53.Brostoff, S. and M.A. Sasse. Safe and sound: a safety-critical design approach to security. In Proceedings of New Security Paradigms Workshop 2001: ACM Press. pp. 41-50, Sept. 10-13, Cloudcroft, NM 2001.
57.Byers, S., L.F. Cranor, D. Kormann, and P. McDaniel. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. In Proceedings of Workshop on Privacy Enhancing Technologies (PET2004) 2004.
61.Chung, E., J. Hong, J. Lin, M. Prabaker, J. Landay, and A. Liu. Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. In Proceedings of DIS 2004: Designing Interactive Systems. Boston, MA, USA: ACM Press. pp. 233–242 2004.
63.Colbert, M. A diary study of rendezvousing: implications for position-aware computing and communications for the general public. In Proceedings of 2001 International ACM SIGGROUP Conference on Supporting Group Work. Boulder, Colorado, USA: ACM Press. pp. 15–23 2001. http://doi.acm.org/10.1145/500286.500292
64.Commission of the European Communities, First report on the implementation of the Data Protection Directive (95/46/EC). Technical Report COM(2003) 265 final, Commission of the European Communities, Brussels, Belgium, 15/5/2003 2003.
65.Consolvo, S., I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proceedings of CHI 2005, Conference on Human Factors in Computing Systems: ACM Press. pp. 82–90 2005.
end-user-privacy-in-human-computer-interaction-v57.docPage 84 of 85