X hits on this document

255 views

0 shares

0 downloads

0 comments

82 / 100

17.Agre, P.E., Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction 2001. 16(2-4): p. 177-192.

18.Agre, P.E., Surveillance and Capture: Two models of privacy. The Information Society 1994. 10: p. 101–127.

19.Agre, P.E. and M. Rotenberg, Technology and Privacy: The New Landscape. Cambridge MA: MIT Press, 1997.

20.Alexander, C., The Timeless Way Of Building. New York, NY, USA: Oxford University Press, 1979.

21.Allen, J.P., Controversies about privacy and open information in CSCW: a panel report from the CSCW'92 conference. SIGOIS Bull 1993. 14(1): p. 19-20.

22.allnurses.com, New Restroom protocol per management. 2002. http://allnurses.com/t16164.html

23.Altman, I., The Environment and Social Behavior—Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole Publishing Company, 1975.

24.Ammenwerth, E., A. Buchauer, H.-B. Bludau, and A. Roßnagel, Simulation Studies for the Evaluation of Security Technology, in Multilateral Security: Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 547–560, 1999.

25.Anderson, R., Why Cryptosystems Fail. Communications of the ACM 1994. 37(11).

26.Anton, A., Q. He, and D. Baumer, The complexity underlying JetBlue’s privacy policy violations. IEEE Security & Privacy 2004. 2(6): p. 12–18.

27.Anton, A.I. and J.B. Earp, A requirements taxonomy for reducing Web site privacy vulnerabilities. Requirements Engineering 2004. 9: p. 169-185.

28.Aoki, P.M. and A. Woodruff. Making Space for Stories: Ambiguity in the Design of Personal Communication Systems. In Proceedings of Human Factors in Computing Systems (CHI 2005). Portland, OR, USA: ACM Press. pp. 181-190 2005.

29.Arnold, M., On the phenomenology of technology: the "Janus-faces" of mobile phones. Information and Organization (Information and Organization), 2003. 13: p. 231–256.

30.Ashley, P., M. Schunter, and C. Powers. From Privacy Promises to Privacy Management – A New Approach for Enforcing Privacy Throughout an Enterprise. In Proceedings of New Security Paradigms Workshop. Virginia Beach, VA: ACM Press 2002.

31.Association for Computing Machinery, ACM Code of Ethics. http://www.acm.org/serving/ethics.html

32.Avrahami, D., D. Gergle, S.E. Hudson, and S. Kiesler, Improving the accuracy of cell phone interruptions: A study on the effect of contextual information on the behaviour of callers. Behavior And Information Technology 2007. 26(3): p. 247-259.

33.Awad, N.F. and M.S. Krishnan, The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online For Personalization. MIS Quarterly 2006. 30(1): p. 13-28.

34.Ball, E., D.W. Chadwick, and D. Mundy, Patient privacy in electronic prescription transfer. IEEE Security & Privacy 2003. 1(2): p. 77–80.

end-user-privacy-in-human-computer-interaction-v57.docPage 82 of 85

Document info
Document views255
Page views255
Page last viewedThu Dec 08 12:25:46 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments