85.Dourish, P. and K. Anderson, Privacy, Security… and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices. Technical Report Technical Report UCI-ISR-05-1, Institute for Software Research, University of California at Irvine, Irvine, CA, USA 2005.
86.Dourish, P., B.E. Grinter, J.D.d.l. Flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 2004. 8(6).
87.Duckham, M. and L. Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Proceedings of Pervasive 2005. Munich, Germany: Springer Verlag. pp. 152–170 2005. http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/11428572_10
90.Egelman, S., L.F. Cranor, and A. Chowdhury. An Analysis of P3P-Enabled Web Sites among Top-20 Search Results. In Proceedings of Eighth International Conference on Electronic Commerce. Fredericton, New Brunswick, Canada, August 14-16, 2006 2006.
91.Egelman, S., J. Tsai, L.F. Cranor, and A. Acquisti. Studying the Impact of Privacy Information on Online Purchase Decisions. In Proceedings of 2006 CHI Privacy Methods Workshop. Montreal, Quebec, Canada 2006.
92.Ehn, P. and M. Kyng, The Collective Approach to Systems Design, in Computers and Democracy: A Scandinavian Challenge, G. Bjerkes, P. Ehn, and M. Kyng, Editors. Avebury: Aldershot, Great Britain. p. 17–58, 1987.
94.Erickson, T. and W.A. Kellogg, Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction (TOCHI) (ACM Transactions on Computer-Human Interaction (TOCHI)), 2000. 7(1): p. 59–83.
95.Espey, J., G. Rudinger, and H. Neuf, Excessive Demands on Users of Technology, in Multilateral Security: Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 439--449, 1999.
96.Esslinger, B. and D. Fox, Public Key Infrastructures in Banks -- Enterprise-wide PKIs, in Multilateral Security in Communications: Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 283--300, 1999.
end-user-privacy-in-human-computer-interaction-v57.docPage 86 of 85