X hits on this document





89 / 100

130.Grinter, R., P. Dourish, J. Delgado de la Flor, and M. Joseph, Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 2004. 8(6): p. 391–401.

131.Grinter, R.E. and L. Palen. Instant Messaging in Teenage Life. In Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW2002): ACM Press. pp. 21–30 2002. http://doi.acm.org/10.1145/587078.587082

132.Grudin, J., Desituating Action: Digital Representation of Context. Human-Computer Interaction (HCI) Journal 2001. 16(2-4).

133.Grudin, J., Groupware and Social Dynamics: Eight Challenges for Developers, Communications of the ACM, vol. 37(1): pp. 92-105, 1994.

134.Grudin, J., Three faces of human-computer interaction. Annals of the History of Computing 2005. 27(4): p. 46–62.

135.Grudin, J. and E. Horvitz, Presenting choices in context: approaches to information sharing. 2003: Workshop on Ubicomp communities: Privacy as Boundary Negotiation. http://guir.berkeley.edu/pubs/ubicomp2003/privacyworkshop/papers.htm

136.Gruteser, M. and D. Grunwald. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. In Proceedings of Security in Pervasive Computing Conference. Boppard, Germany: Springer Verlag. pp. 10–24 2004. http://www.springerlink.com/openurl.asp?genre=article&id=0H4KDUY2FXYPA3JC

137.GVU Center, 10th WWW User Survey – Online Privacy and Security. Technical, GVU Center, Georgia Insitute of Technology 1999.

138.Häkkilä, J. and C. Chatfield. Toward social mobility: 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication. In Proceedings of Human Computer Interaction With Mobile Devices & Services MobileHCI '05. Salzburg, Austria: ACM Press. pp. 219–222, September 2005 2005. http://doi.acm.org/10.1145/1085777.1085814

139.Hancock, J.T., J. Thom-Santelli, and T. Ritchie. Deception and Design: The Impact of Communication Technology on Lying Behavior. In Proceedings of CHI 2004. Vienna, Austria: ACM Press. pp. 129–134, 24-29 April 2004.

140.Harper, R.H. Why People Do and Don't Wear Active Badges: A Case Study. In Proceedings of Computer Supported Cooperative Work (CSCW96). pp. 297-318 1996.

141.Harris Interactive, IBM Multi-National Consumer Privacy Survey. Technical  1999.

142.Hawkey, K. and K.M. Inkpen. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proceedings of Proceedings of the SIGCHI conference on Human Factors in computing systems. Montréal, Québec, Canada: ACM Press. pp. 821–830 2006.

143.Hayes, G.R. and G.D. Abowd. Tensions in designing capture technologies for an evidence-based care community. In Proceedings of Proceedings of the SIGCHI conference on Human Factors in computing systems. Montr\&\#233;al, Qu\&\#233;bec, Canada: ACM Press. pp. 937-946 2006.

end-user-privacy-in-human-computer-interaction-v57.docPage 89 of 85

Document info
Document views216
Page views216
Page last viewedSun Dec 04 06:33:22 UTC 2016