X hits on this document





87 / 100

99.European Commission Article 29 Working Party, Opinion 4/2004 on the Processing of Personal Data by means of Video Surveillance. Technical Report 11750/02/EN WP 89 2004.

100.European Commission Article 29 Working Party, Opinion on More Harmonised Information Provisions. Technical Report 11987/04/EN WP 100, European Commission, November 25 2004 2004.

101.European Commission Article 29 Working Party, Working Document on Biometrics. Technical Report 12168/02/EN WP80 2004.

102.European Opinion Research Group EEIG, Special Eurobarometer Data Protection Executive Summary. Technical Report Special Eurobarometer 196 – Wave 60.0, European Commission, Bruxelles, Belgium, December 2003 2003.

103.Fallman, D. Design-oriented Human-Computer Interaction. In Proceedings of CHI 2003. Ft. Lauderdale, Florida, USA: ACM Press. pp. 225–232, April 5–10, 2003 2003.

104.Federal Trade Commission, In the Matter of CardSystems Solutions, Inc., and Solidus Networks, Inc., Doing Business as Pay By Touch Solutions -- Complaint. Technical Report File No. 052 3148, Federal Trade Commission, February 23, 2006 2006.

105.Feng, J., A Brief Review of Research Methods In Privacy Studies, in Privacy Methods Workshop at CHI 2006. 2006: Montreal, Quebec, Canada.

106.Fischer, C.S., America Calling: A Social History of the Telephone to 1940: University of California Press. 424, 1994.

107.Fischer, G., A.C. Lemke, T. Mastaglio, and A.I. Morch. Using critics to empower users. In Proceedings of Conference on Human Factors in Computing Systems. Seattle, WA, USA: ACM Press, New York, NY. pp. 337-347 1990. http://doi.acm.org/10.1145/97243.97305

108.Fish, R., R.E. Kraut, R.W. Root, and R.E. Rice. Evaluating video as a technology for informal communication. In Proceedings of Human Factors in Computing Sys-tems (CHI 92) 1992. http://doi.acm.org/10.1145/142750.142755

109.Fogarty, J., J. Lai, and J. Christensen, Presence versus Availability: The Design and Evaluation of a Context-Aware Communication Client. International Journal of Human-Computer Studies 2004. 61(3): p. 299 - 317.

110.Fogg, B.J. and H. Tseng. The elements of computer credibility. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems: the CHI Is the Limit. Pittsburgh, Pennsylvania, United States: ACM Press. pp. 80-87, May 15 - 20, 1999 1999. http://doi.acm.org/10.1145/302979.303001

111.Foresti, G., P. Mähönen, and C. Regazzoni,  Multimedia video-based surveillance systems: Requirements, Issues and Solutions. ed. Kluwer Academic Publishers: Norwell, MA, USA, 2000.

112.Friedman, B., Value-Sensitive Design. Interactions: New Visions of Human-Computer Interaction 1996. 3(6): p. 17–23.

113.Friedman, B., D.C. Howe, and E. Felten. Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design. In Proceedings of The Thirty-Fifth Annual Hawai'i International Conference on System Sciences: IEEE Computer Society. pp. CD-ROM of full-paper, OSPE101 2002.

end-user-privacy-in-human-computer-interaction-v57.docPage 87 of 85

Document info
Document views132
Page views132
Page last viewedSun Oct 23 22:33:12 UTC 2016