68.Coy, P., Big Brother, Pinned to your chest, Business Week, 1992.
69.Cranor, L. ‘I Didn’t Buy it for Myself’ Privacy and Ecommerce Personalization. In Proceedings of Workshop on Privacy in the Electronic Society. Washington, DC, USA: ACM Press 2003.
70.Cranor, L., What Do They "Indicate?" Evaluating Security and Privacy Indicators, Interactions, vol. 13(3): pp. 45-57, 2006.
71.Cranor, L., P. Guduru, and M. Arjula, User Interfaces for Privacy Agents. To appear in ACM Transactions on Computer-Human Interaction 2006.
72.Cranor, L., M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) specification. 2000, W3C. http://www.w3.org/TR/P3P/
73.Cranor, L.F. and S. Garfinkel, Security and Usability: Designing Secure Systems That People Can Use. ed. O'Reilly: Sebastopol, CA, USA, 2005.
74.Cranor, L.F., J.I. Hong, and M. Reiter, Usable Privacy and Security: Course Overview Lecture Notes. 2006. http://cups.cs.cmu.edu/courses/ups-sp06/slides/060117-overview.ppt
75.Cranor, L.F., M. Langheinrich, and M. Marchiori, A P3P Preference Exchange Language 1.0 (APPEL1.0). 2002, World Wide Web Consortium Working Draft. http://www.w3.org/TR/WD-P3P-Preferences
76.Cranor, L.F., J. Reagle, and M.S. Ackerman, Beyond Concern: Understanding Net Users' Attitudes About Online Privacy, in The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, I. Vogelsang and B.M. Compaine, Editors. MIT Press: Cambridge, MA. p. 47-70, 2000.
77.Culnan, M.J. and P.K. Armstrong, Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 1999. 10(1): p. 104–115.
78.Curry, M.R., D.J. Phillips, and P.M. Regan, Emergency Response Systems and the Creeping Legibility of People and Places. The Information Society 2004. 20(5): p. 357–369.
79.Darrah, C., J. English-Lueck, and J. Freeman, Familes and Work: An Ethnography of Dual Career Families. 2001. http://www2.sjsu.edu/depts/anthropology/svcp/SVCPslnr.html
80.Davis, F.D., Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 1989. 13(3): p. 319–340.
81.Davis, S. and C. Gutwin. Using relationship to control disclosure in Awareness servers. In Proceedings of 2005 Conference on Graphics interface. Victoria, British Columbia, May 09 - 11, 2005: Canadian Human-Computer Communications Society, School of Computer Science, University of Waterloo, Waterloo, Ontario. pp. 145-152 2005.
82.Department of Health and Human Services, National Institutes of Health, and Office For Protection from Research Risks, Protection of Human Subjects. 2001.
83.DePaulo, B.M. and D.A. Kashy, Everyday Lies in Close and Casual Relationships. Journal of Personality and Social Psychology 1998. 74(1): p. 63–79.
84.Doheny-Farina, S., The Last Link: Default = Offline, Or Why Ubicomp Scares Me, Computer-mediated Communication, vol. 1(6): pp. 18-20, 1994.
end-user-privacy-in-human-computer-interaction-v57.docPage 85 of 85