-
1
-
-
48349085488
-
Ranking Privacy Policy
-
In:. IEEE Computer Society, Los Alamitos
-
Agrawal, R., Grosky, W.I., Fotouhi, F.: Ranking Privacy Policy. In: Proceedings of the 23rd International Conference on Data Engineering Workshops (ICDE 2007), pp. 192-197. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the 23rd International Conference on Data Engineering Workshops (ICDE 2007)
, pp. 192-197
-
-
Agrawal, R.1
Grosky, W.I.2
Fotouhi, F.3
-
5
-
-
37249053884
-
Social Network Sites: Definition, History, and Scholarship
-
Boyd, D.M., Ellison, N.B.: Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication 13(1), 210-230 (2007)
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
6
-
-
0002186644
-
Privacy-enhancing Technologies: Typology, Critique, Vision
-
In: Agre, P.E., Rotenberg, M. (eds.) MIT Press, Cambridge
-
Burkert, H.: Privacy-enhancing Technologies: Typology, Critique, Vision. In: Agre, P.E., Rotenberg, M. (eds.) Technology and Privacy: The New Landscape, pp. 125-142. MIT Press, Cambridge (1997)
-
(1997)
Technology and Privacy: The New Landscape,.
, pp. 125-142
-
-
Burkert, H.1
-
7
-
-
0013243382
-
-
W3C Working Group Note (November)
-
Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J., Schunter, M., Stampley, D., Wenning, R.: The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C Working Group Note (November 2006)
-
(2006)
The Platform for Privacy Preferences 1.1 (P3P1.1) Specification
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
Langheinrich, M.6
Marchiori, M.7
Presler-Marshall, M.8
Reagle, J.9
Schunter, M.10
Stampley, D.11
Wenning, R.12
-
8
-
-
33749617824
-
User Interfaces for Privacy Agents
-
Cranor, L., Guduru, P., Arjula, M.: User Interfaces for Privacy Agents. ACMTransactions on Computer-Human Interaction (TOCHI) 13(2), 135-178 (2006)
-
(2006)
ACMTransactions on Computer-Human Interaction (TOCHI)
, vol.13
, Issue.2
, pp. 135-178
-
-
Cranor, L.1
Guduru, P.2
Arjula, M.3
-
12
-
-
0035034830
-
What Makes Web Sites Credible?: A Report on a Large Quantitative Study
-
In: ACM, New York
-
Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., Treinen, M.: What Makes Web Sites Credible?: A Report on a Large Quantitative Study. In: CHI 2001: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 61-68. ACM, New York (2001)
-
(2001)
CHI 2001: Proceedings of the SIGCHI conference on Human Factors in Computing Systems
, pp. 61-68
-
-
Fogg, B.J.1
Marshall, J.2
Laraki, O.3
Osipovich, A.4
Varma, C.5
Fang, N.6
Paul, J.7
Rangnekar, A.8
Shon, J.9
Swani, P.10
Treinen, M.11
-
15
-
-
84957044012
-
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
-
In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) Springer, Heidelberg
-
Hogben, G., Jackson, T., Wilikens, M.: A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 104-125. Springer, Heidelberg (2002)
-
(2002)
ESORICS 2002. LNCS
, vol.2502
, pp. 104-125
-
-
Hogben, G.1
Jackson, T.2
Wilikens, M.3
-
16
-
-
19944420514
-
Privacy Practices of Internet Users: Self-reports versus Observed Behavior
-
Jensen, C., Potts, C., Jensen, C.: Privacy Practices of Internet Users: Self-reports versus Observed Behavior. International Journal of Human-Computer Studies 63(1-2), 203-227 (2005)
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
17
-
-
19944367736
-
Personal Privacy through Understanding and Action: Five Pitfalls for Designers
-
Lederer, S., Hong, I., Dey, K., Landay, A.: Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8(6), 440-454 (2004)
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, I.2
Dey, K.3
Landay, A.4
-
18
-
-
80052787997
-
-
PRIME white paper, version 3 (May)
-
Leenes, R., Schallaböck, J., Hansen, M.: Privacy and Identity Management for Europe, PRIME white paper, version 3 (May 2008), https://www.prime-project.eu/ prime_products/whitepaper/PRIME-Whitepaper-V3.pdf
-
(2008)
Privacy and Identity Management for Europe
-
-
Leenes, R.1
Schallaböck, J.2
Hansen, M.3
-
20
-
-
34249742078
-
-
OASIS Standard (October)
-
MacKenzie, C.M., Laskey, K., McCabe, F., Brown, P.F., Metz, R.: Reference Model for Service Oriented Architecture 1.0. OASIS Standard (October 2006)
-
(2006)
Reference Model for Service Oriented Architecture 1.0
-
-
McKenzie, C.M.1
Laskey, K.2
McCabe, F.3
Brown, P.F.4
Metz, R.5
-
23
-
-
34547202056
-
How Ordinary Internet Users Can Have a Chance to Influence Privacy Policies
-
In:. ACM Press, New York
-
Pettersson, J., Fischer-Hübner, S., Casassa Mont, M., Pearson, S.: How Ordinary Internet Users Can Have a Chance to Influence Privacy Policies. In: Proceedings of the 4th Nordic conference on Human-computer interaction (NordiCHI 2006), pp. 473-476. ACM Press, New York (2006)
-
(2006)
Proceedings of the 4th Nordic conference on Human-computer interaction (NordiCHI 2006)
, pp. 473-476
-
-
Pettersson, J.1
Fischer-Hübner, S.2
Casassa Mont, M.3
Pearson, S.4
-
24
-
-
34548433382
-
What's Wrong With Online Privacy Policies? Commun
-
Pollach, I.: What's Wrong With Online Privacy Policies? Commun. ACM 50(9), 103-108 (2007)
-
(2007)
ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach, I.1
-
25
-
-
70349677121
-
-
Deliverable D14.2. d (July)
-
Sommer, D., Casassa Mont, M., Pearson, S.: PRIME Architecture version 3, Deliverable D14.2. d (July 2008), https://www.prime-project.eu/prime_products/ reports/arch/pub_del_D14.2.d_ec_WP14.2_v3_Final.pdf
-
(2008)
PRIME Architecture version 3
-
-
Sommer, D.1
Casassa Mont, M.2
Pearson, S.3
|