X hits on this document

274 views

0 shares

0 downloads

0 comments

83 / 100

35.Barkhuus, L. and A. Dey. Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In Proceedings of Interact 2003, 9th IFIP TC13 International Conference on Human-Computer Interaction. Zurich, Switzerland: ACM Press. pp. 709–712 2003.

36.Baumer, D.L., J.B. Earp, and P.S. Evers, Tit for Tat in Cyberspace: Consumer and Website Responses to Anarchy in the Market for Personal Information. North Carolina Journal of Law and Technology 2003. 4(2): p. 217–274.

37.BBC News, Radio tags spark privacy worries. 2003. http://news.bbc.co.uk/1/hi/technology/3224920.stm

38.Beckwith, R., Designing for Ubiquity: The Perception of Privacy. IEEE Pervasive 2002. 2(2): p. 40-46.

39.Begole, J., J.C. Tang, R.B. Smith, and N. Yankelovich. Work Rhythms: Analyzing Visualizations of Awareness Histories of Distributed Groups. In Proceedings of CSCW’02. New Orleans, LA, USA: ACM Press, November 16-20, 2002 2002.

40.Begole, J.B., N.E. Matsakis, and J.C. Tang. Lilsys: Sensing Unavailability. In Proceedings of Conference on Computer Supported Cooperative Work. Chicago: ACM Press 2004.

41.Bekkering, E. and J.P. Shim, Trust in videoconferencing. Communications of the ACM 2006. 49(7): p. 103-107.

42.Bellotti, V., Design for Privacy in Multimedia Computing and Communications Environments, in Technology and Privacy: The New Landscape, P. Agre and M. Rotenberg, Editors. MIT Press: Cambridge, MA, USA, 1997.

43.Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW'93). Milan, Italy: Kluwer Academic Publishers 1993.

44.Berendt, B., O. Günther, and S. Spiekermann, Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM 2005. 48(4): p. 101–106.

45.Beresford, A.R. and F. Stajano, Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2003. 2(1): p. 46–55.

46.Berleur, J. and K. Brunnstein,  Ethics of Computing: Codes, spaces for discussion and law. ed. Chapman & Hall: London, England, 1996.

47.Blackburn, M., HIPAA, Heal Thyself. Johns Hopkins Magazine 2004. 56(5).

48.boyd, d., Faceted Id/entity: Managing representation in a digital world, Unpublished Master's Thesis, MIT, Cambridge, MA, 2002.

49.Boyle, M., C. Edwards, and S. Greenberg. The effects of filtered video on awareness and privacy. In Proceedings of ACM CSCW 2000: ACM Press. pp. 1–10 2000.

50.Boyle, M. and S. Greenberg, The language of privacy: Learning from video media space analysis and design. ACM Transactions on Computer-Human Interaction (TOCHI) 2005. 12(2).

51.Brin, D., The Transparent Society. Reading, MA: Perseus Books, 1998.

52.British Institute of International and Comparative Law, The implementation of Directive 95/46/EC to the Processing of Sound and Image Data. Technical  2003.

end-user-privacy-in-human-computer-interaction-v57.docPage 83 of 85

Document info
Document views274
Page views274
Page last viewedSat Dec 10 22:46:41 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments