X hits on this document

260 views

0 shares

0 downloads

0 comments

90 / 100

144.Hilty, L.M., C. Som, and A. Köhler, Assessing the Human, Social and Environmental Risks of Pervasive Computing. Human and Ecological Risk Assessment 2004. 10: p. 853–874.

145.Hindus, D., M. Ackerman, S.D. Mainwaring, and B. Starr. Thunderwire: A Field Study of an Audio-Only Media Space. In Proceedings of Computer Supported Cooperative Work ’96. Cambridge MA USA: ACM Press. pp. 238-247 1996.

146.Hindus, D., S.D. Mainwaring, N. Leduc, A.E. Hagström, and O. Bayley, Casablanca: Designing Social Communication Devices for the Home. CHI Letters (Human Factors in Computing Systems: CHI 2001), 2001. 3(1): p. 325-332.

147.Hochheiser, H., The platform for privacy preference as a social protocol: an examination within the US policy context. ACM Trans Internet Technol 2002. 2(4): p. 276–306.

148.Holtzblatt, K. and H. Beyer, Contextual Design: A Customer-Centered Approach to Systems Designs: Morgan-Kaufmann, 1997.

149.Hong, J., J.D. Ng, S. Lederer, and J.A. Landay. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In Proceedings of DIS 2004: ACM Press. pp. 91–100 2004.

150.Hong, J.I., J. Ng, and J.A. Landay. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp. 91-100 2004.

151.Hudson, J.M. and A. Bruckman. Using Empirical Data to Reason about Internet Research Ethics. In Proceedings of ECSCW ’05. Paris, France: Springer Verlag. pp. 287-306, 18-22 September 2005 2005.

152.Hudson, S. and I. Smith. Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems. In Proceedings of CSCW ’96: ACM Press. pp. 248–257 1996. http://doi.acm.org/10.1145/240080.240295

153.Husted, B., ChoicePoint's fine sets record, Atlanta Journal-Constitution, 2006.

154.Iachello, G., Privacy and Proportionality, Unpublished Doctoral Dissertation, Georgia Inst. of Technology, Atlanta, GA, USA, 2006. http://etd.gatech.edu

155.Iachello, G. Protecting Personal Data: Can IT Security Management Standards Help? In Proceedings of ACSAC. Las Vegas, Nevada, USA: IEEE Press. pp. 266–275, Dec. 2003 2003.

156.Iachello, G. and G.D. Abowd. Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design In Ubiquitous Computing. In Proceedings of CHI 2005. Portland, OR, USA: ACM Press. pp. 91–100 2005.

157.Iachello, G., I. Smith, S. Consolvo, M. Chen, and G.D. Abowd. Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In Proceedings of Symposium On Usable Privacy and Security (SOUPS). Pittsburgh, PA, USA: ACM Press. pp. 65–76, July 6–8, 2005 2005.

158.Iachello, G., K.N. Truong, G.D. Abowd, G.R. Hayes, and M. Stevens. Experience Prototyping and Sampling to Evaluate Ubicomp Privacy in the Real World. In Proceedings of CHI 2006. Montreal, Canada: ACM Press 2006.

159.IBM Corporation, IBM Corporation. Privacy is good for business. 2007. http://www.ibm.com/innovation/us/customerloyalty/harriet_pearson_interview.shtml

end-user-privacy-in-human-computer-interaction-v57.docPage 90 of 85

Document info
Document views260
Page views260
Page last viewedFri Dec 09 03:58:33 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments