-
1
-
-
70350568637
-
Uncertain inference control in privacy protection
-
An, X., Jutla, D., Cercone, N., Pluempitiwiriyawej, C., and Wang, H. Uncertain Inference Control in Privacy Protection. International Journal of Information Security 8, 6 (2009), 423431.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.6
, pp. 423431
-
-
An, X.1
Jutla, D.2
Cercone, N.3
Pluempitiwiriyawej, C.4
Wang, H.5
-
2
-
-
35348834249
-
Privacy in location-aware computing environments
-
Anthony, D., Henderson, T., and Kotz, D. Privacy in Location-Aware Computing Environments. IEEE Pervasive Computing 6, 4 (2007), 64.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 64
-
-
Anthony, D.1
Henderson, T.2
Kotz, D.3
-
3
-
-
84862086388
-
The mismeasurement of privacy: Using contextual integrity to reconsider privacy in HCI
-
Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. of ACM CHI (2012), 367-376.
-
(2012)
Proc. of ACM CHI
, pp. 367-376
-
-
Barkhuus, L.1
-
4
-
-
80054886190
-
Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
-
Benisch, M., Kelley, P. G., Sadeh, N., and Cranor, L. F. Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679-694.
-
(2011)
Personal and Ubiquitous Computing
, vol.15
, Issue.7
, pp. 679-694
-
-
Benisch, M.1
Kelley, P.G.2
Sadeh, N.3
Cranor, L.F.4
-
5
-
-
84886597934
-
Predicting location-sharing privacy preferences in social network applications
-
Bigwood, G., Abdesslem, F. B., and Henderson, T. Predicting Location-Sharing Privacy Preferences in Social Network Applications. In Proc. of AwareCast (2012).
-
(2012)
Proc. of AwareCast
-
-
Bigwood, G.1
Abdesslem, F.B.2
Henderson, T.3
-
6
-
-
78650014112
-
Exploring end user preferences for location obfuscation, location-based services, and the value of location
-
Brush, A. J., Krumm, J., and Scott, J. Exploring End User Preferences for Location Obfuscation, Location-Based Services, and the Value of Location. In Proc. of ACM UbiComp (2010).
-
(2010)
Proc. of ACM UbiComp
-
-
Brush, A.J.1
Krumm, J.2
Scott, J.3
-
7
-
-
33645988390
-
Location disclosure to social relations: Why, when, & what people want to share
-
Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proc. of ACM CHI (2005).
-
(2005)
Proc. of ACM CHI
-
-
Consolvo, S.1
Smith, I.2
Matthews, T.3
LaMarca, A.4
Tabert, J.5
Powledge, P.6
-
8
-
-
74049102687
-
Inferring privacy policies for social networking services
-
Danezis, G. Inferring Privacy Policies for Social Networking Services. In Proc. of ACM AISEC (2009).
-
(2009)
Proc. of ACM AISEC
-
-
Danezis, G.1
-
9
-
-
77954614450
-
Privacy wizards for social networking sites
-
Fang, L., and Lefevre, K. Privacy Wizards for Social Networking Sites. In Proc. of ACM WWW (2010).
-
(2010)
Proc. of ACM WWW
-
-
Fang, L.1
Lefevre, K.2
-
10
-
-
84886601171
-
Field deployment of imbuddy: A study of privacy control and feedback mechanisms for contextual im
-
Hsieh, G., Tang, K. P., Low, W. Y., and Hong, J. I. Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM. In Proc. of ACM UbiComp (2007).
-
(2007)
Proc. of ACM UbiComp
-
-
Hsieh, G.1
Tang, K.P.2
Low, W.Y.3
Hong, J.I.4
-
11
-
-
70450172446
-
From spaces to places: Emerging contexts in mobile privacy
-
Mancini, C., Thomas, K., Rogers, Y., Price, B. A., Jedrzejczyk, L., Bandara, A. K., Joinson, A. N., and Nuseibeh, B. From Spaces to Places: Emerging Contexts in Mobile Privacy. In Proc. of ACM UbiComp (2009).
-
(2009)
Proc. of ACM UbiComp
-
-
Mancini, C.1
Thomas, K.2
Rogers, Y.3
Price, B.A.4
Jedrzejczyk, L.5
Bandara, A.K.6
Joinson, A.N.7
Nuseibeh, B.8
-
12
-
-
82655180226
-
Conducting behavioral research on amazons mechanical turk
-
Mason, W., and Suri, S. Conducting Behavioral Research on Amazons Mechanical Turk. Behavior Research Methods 44, 1 (2012), 1-23.
-
(2012)
Behavior Research Methods
, vol.44
, Issue.1
, pp. 1-23
-
-
Mason, W.1
Suri, S.2
-
13
-
-
78650086390
-
Towards security policy decisions based on context profiling
-
Miettinen, M., and Asokan, N. Towards Security Policy Decisions Based on Context Profiling. In Proc. of ACM AISEC (2010).
-
(2010)
Proc. of ACM AISEC
-
-
Miettinen, M.1
Asokan, N.2
-
14
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application
-
Miluzzo, E., Lane, N. D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S. B., Zheng, X., and Campbell, A. T. Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application. In Proc. of ACM SenSys (2008).
-
(2008)
Proc. of ACM SenSys
-
-
Miluzzo, E.1
Lane, N.D.2
Fodor, K.3
Peterson, R.4
Lu, H.5
Musolesi, M.6
Eisenman, S.B.7
Zheng, X.8
Campbell, A.T.9
-
15
-
-
84886597261
-
My privacy policy: Exploring end-user specification of freeform location access rules
-
Patil, S., Gall, Y., Lee, A., and Kapadia, A. My Privacy Policy: Exploring End-User Specification of Freeform Location Access Rules. In Proc. of USEC (2012).
-
(2012)
Proc. of USEC
-
-
Patil, S.1
Gall, Y.2
Lee, A.3
Kapadia, A.4
-
16
-
-
79954506552
-
Littlerock: Enabling energy-efficient continuous sensing on mobile phones
-
IEEE
-
Priyantha, B., Lymberopoulos, D., and Liu, J. Littlerock: Enabling Energy-Efficient Continuous Sensing on Mobile Phones. Pervasive Computing, IEEE 10, 2 (2011), 12-15.
-
(2011)
Pervasive Computing
, vol.10
, Issue.2
, pp. 12-15
-
-
Priyantha, B.1
Lymberopoulos, D.2
Liu, J.3
-
17
-
-
85066372453
-
Progressive authentication: Deciding when to authenticate on mobile phones
-
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D. Progressive Authentication: Deciding When to Authenticate on Mobile Phones. In Proc. of USENIX Security (2012).
-
(2012)
Proc. of USENIX Security
-
-
Riva, O.1
Qin, C.2
Strauss, K.3
Lymberopoulos, D.4
-
18
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing 13, 6 (2009), 401-412.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
Kelley, P.5
Prabaker, M.6
Rao, J.7
-
19
-
-
29244472747
-
Social disclosure of place: From location technology to communication practices
-
Smith, I., Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T., Hughes, J., Iachello, G., and Abowd, G. Social Disclosure of Place: From Location Technology to Communication Practices. Pervasive Computing (2005), 151-164.
-
(2005)
Pervasive Computing
, pp. 151-164
-
-
Smith, I.1
Consolvo, S.2
Lamarca, A.3
Hightower, J.4
Scott, J.5
Sohn, T.6
Hughes, J.7
Iachello, G.8
Abowd, G.9
-
20
-
-
0012095429
-
Connexus to awarenex: Extending awareness to mobile users
-
Tang, J. C., Yankelovich, N., Begole, J., Van Kleek, M., Li, F., and Bhalodia, J. ConNexus to Awarenex: Extending Awareness to Mobile Users. In Proc. of ACM CHI (2001).
-
(2001)
Proc. of ACM CHI
-
-
Tang, J.C.1
Yankelovich, N.2
Begole, J.3
Van Kleek, M.4
Li, F.5
Bhalodia, J.6
-
21
-
-
84891313874
-
The implications of offering more disclosure choices for social location sharing
-
Tang, K., Hong, J., and Siewiorek, D. The Implications of Offering More Disclosure Choices for Social Location Sharing. In Proc. of ACM CHI (2012).
-
(2012)
Proc. of ACM CHI
-
-
Tang, K.1
Hong, J.2
Siewiorek, D.3
-
22
-
-
84886585670
-
Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
-
Tang, K. P., Keyani, P., Fogarty, J., and Hong, J. I. Putting People in Their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications. In Proc. of ACM CHI (2006).
-
(2006)
Proc. of ACM CHI
-
-
Tang, K.P.1
Keyani, P.2
Fogarty, J.3
Hong, J.I.4
-
23
-
-
78649998804
-
Empirical models of privacy in location sharing
-
Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L., Hong, J., and Sadeh, N. Empirical Models of Privacy in Location Sharing. In Proc. of ACM UbiComp (2010).
-
(2010)
Proc. of ACM UbiComp
-
-
Toch, E.1
Cranshaw, J.2
Drielsma, P.H.3
Tsai, J.Y.4
Kelley, P.G.5
Springfield, J.6
Cranor, L.7
Hong, J.8
Sadeh, N.9
-
24
-
-
78649999355
-
Locaccino: A privacy-centric location sharing application
-
adjunct papers
-
Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., Hong, J., and Sadeh, N. Locaccino: A Privacy-centric Location Sharing Application. In Proc. of ACM UbiComp (adjunct papers) (2010).
-
(2010)
Proc. of ACM UbiComp
-
-
Toch, E.1
Cranshaw, J.2
Hankes-Drielsma, P.3
Springfield, J.4
Kelley, P.G.5
Cranor, L.6
Hong, J.7
Sadeh, N.8
-
25
-
-
80054081236
-
Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share
-
Wiese, J., Kelley, P., Cranor, L., Dabbish, L., Hong, J., and Zimmerman, J. Are You Close with Me? Are You Nearby?: Investigating Social Groups, Closeness, and Willingness to Share. In Proc. of ACM UbiComp (2011).
-
(2011)
Proc. of ACM UbiComp
-
-
Wiese, J.1
Kelley, P.2
Cranor, L.3
Dabbish, L.4
Hong, J.5
Zimmerman, J.6
|