X hits on this document

256 views

0 shares

0 downloads

0 comments

86 / 100

85.Dourish, P. and K. Anderson, Privacy, Security… and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices. Technical Report Technical Report UCI-ISR-05-1, Institute for Software Research, University of California at Irvine, Irvine, CA, USA 2005.

86.Dourish, P., B.E. Grinter, J.D.d.l. Flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 2004. 8(6).

87.Duckham, M. and L. Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Proceedings of Pervasive 2005. Munich, Germany: Springer Verlag. pp. 152–170 2005. http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/11428572_10

88.Dunn, E.S., The Idea of a National Data Center and the Issue of Personal Privacy. The American Statistician 1967. 21(1): p. 21–27.

89.Ebling, M.R., B.E. John, and M. Satyanarayanan, The Importance of Translucence in Mobile Computing Systems. ACM Transactions on Computer-Human Interaction (TOCHI) 2002. 9(1): p. 42-67.

90.Egelman, S., L.F. Cranor, and A. Chowdhury. An Analysis of P3P-Enabled Web Sites among Top-20 Search Results. In Proceedings of Eighth International Conference on Electronic Commerce. Fredericton, New Brunswick, Canada, August 14-16, 2006 2006.

91.Egelman, S., J. Tsai, L.F. Cranor, and A. Acquisti. Studying the Impact of Privacy Information on Online Purchase Decisions. In Proceedings of 2006 CHI Privacy Methods Workshop. Montreal, Quebec, Canada 2006.

92.Ehn, P. and M. Kyng, The Collective Approach to Systems Design, in Computers and Democracy: A Scandinavian Challenge, G. Bjerkes, P. Ehn, and M. Kyng, Editors. Avebury: Aldershot, Great Britain. p. 17–58, 1987.

93.Electronic Privacy Information Center (EPIC) and Junkbusters, Pretty Poor Privacy: An Assessment of P3P and Internet Privacy. 2000. http://www.epic.org/reports/prettypoorprivacy.html

94.Erickson, T. and W.A. Kellogg, Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction (TOCHI) (ACM Transactions on Computer-Human Interaction (TOCHI)), 2000. 7(1): p. 59–83.

95.Espey, J., G. Rudinger, and H. Neuf, Excessive Demands on Users of Technology, in Multilateral Security: Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 439--449, 1999.

96.Esslinger, B. and D. Fox, Public Key Infrastructures in Banks -- Enterprise-wide PKIs, in Multilateral Security in Communications: Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 283--300, 1999.

97.Etzioni, A., The Limits of Privacy. New York: Basic Books, 1999.

98.European Commission, Information Technology Security Evaluation Criteria. Technical Report Technical Report, Version 1.2, June 1991 1991.

end-user-privacy-in-human-computer-interaction-v57.docPage 86 of 85

Document info
Document views256
Page views256
Page last viewedThu Dec 08 15:07:24 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments