X hits on this document

203 views

0 shares

0 downloads

0 comments

88 / 100

114.Friedman, B., D. Hurley, D.C. Howe, E. Felten, and H. Nissenbaum. Users' conceptions of web security: a comparative study. In Proceedings of CHI '02 extended abstracts on Human factors in computing systems. Minneapolis, Minnesota, USA, April 20-25, 2002 2002.

115.Gamma, E., R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software: Addison-Wesley. 395, 1995.

116.Garfinkel, S. Adopting Fair Information Practices to Low Cost RFID Systems. In Proceedings of Ubiquitous Computing 2002 Privacy Workshop 2002. http://www.teco.edu/~philip/ubicomp2002ws/

117.Gaver, W., J. Beaver, and S. Benford. Ambiguity as a Resource for Design. In Proceedings of CHI 2003. Ft. Lauderdale, FL, USA: ACM Press. pp. 233-240 2003.

118.Gaver, W., T. Moran, A. MacLean, L. Lovstrand, P. Dourish, K. Carter, and W. Buxton. Realizing a Video Environment: EuroPARC's RAVE System. In Proceedings of CHI'92. Monterey, CA, USA: ACM Press. pp. 27–35, May 1992 1992.

119.Gaw, S., E.W. Felten, and P. Fernandez-Kelly. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems. Montréal, Québec, Canada: ACM Press. pp. 591-600, April 22 - 27, 2006 2006. http://doi.acm.org/10.1145/1124772.1124862

120.Giddens, A., Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford, CA, USA: Stanford University Press, 1991.

121.Gideon, J., S. Egelman, L.F. Cranor, and A. Acquisti. Power Strips, Prophylactics, and Privacy, Oh My! In Proceedings of The 2006 Symposium On Usable Privacy and Security (SOUPS 2006). Pittsburgh, PA 2006.

122.Goffman, E., Behavior In Public Places: Free Press, 1966.

123.Goffman, E., The Presentation of Self in Everyday Life. New York: Anchor, Doubleday, 1959.

124.Goldberg, I. Privacy-enhancing technologies for the Internet, II: Five years later. In Proceedings  2002.

125.Goldschlag, D.M., M.G. Reed, and P.F. Syverson, Onion routing for anonymous and private internet connection. Commun ACM 1999. 42(2): p. 39–41.

126.Good, N.S., R. Dhamija, J. Grossklags, D. Thaw, S. Aronowitz, D. Mulligan, and J. Konstan. Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware. In Proceedings of Symposium On Usable Privacy and Security (SOUPS). Pittsburgh, PA, USA: ACM Press, July 6-8, 2005 2005.

127.Good, N.S. and A. Krekelberg. Usability and Privacy: a Study of Kazaa P2P File-Sharing. In Proceedings of CHI 2003: ACM Press. pp. 137–144 2003. http://portal.acm.org/citation.cfm?id=1073001.1073006

128.Grasso, A. and J.-L. Meunier. Who Can Claim Complete Abstinence from Peeking at Print Jobs? In Proceedings of CSCW '02: ACM Press. pp. 296–305 2002.

129.Gray, W.D., B.E. John, and M.E. Atwood, Project Ernestine: Validating a GOMS analysis for predicting and explaining real-world performance. Human-Computer Interaction 1993. 8(3): p. 237–309.

end-user-privacy-in-human-computer-interaction-v57.docPage 88 of 85

Document info
Document views203
Page views203
Page last viewedSat Dec 03 06:53:21 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments