04/EN WP 100, November 25
-
Article 29 Data Protection Working Party, Opinion on More Harmonised Information Provisions, 11987/04/EN WP 100, November 25, 2004. http://ec.europa.eu/justice home/fsj/privacy/docs/wpdocs/2004/wp100 en.pdf.
-
(2004)
Opinion on More Harmonised Information Provisions
-
-
-
3
-
-
78049352261
-
Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technology
-
Springer-Verlag, Heidelberg, Germany
-
Bermann, M., Rost, M., and Pettersson, J.S., Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technology, Proceedings of the Fourteenth International Conference on Information Systems Development (ISD’2005), Karlstad, Sweden, August 2005. Advances in Information Systems Development, Springer-Verlag, Heidelberg, Germany, 2006. 437-448.
-
(2006)
Proceedings of the Fourteenth International Conference on Information Systems Development (ISD’2005), Karlstad, Sweden, August 2005. Advances in Information Systems Development
, pp. 437-448
-
-
Bermann, M.1
Rost, M.2
Pettersson, J.S.3
-
4
-
-
34748922674
-
Dealing with Privacy Obligations: Important Aspects and Technical Approaches
-
Casassa Mont, M., Dealing with Privacy Obligations: Important Aspects and Technical Approaches, in Proceedings of TrustBus’04, 2004.
-
(2004)
Proceedings of TrustBus’04
-
-
Casassa Mont, M.1
-
6
-
-
45949109362
-
Datenschutzfreundliches Identitätsmanagement
-
Clauß, S. and Kriegelstein, T., Datenschutzfreundliches Identitätsmanagement, Datenschutz und Datensicherheit 27, 297, 2003.
-
(2003)
Datenschutz und Datensicherheit
, vol.27
, pp. 297
-
-
Clauß, S.1
Kriegelstein, T.2
-
7
-
-
33749617824
-
User Interfaces for Privacy Agents
-
June
-
Cranor, L.F., Guduru, P., and Arjula, M., User Interfaces for Privacy Agents, ACM Transactions on Computer-Human Interaction 13(2), June 2006.
-
(2006)
ACM Transactions on Computer-Human Interaction
, vol.13
, Issue.2
-
-
Cranor, L.F.1
Guduru, P.2
Arjula, M.3
-
8
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
No. 281, 23.11.1995
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L, No. 281, 23.11.1995.
-
Official Journal L
-
-
-
9
-
-
0003779113
-
-
especially, http://ec.europa.eu/publicopinion/indexen.htm
-
Eurobarometer (2003) http://ec.europa.eu/public opinion/index en.htm, especially: http://ec.europa.eu/public opinion/archives/ebs/ebs 196 data protection.pdf
-
(2003)
Eurobarometer
-
-
-
11
-
-
25444432074
-
RFID and the perception of control: The consumer’s view
-
September
-
Günther, O. and Spiekermann, S., RFID and the perception of control: The consumer’s view, Communications of the ACM 48(9): 73-76, September 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 73-76
-
-
Günther, O.1
Spiekermann, S.2
-
12
-
-
4544286640
-
Privacy policies as decision-making tools: An evaluation of online privacy notices
-
Jensen, C. and Potts, J., Privacy policies as decision-making tools: An evaluation of online privacy notices, CHI 2004, 6, 471-478, 2004.
-
(2004)
CHI 2004
, vol.6
, pp. 471-478
-
-
Jensen, C.1
Potts, J.2
-
13
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloff, J.H.P., and Labuschagne L., Security and human computer interfaces, Computers & Security, vol. 22 (8), 675, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
14
-
-
33745812093
-
Evaluating Interfaces for Privacy Policy Rule Authoring
-
April 22-27, Montreal, Canada
-
Karat, C.-M., Karat, J., Brodie, C., and Feng, J., Evaluating Interfaces for Privacy Policy Rule Authoring, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI 2006, April 22-27, 2006, Montreal, Canada.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI 2006
-
-
Karat, C.-M.1
Karat, J.2
Brodie, C.3
Feng, J.4
-
15
-
-
0347164897
-
Personalized Hypermedia and International Privacy
-
Kobsa, A., Personalized Hypermedia and International Privacy, Communications of the ACM 45(5), 64-67, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.5
, pp. 64-67
-
-
Kobsa, A.1
-
16
-
-
1642399999
-
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interaction
-
Dresden, Germany
-
Patrick, A.S. and Kenny, S., From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interaction, Proceedings of the Privacy Enhancing Technologies Workshop (PET 2003), Dresden, Germany, 2003.
-
(2003)
Proceedings of the Privacy Enhancing Technologies Workshop (PET 2003)
-
-
Patrick, A.S.1
Kenny, S.2
-
17
-
-
77953803072
-
Human Computer Interaction
-
van Blarkom, Borking, Olk, Eds, chap. 12
-
Patrick, A.S., Kenny, S., Holmes, C., and van Breukelen, M., Human Computer Interaction, in Handbook for Privacy and Privacy-Enhancing Technologies, PISA project, van Blarkom, Borking, Olk, Eds., 2002, chap. 12. http://www.andrewpatrick.ca/pisa/handbook/handbook.html
-
(2002)
Handbook for Privacy and Privacy-Enhancing Technologies, PISA project
-
-
Patrick, A.S.1
Kenny, S.2
Holmes, C.3
van Breukelen, M.4
-
18
-
-
33745897920
-
Towards Automated Evaluation of Trust Constraints
-
Springer, Berlin/Heidelberg
-
Pearson, S., Towards Automated Evaluation of Trust Constraints, in Trust Management, LNCS 3986, Springer, Berlin/Heidelberg, 252-266, 2006.
-
(2006)
Trust Management, LNCS 3986
, pp. 252-266
-
-
Pearson, S.1
-
19
-
-
34948857084
-
-
PRIME deliverable D6.1.c, 11 February
-
Pettersson, J.S., Ed., HCI guidance and proposals, PRIME deliverable D6.1.c, 11 February 2005. https://www.prime-project.eu/prime products/reports/arch/
-
(2005)
HCI guidance and proposals
-
-
Pettersson, J.S.1
-
20
-
-
36549058078
-
Making PRIME Usable
-
4-6 June, Carnegie Mellon University, Pittsburg, PA, ACM Digital Library
-
Pettersson, J.S., Fischer-Hübner, S., Danielsson, N., Nilsson, J., Bergmann, M., Kriegelstein, T., Clauss, S., and Krasemann, H., Making PRIME Usable, in Proceedings of the Symposium of Usable Privacy and Security (SOUPS), 4-6 June 2005, Carnegie Mellon University, Pittsburg, PA, ACM Digital Library.
-
(2005)
Proceedings of the Symposium of Usable Privacy and Security (SOUPS)
-
-
Pettersson, J.S.1
Fischer-Hübner, S.2
Danielsson, N.3
Nilsson, J.4
Bergmann, M.5
Kriegelstei, N.T.6
Clauss, S.7
Krasemann, H.8
-
21
-
-
84943603831
-
Outlining Data Track: Privacy-Friendly Data Maintenance for End-Users
-
Budapest, 31 August-2 September, Springer Scientific Publishers, Heidelberg, Germany
-
Pettersson, J.S., Fischer-Hübner, S., and Bergmann, M., Outlining Data Track: Privacy-Friendly Data Maintenance for End-Users, in Proceedings of the 15th International Conference on Information Systems Development (ISD 2006), Budapest, 31 August-2 September 2006, Springer Scientific Publishers, Heidelberg, Germany.
-
(2006)
Proceedings of the 15th International Conference on Information Systems Development (ISD 2006)
-
-
Pettersson, J.S.1
Fischer-Hübner, S.2
Bergmann, M.3
-
22
-
-
85056540290
-
How Ordinary Internet Users Can Have a Chance to Influence Privacy Policies
-
Short paper at, Oslo, 14-18 October, ACM Press, New York
-
Pettersson J.S., Fischer-Hübner, S., Pearsson, P., Casassa Mont, M., How Ordinary Internet Users Can Have a Chance to Influence Privacy Policies, Short paper at Proceedings of the 4th Nordic Conference on Human-Computer Interaction-NordiCHI 2006, Oslo, 14-18 October 2006, ACM Press, New York.
-
(2006)
Proceedings of the 4th Nordic Conference on Human-Computer Interaction-NordiCHI 2006
-
-
Pettersson, J.S.1
Fischer-Hübner, S.2
Pearsson, P.3
Casassa Mont, M.4
-
23
-
-
33745883087
-
-
v0.28, 29 May
-
Pfitzmann, A., and Hansen, M., Anonymity, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology, v0.28, 29 May 2006. http://dud.inf.tu-dresden.de/Anon Terminology.shtml
-
(2006)
Anonymity, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
25
-
-
33846969431
-
How do consumers form their judgment of the security of e-commerce Web sites?
-
April 5-10, Fort Lauderdale, FL
-
Turner, C.W., How do consumers form their judgment of the security of e-commerce Web sites? Workshop on Human-Computer Interaction and Security Systems, CHI2003, April 5-10, 2003, Fort Lauderdale, FL.
-
(2003)
Workshop on Human-Computer Interaction and Security Systems, CHI2003
-
-
Turner, C.W.1
-
26
-
-
38849114169
-
Factors That Affect the Perception of Security and Privacy of e-commerce Web Sites
-
Dallas, TX, November
-
Turner, C.W., Zavod, M., and Yurcik, W., Factors That Affect the Perception of Security and Privacy of e-commerce Web Sites, in Proceedings of the Fourth International Conference on Electronic Commerce Research, Dallas, TX, November 2001.
-
(2001)
Proceedings of the Fourth International Conference on Electronic Commerce Research
-
-
Turner, C.W.1
Zavod, M.2
Yurcik, W.3
|