-
1
-
-
33644925852
-
A taxonomy of privacy
-
Jan.
-
D. J. Solove, ?A taxonomy of privacy,? University of Pennsylvania Law Review, vol. 154, no. 3, pp. 477-560, Jan. 2006.
-
(2006)
University of Pennsylvania Law Review
, vol.154
, Issue.3
, pp. 477-560
-
-
Solove, D.J.1
-
2
-
-
84993894931
-
Privacy regulation: Culturally universal or culturally specific?
-
I. Altman, ?Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, vol. 33, no. 3, pp. 66-84, 1977.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 66-84
-
-
Altman, I.1
-
3
-
-
84856186485
-
Introduction to P3P
-
O'Reilly & Associates, Inc., ch. 1
-
L. F. Cranor, ?Introduction to P3P,? in Web Privacy with P3P. O'Reilly & Associates, Inc., 2002, ch. 1, pp. 3-11.
-
(2002)
Web Privacy with P3P
, pp. 3-11
-
-
Cranor, L.F.1
-
4
-
-
77955711162
-
Collaborative privacy management
-
J. Kolter, T. Kernchen, and G. Pernul, ?Collaborative privacy management,? Computers & Security, vol. 29, no. 5, pp. 580-591, 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.5
, pp. 580-591
-
-
Kolter, J.1
Kernchen, T.2
Pernul, G.3
-
6
-
-
0000043192
-
Definitions of community: Areas of agreement
-
Jun.
-
G. A. Hillery, ?Definitions of community: areas of agreement,? Rural Sociology, vol. 20, pp. 111-123, Jun. 1955.
-
(1955)
Rural Sociology
, vol.20
, pp. 111-123
-
-
Hillery, G.A.1
-
7
-
-
0001907110
-
Studying personal communities
-
P. Marsden and N. Lin, Eds. Beverly Hills, CA: Sage
-
B. Wellman, ?Studying personal communities,? in Social Structure and Network Analysis, P. Marsden and N. Lin, Eds. Beverly Hills, CA: Sage, 1982, pp. 61-80.
-
(1982)
Social Structure and Network Analysis
, pp. 61-80
-
-
Wellman, B.1
-
8
-
-
84869099387
-
A new perspective on 'community' and its implications for computer-mediated communication systems
-
22-27 Apr.
-
A. Bruckman, ?A new perspective on ?community? and its implications for computer-mediated communication systems,? in Proc. of the Int. Conf. on Human Factors in Computing (CHI 2006), 22-27 Apr. 2006.
-
(2006)
Proc. of the Int. Conf. on Human Factors in Computing (CHI 2006)
-
-
Bruckman, A.1
-
9
-
-
0000582220
-
Keeping organizational secrets: Protective institutional mechanisms and their costs
-
J. P. Liebeskind, ?Keeping organizational secrets: Protective institutional mechanisms and their costs,? Industrial and Corporate Change, vol. 6, no. 3, pp. 623-663, 1997.
-
(1997)
Industrial and Corporate Change
, vol.6
, Issue.3
, pp. 623-663
-
-
Liebeskind, J.P.1
-
10
-
-
84881075471
-
-
last accessed 30 May
-
Google, ?About circles,? http://support.google.com/plus/bin/answer.py?hl= en\&answer=1047805, last accessed 30 May 2012.
-
(2012)
About Circles
-
-
-
12
-
-
0345565893
-
A survey of key management for secure group communication
-
Sep.
-
S. Rafaeli and D. Hutchison, ?A survey of key management for secure group communication,? ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
13
-
-
79958168610
-
We're in it together: Interpersonal management of disclosure in social network services
-
New York: ACM
-
A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, ?We?re in it together: Interpersonal management of disclosure in social network services,? in Proc. of the 2011 Annual Conf. on Human Factors in Comp. Systems (CHI ?11). New York: ACM, 2011, pp. 3217-3226.
-
(2011)
Proc. of the 2011 Annual Conf. on Human Factors in Comp. Systems (CHI ?11)
, pp. 3217-3226
-
-
Lampinen, A.1
Lehtinen, V.2
Lehmuskallio, A.3
Tamminen, S.4
-
14
-
-
1842538795
-
Privacy as contextual integrity
-
Feb.
-
H. F. Nissenbaum, ?Privacy as contextual integrity,? Washington Law Review, vol. 79, no. 1, pp. 119-158, Feb. 2004.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-158
-
-
Nissenbaum, H.F.1
-
15
-
-
33845422335
-
What we talk about when we talk about context
-
Feb.
-
P. Dourish, ?What we talk about when we talk about context,? Personal Ubiquitous Computing, vol. 8, no. 1, pp. 19-30, Feb. 2004.
-
(2004)
Personal Ubiquitous Computing
, vol.8
, Issue.1
, pp. 19-30
-
-
Dourish, P.1
-
17
-
-
33748924513
-
Collective information practice: Emploring privacy and security as social and cultural phenomena
-
Sep.
-
P. Dourish and K. Anderson, ?Collective information practice: emploring privacy and security as social and cultural phenomena,? Human- Computer Interaction, vol. 21, no. 3, pp. 319-342, Sep. 2006.
-
(2006)
Human-Computer Interaction
, vol.21
, Issue.3
, pp. 319-342
-
-
Dourish, P.1
Anderson, K.2
-
18
-
-
0034459145
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
Sep.
-
M. S. Ackerman, ?The intellectual challenge of CSCW: The gap between social requirements and technical feasibility,? Human-Computer Interaction, vol. 15, no. 2 & 3, pp. 179-203, Sep. 2000.
-
(2000)
Human-Computer Interaction
, vol.15
, Issue.2-3
, pp. 179-203
-
-
Ackerman, M.S.1
-
19
-
-
0028429984
-
Computer-supported cooperative work: History and focus
-
May
-
J. Grudin, ?Computer-supported cooperative work: History and focus,? IEEE Computer, vol. 27, no. 5, pp. 19-26, May 1994.
-
(1994)
IEEE Computer
, vol.27
, Issue.5
, pp. 19-26
-
-
Grudin, J.1
-
21
-
-
84872234540
-
Analyzing group communication for preventing data leakage via email
-
Berkeley, CA: USENIX Association
-
P. Zilberman, A. Shabtai, and L. Rokach, ?Analyzing group communication for preventing data leakage via email,? in Proc. of the 2010 international conference on Collaborative methods for security and privacy. Berkeley, CA: USENIX Association, 2010, pp. 5-5.
-
(2010)
Proc. of the 2010 International Conference on Collaborative Methods for Security and Privacy
, pp. 5-5
-
-
Zilberman, P.1
Shabtai, A.2
Rokach, L.3
-
23
-
-
84881031663
-
-
NASCIO, National Association of State Chief Information Offices, Tech. Rep.
-
NASCIO, ?Insider security threats: State CIOs take action now!? National Association of State Chief Information Offices, Tech. Rep., 2007.
-
(2007)
Insider Security Threats: State CIOs Take Action Now!
-
-
-
24
-
-
70350366164
-
Mitigating inadvertent insider threats with incentives
-
R. Dingledine and P. Golle, Eds. Berlin: Springer
-
D. Liu, X. Wang, and L. J. Camp, ?Mitigating inadvertent insider threats with incentives,? in Financial Cryptography and Data Security, R. Dingledine and P. Golle, Eds. Berlin: Springer, 2009, pp. 1-16.
-
(2009)
Financial Cryptography and Data Security
, pp. 1-16
-
-
Liu, D.1
Wang, X.2
Camp, L.J.3
-
25
-
-
84873664690
-
-
Master?s thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, 1 May
-
S. Codio, ?Understanding community privacy through focus group studies,? Master?s thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, 1 May 2012.
-
(2012)
Understanding Community Privacy Through Focus Group Studies
-
-
Codio, S.1
-
26
-
-
79960049010
-
Framework analysis: A qualitative methodology for applied policy research
-
A. Srivastava and S. B. Thomson, ?Framework analysis: A qualitative methodology for applied policy research,? Research Note JOAAG, vol. 4, no. 2, 2009.
-
(2009)
Research Note JOAAG
, vol.4
, Issue.2
-
-
Srivastava, A.1
Thomson, S.B.2
-
27
-
-
84856203506
-
An approach to community-oriented email privacy
-
MIT, Boston, MA, 9-11 Oct.
-
D. Kafura, D. Gracanin, M. Perez-Quinones, T. DeHart, and S. Codio, ?An approach to community-oriented email privacy,? in Proceedings of the 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, MIT, Boston, MA, 9-11 Oct. 2011, pp. 966-973.
-
(2011)
Proceedings of the 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing
, pp. 966-973
-
-
Kafura, D.1
Gracanin, D.2
Perez-Quinones, M.3
Dehart, T.4
Codio, S.5
-
29
-
-
84881056277
-
A case study of community privacy
-
S. Codio, D. Kafura, D. Gracanin, M. Perez-Quinonez, and T. DeHart, ?A case study of community privacy,? in Proceeding of the 2012 Symposium On Usable Privacy and Security (PASSAT 2012), 2012.
-
(2012)
Proceeding of the 2012 Symposium on Usable Privacy and Security (PASSAT 2012)
-
-
Codio, S.1
Kafura, D.2
Gracanin, D.3
Perez-Quinonez, M.4
Dehart, T.5
-
30
-
-
0000320829
-
The right to privacy
-
Dec.
-
S. D. Warren and L. D. Brandeis, ?The right to privacy,? Harward Law Review, vol. 4, no. 5, pp. 193-220, Dec. 1890.
-
(1890)
Harward Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
31
-
-
84873662703
-
-
Ph.D. dissertation, Georgia Inst. of Technology, Atlanta, GA, Dec.
-
K. Caine, ?Exploring everyday privacy behaviors and misclosures,? Ph.D. dissertation, Georgia Inst. of Technology, Atlanta, GA, Dec. 2009.
-
(2009)
Exploring Everyday Privacy Behaviors and Misclosures
-
-
Caine, K.1
|