130.Grinter, R., P. Dourish, J. Delgado de la Flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 2004. 8(6): p. 391–401.
131.Grinter, R.E. and L. Palen. Instant Messaging in Teenage Life. In Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW2002): ACM Press. pp. 21–30 2002. http://doi.acm.org/10.1145/587078.587082
135.Grudin, J. and E. Horvitz, Presenting choices in context: approaches to information sharing. 2003: Workshop on Ubicomp communities: Privacy as Boundary Negotiation. http://guir.berkeley.edu/pubs/ubicomp2003/privacyworkshop/papers.htm
136.Gruteser, M. and D. Grunwald. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. In Proceedings of Security in Pervasive Computing Conference. Boppard, Germany: Springer Verlag. pp. 10–24 2004. http://www.springerlink.com/openurl.asp?genre=article&id=0H4KDUY2FXYPA3JC
138.Häkkilä, J. and C. Chatfield. Toward social mobility: 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication. In Proceedings of Human Computer Interaction With Mobile Devices & Services MobileHCI '05. Salzburg, Austria: ACM Press. pp. 219–222, September 2005 2005. http://doi.acm.org/10.1145/1085777.1085814
139.Hancock, J.T., J. Thom-Santelli, and T. Ritchie. Deception and Design: The Impact of Communication Technology on Lying Behavior. In Proceedings of CHI 2004. Vienna, Austria: ACM Press. pp. 129–134, 24-29 April 2004.
142.Hawkey, K. and K.M. Inkpen. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proceedings of Proceedings of the SIGCHI conference on Human Factors in computing systems. Montréal, Québec, Canada: ACM Press. pp. 821–830 2006.
143.Hayes, G.R. and G.D. Abowd. Tensions in designing capture technologies for an evidence-based care community. In Proceedings of Proceedings of the SIGCHI conference on Human Factors in computing systems. Montr\&\#233;al, Qu\&\#233;bec, Canada: ACM Press. pp. 937-946 2006.
end-user-privacy-in-human-computer-interaction-v57.docPage 89 of 85