X hits on this document





100 / 100

308.Whalen, T. and K.M. Inkpen. Privacy and security awareness: Gathering evidence: use of visual security cues in web browsers. In Proceedings of 2005 conference on Graphics interface GI '05: Canadian Human-Computer Communications Society, May 2005 2005.

309.Wheeler, L. and H.T. Rois, Self-Recording of Everyday Life Events: Origins, Types, and Uses. Journal of Personality 1991. 59(3): p. 339–355.

310.Whitten, A. and J.D. Tygar. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of 8th USENIX Security Symposium 1999.

311.Wogalter, M.S., Handbook of Warnings: Lawrence Erlbaum Associates, 2006.

312.Wolf, G. and A. Pfitzmann, Empowering Users to Set Their Security Goals, in Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 113–135, 1999.

313.Zarski, T.Z., “Mine Your Own Business!” Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion. Yale Journal of Law & Technology 2002. 5(2002/2003): p. 1–54.

314.Zetter, K., CardSystems’ Data Left Unsecured, Wired News, 2005. http://www.wired.com/news/technology/0,1282,67980,00.html

315.Zimmermann, P., PGP User's Guide: MIT Press, 1994.

316.Zugenmaier, A. The Freiburg privacy diamond. In Proceedings of Global Telecommunications Conference, 2003. GLOBECOM '03: IEEE. pp. 1501–1505, 1-5 Dec. 2003 2003. 10.1109/GLOCOM.2003.1258488

317.Zurko, M.E. and R.T. Simon. User-Centered Security. In Proceedings of New Security Paradigms Workshop: IEEE Press. pp. 27–33 1996.

end-user-privacy-in-human-computer-interaction-v57.docPage 100 of 85

Document info
Document views346
Page views346
Page last viewedSat Jan 21 20:16:57 UTC 2017