-
1
-
-
84993783337
-
Thematic networks: An analytic tool for qualitative research
-
Attride-Stirling, J. Thematic networks: an analytic tool for qualitative research. Qualitative Research. 1, 3 (2001) 385-405.
-
(2001)
Qualitative Research
, vol.1
, Issue.3
, pp. 385-405
-
-
Attride-Stirling, J.1
-
4
-
-
84876380912
-
A heuristics approach to understanding privacy-protecting behaviors in digital social environments
-
Kerr, I. Steeves, V. and Lucock, C. [eds]., Oxford University Press
-
Carey, R. and Burkell, J. A heuristics approach to understanding privacy-protecting behaviors in digital social environments. In Kerr, I., Steeves, V., and Lucock, C. [eds]. Lessons from the Identity Trail, Oxford University Press, 2009. 65-82.
-
(2009)
Lessons from the Identity Trail
, pp. 65-82
-
-
Carey, R.1
Burkell, J.2
-
5
-
-
0347480384
-
Empty ethics: The problem with informed consent
-
Corrigan, O. Empty Ethics: the Problem with Informed Consent. Sociol Health Ill. 25, 7 (2003).
-
(2003)
Sociol Health Ill
, vol.25
, pp. 7
-
-
Corrigan, O.1
-
6
-
-
77955574325
-
Revoking consent: A 'blind spot' in data protection law?
-
Curren, L. and Kaye, J., Revoking Consent: A 'blind spot' in data protection law? Computer Law & Security Review, 26 (2010) 273-283.
-
(2010)
Computer Law & Security Review
, vol.26
, pp. 273-283
-
-
Curren, L.1
Kaye, J.2
-
8
-
-
33644969758
-
Protecting privacy and anonymity in pervasive computing: Trends and perspectives
-
Dritsas, S., Gritzalis, D. and & Lambrinoudakis, S Protecting privacy and anonymity in pervasive computing: trends and perspectives TELE. 23 (2006).
-
(2006)
TELE
, vol.23
-
-
Dritsas, S.1
Gritzalis, D.2
Lambrinoudakis, S.3
-
10
-
-
84886590228
-
-
European Commission. Proposed Data Protection Regulation: http://ec.europa.eu/justice/data-protection/document/review2012/com-2012-11-en. pdf.
-
Proposed Data Protection Regulation
-
-
-
12
-
-
33750317326
-
Development of a privacy addendum for open source licenses: Value sensitive design in industry
-
ACM Press
-
Friedman, B., Smith, I., Kahn, P., Consolvo S., Selawski, J. Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry. In Proc. UBICOMP 2006, ACM Press (2006) 194-211.
-
(2006)
Proc. UBICOMP 2006
, pp. 194-211
-
-
Consolvo, S.1
Friedman, B.2
Smith, I.3
Kahn, P.4
Selawski, J.5
-
13
-
-
33750310718
-
Informed consent by design
-
Cranor, L. F. and Garfinkel, S. (Eds.), O'Reilly Media Inc
-
Friedman, B., Lin, P., Miller, J. K. Informed Consent by Design, in: Cranor, L. F. and Garfinkel, S. (Eds.) Security and Usability, O'Reilly Media Inc, (2005). 503-529.
-
(2005)
Security and Usability
, pp. 503-529
-
-
Friedman, B.1
Lin, P.2
Miller, J.K.3
-
16
-
-
60349125188
-
Context-aware systems: A literature review and classification
-
Jong-yi, H., Suh, E. and Kim, S. Context-aware systems: A literature review and classification, Expert Syst Appl. 36 (2009) 8509-8522.
-
(2009)
Expert Syst Appl
, vol.36
, pp. 8509-8522
-
-
Jong-Yi, H.1
Suh, E.2
Kim, S.3
-
17
-
-
84878002243
-
Textured agreements: Re-envisioning electronic consent
-
ACM Press, 2010
-
Kay, M. and Terry, M. 2010. Textured agreements: re-envisioning electronic consent. In Proc. SOUPS '10, ACM Press (2010).
-
(2010)
Proc. SOUPS '10
-
-
Kay, M.1
Terry, M.2
-
18
-
-
85032516501
-
Approaches to consent in canadian data protection law
-
Kerr, I. Steeves, V. and Lucock, C. [eds]., Oxford University Press
-
Lawson, P., & O'Donoghue, M. Approaches to Consent in Canadian Data Protection Law. In Kerr, I., Steeves, V., and Lucock, C. [eds]. Lessons from the Identity Trail, Oxford University Press, 2009. 24-42.
-
(2009)
Lessons from the Identity Trail
, pp. 24-42
-
-
Lawson, P.1
O'Donoghue, M.2
-
19
-
-
84876349948
-
Terms of agreement: Rethinking consent for pervasive computing
-
Luger, E and Rodden, T. Terms of Agreement: Rethinking Consent for Pervasive Computing. Interact Comput. 25, 2 (2013).
-
(2013)
Interact Comput
, vol.25
, Issue.2
-
-
Luger, E.1
Rodden, T.2
-
20
-
-
84885229588
-
Consent for all: Revealing the hidden complexity of terms and conditions
-
ACM Press
-
Luger, E., Moran, S., & Rodden, T. Consent for All: Revealing the Hidden Complexity of Terms and Conditions. Proc CHI 2013. ACM Press, (2013).
-
(2013)
Proc CHI 2013
-
-
Luger, E.1
Moran, S.2
Rodden, T.3
-
23
-
-
0037329215
-
Some limits of informed consent
-
O'Neill, O. Some limits of informed consent, J Med Ethics, 29 (2003), 4-7.
-
(2003)
J Med Ethics
, vol.29
, pp. 4-7
-
-
O'Neill, O.1
-
24
-
-
10844259286
-
Unpacking privacy for a networked world
-
ACM Press
-
Palen, L., Dourish, P. Unpacking Privacy for a Networked World. Proc. CHI 2003, ACM Press (2003).
-
(2003)
Proc. CHI 2003
-
-
Palen, L.1
Dourish, P.2
-
26
-
-
84886597651
-
Blind consent? A social psychological investigation of non-readership of click-through agreements
-
Plaut, V., and Bartlett, R. Blind Consent? A Social Psychological Investigation of Non-Readership of Click-Through Agreements. Law Human Behav. 31, 1 (2007).
-
(2007)
Law Human Behav
, vol.31
, Issue.1
-
-
Plaut, V.1
Bartlett, R.2
-
27
-
-
57049159860
-
Verifiable and revocable expression of consent to processing of aggregated personal data
-
Pöhls, H. C. Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In Proc. ICICS (2008) 279 - 293.
-
(2008)
Proc. ICICS
, pp. 279-293
-
-
Pöhls, H.C.1
-
29
-
-
0005462742
-
Internet privacy and the state
-
Schwartz, P. Internet Privacy and the State. Conn. L. Rev. 32, 820 (2000).
-
(2000)
Conn. L. Rev.
, vol.32
, pp. 820
-
-
Schwartz, P.1
-
30
-
-
2442472242
-
Risk as analysis and risk as feelings: Some thoughts about affect
-
Slovic, P., Finucane, M., Peters, E., and MacGregor, D. Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality, Risk Analysis. 24, 2 (2004).
-
(2004)
Reason, Risk, and Rationality, Risk Analysis
, vol.24
, Issue.2
-
-
Slovic, P.1
Finucane, M.2
Peters, E.3
MacGregor, D.4
-
31
-
-
7644223159
-
Maintaining privacy in pervasive computing - enabling acceptance of sensor-based services
-
Soppera, A, Burbridge, T. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services. BT Technology Journal. 22, 3 (2004). 106-118.
-
(2004)
BT Technology Journal
, vol.22
, Issue.3
, pp. 106-118
-
-
Soppera, A.1
Burbridge, T.2
-
32
-
-
84865772438
-
Reclaiming the social value of privacy
-
Kerr, I. Steeves, V. Lucock, C. [eds]. Oxford University Press
-
Steeves, V. Reclaiming the Social Value of Privacy. In Kerr, I., Steeves, V., Lucock, C. [eds]. Lessons from the Identity Trail. Oxford University Press, 2009. 191-208.
-
(2009)
Lessons from the Identity Trail
, pp. 191-208
-
-
Steeves, V.1
-
33
-
-
84886589335
-
-
VOME - http://www.vome.org.uk/.
-
VOME
-
-
-
34
-
-
70449644839
-
Informational privacy, consent and the "control" of personal data
-
Whitley, E. Informational Privacy, Consent and the "Control" of Personal Data. Information Security Technical Report. 14, 3 (2009). 154-159.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.3
, pp. 154-159
-
-
Whitley, E.1
|