-
1
-
-
0034396278
-
Protecting privacy online: Is self-regulation working?
-
Culnan MJ (2000) Protecting privacy online: is self-regulation working? J Public Policy Market 19(1):20-26
-
(2000)
J Public Policy Market
, vol.19
, Issue.1
, pp. 20-26
-
-
Culnan, M.J.1
-
3
-
-
84900498777
-
Privacy by design
-
Fisher S (2001) Privacy by design. Info World 23(27):20-22
-
(2001)
Info World
, vol.23
, Issue.27
, pp. 20-22
-
-
Fisher, S.1
-
5
-
-
0033464665
-
Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation
-
Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104-115
-
(1999)
Organ Sci
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
6
-
-
0010932017
-
Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity
-
Agre PE, Rotenberg M (eds) MIT Press, Cambridge, Massachusetts
-
Davies SG (1997) Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity. In: Agre PE, Rotenberg M (eds) Technology and privacy: the new landscape. MIT Press, Cambridge, Massachusetts
-
(1997)
Technology and Privacy: The New Landscape
-
-
Davies, S.G.1
-
9
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quart 20(2):167-196
-
(1996)
MIS Quart
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
11
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
Denver, Colorado, November 1999
-
Ackerman MS, Cranor L, Reagle J (1999) Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of ACM conference on electronic commerce (EC'99), Denver, Colorado, November 1999, pp 1-8
-
(1999)
Proceedings of ACM Conference on Electronic Commerce (EC'99)
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.2
Reagle, J.3
-
12
-
-
0038588436
-
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
-
Tampa, Florida, October 2001
-
Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: Proceedings of ACM conference on electronic commerce (EC 2001), Tampa, Florida, October 2001, pp 38-46
-
(2001)
Proceedings of ACM Conference on Electronic Commerce (EC 2001)
, pp. 38-46
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
13
-
-
85001759514
-
Internet privacy: Interpreting key issues
-
Dhillon GS, Moores TT (2001) Internet privacy: interpreting key issues. Inf Resources Manag J 14(4):33-37
-
(2001)
Inf Resources Manag J
, vol.14
, Issue.4
, pp. 33-37
-
-
Dhillon, G.S.1
Moores, T.T.2
-
15
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10):1030-1044
-
(1985)
Commun ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter MK, Rubin AD (1999) Anonymous web transactions with crowds. Commun ACM 42(2):32-38
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, M.K.1
Rubin, A.D.2
-
17
-
-
0005063385
-
Onion routing for anonymous and private internet connection
-
Goldschlag DM, Reed MG, Syverson PF (1999) Onion routing for anonymous and private internet connection. Commun ACM 42(2):39-41
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
20
-
-
0034539094
-
The cricket location-support system
-
Boston, Massachusetts, August 2000
-
Priyantha NB, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In: Proceedings of 6th annual international conference on mobile computing and networking, Boston, Massachusetts, August 2000, pp 32-43
-
(2000)
Proceedings of 6th Annual International Conference on Mobile Computing and Networking
, pp. 32-43
-
-
Priyantha, N.B.1
Chakraborty, A.2
Balakrishnan, H.3
-
21
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
applications, and services (MobiSys 2004), Boston, Massachusetts, June 2004
-
Hong J (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on mobile systems, applications, and services (MobiSys 2004), Boston, Massachusetts, June 2004
-
(2004)
Proceedings of the 2nd International Conference on Mobile Systems
-
-
Hong, J.1
-
22
-
-
84900475733
-
The platform for privacy preferences 1
-
available at
-
Cranor L, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle J (2002) The platform for privacy preferences 1.0 (P3P1.0) specification. MIT/World Wide Web Consortium, available at http://www.w3.org/TR/P3P/
-
(2002)
0 (P3P1.0) Specification. MIT/World Wide Web Consortium
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
23
-
-
84993048403
-
The platform for privacy preference as a social protocol: An examination within the US policy context
-
Hockheiser H (2002) The platform for privacy preference as a social protocol: an examination within the US policy context. ACM Trans Internet Technol 2(4):276-306
-
(2002)
ACM Trans Internet Technol
, vol.2
, Issue.4
, pp. 276-306
-
-
Hockheiser, H.1
-
24
-
-
0002265410
-
The platform for privacy preferences
-
Cranor L, Reagle J (1998) The platform for privacy preferences. Commun ACM 42(2):48-55
-
(1998)
Commun ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Cranor, L.1
Reagle, J.2
-
25
-
-
84900509292
-
General overview of the P3P architecture
-
available at
-
Ackerman MS (1997) General overview of the P3P architecture. World Wide Web Consortium, available at http://www.w3.org/TR/WD-P3P-arch.html
-
(1997)
World Wide Web Consortium
-
-
Ackerman, M.S.1
-
26
-
-
84869462085
-
Privacy critics: UI components to safeguard users' privacy
-
Pittsburgh, Pennsylvania, May 1999
-
Ackerman MS, Cranor L (1999) Privacy critics: UI components to safeguard users' privacy. In: Proceedings of ACM conference on human factors in computing systems (CHI'99), Pittsburgh, Pennsylvania, May 1999, pp 258-259
-
(1999)
Proceedings of ACM Conference on Human Factors in Computing Systems (CHI'99)
, pp. 258-259
-
-
Ackerman, M.S.1
Cranor, L.2
-
27
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Göteborg, Sweden, September/October 2002, available at
-
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of the international conference ubiquitous computing (UbiComp 2002), Göteborg, Sweden, September/October 2002, available at http://www.inf.ethz.ch/-langhein
-
(2002)
Proceedings of the International Conference Ubiquitous Computing (UbiComp 2002)
-
-
Langheinrich, M.1
-
28
-
-
1142292431
-
Automated analysis of P3P-enabled web sites
-
Pittsburgh, Pennsylvania, May 2003
-
Byers S, Cranor LF, Kormann D (2003) Automated analysis of P3P-enabled web sites. In: Proceedings of 5th international conference on electronic commerce (ICEC 2003), Pittsburgh, Pennsylvania, May 2003, pp 326-338
-
(2003)
Proceedings of 5th International Conference on Electronic Commerce (ICEC 2003)
, pp. 326-338
-
-
Byers, S.1
Cranor, L.F.2
Kormann, D.3
-
29
-
-
33749616926
-
Open letter to P3P developers and replies
-
freedom and privacy: challenging the assumptions (CFP 2000), Toronto, Ontario, Canada, April 2000
-
Catlett J (2000) Open letter to P3P developers and replies. In: Proceedings of the 10th conference on computers, freedom and privacy: challenging the assumptions (CFP 2000), Toronto, Ontario, Canada, April 2000, pp 157-164
-
(2000)
Proceedings of the 10th Conference on Computers
, pp. 157-164
-
-
Catlett, J.1
-
30
-
-
0038007758
-
Designing a social protocol: Lessons learned from the Platform for Privacy Preferences
-
MacKie-Mason J, Waterman D (eds) Lawrence Erlbaum Associates, Mahwah, New Jersey
-
Cranor LF, Reagle J Jr (1998) Designing a social protocol: lessons learned from the Platform for Privacy Preferences. In: MacKie-Mason J, Waterman D (eds) Telephony, the internet, and the media. Lawrence Erlbaum Associates, Mahwah, New Jersey
-
(1998)
Telephony, the Internet, and the Media
-
-
Cranor, L.F.1
Reagle Jr., J.2
-
31
-
-
0034459145
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
Ackerman MS (2000) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum Comput Interact 15(2-3):179-204
-
(2000)
Hum Comput Interact
, vol.15
, Issue.2-3
, pp. 179-204
-
-
Ackerman, M.S.1
-
32
-
-
24144487579
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
Carroll JM (ed) Addison-Wesley, New York
-
Ackerman MS (2001) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. In: Carroll JM (ed) Human-computer interaction in the new millennium. Addison-Wesley, New York
-
(2001)
Human-computer Interaction in the New Millennium
-
-
Ackerman, M.S.1
|