X hits on this document





91 / 100

160.International Labor Organization, Workers Privacy Part II: Monitoring and Surveillance in the Workplace Conditions of Work. Special Series On Workers Privacy. Vol. Digest 12:1, 1993.

161.International Organization for Standardization / International Electrotechnical Commission, IS17799:2000 Information technology — Code of practice for information security management. Technical  2000.

162.Ito, M. and O. Daisuke, Mobile Phones, Japanese Youth and the Replacement of Social Contact, in Front Stage/Back Stage: Mobile Communication and the Renegotiation of the Social Sphere, R. Ling and P. Pedersen, Editors: Grimstad, Norway., 2003.

163.Jacobs, A.R. and G.D. Abowd, A framework for comparing perspectives on privacy and pervasive technologies. IEEE Pervasive Computing 2003. 2(4): p. 78–84.

164.Jagatic, T., N. Johnson, M. Jakobsson, and F. Menczer, Social Phishing. to appear in Commun. ACM 2005.

165.Jancke, G., G.D. Venolia, J. Grudin, J. Cadiz, and A. Gupta, Linking Public Spaces: Technical and Social Issues. CHI Letters (Human Factors in Computing Systems: CHI 2001) 2001. 3(1): p. 530-537.

166.Jendricke, U. and D. Gerd tom Markotten, Usability Meets Security: The Identity-Manager as Your Personal Security Assistant for the Internet, in 16th Annual Computer Security Applications Conference (ACSAC 00). 2000: New Orleans, LA, USA.

167.Jensen, C., Designing For Privacy in Interactive Systems, Unpublished Doctoral Dissertation, Georgia Institute of Technology, Atlanta, GA, USA, 2005. http://etd.gatech.edu

168.Jensen, C. and C. Potts. Privacy policies as decision-making tools: an evaluation of online privacy notices. In Proceedings of CHI 2004: ACM Press 2004.

169.Jensen, C., C. Potts, and C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Human-Computer Studies 2005. 63: p. 203–227.

170.Jensen, C., J. Tullio, C. Potts, and E.D. Mynatt, STRAP: A Structured Analysis Framework for Privacy. Technical Report GVU Technical Report 05-02, GVU Center, Georgia Institute of Technology, Atlanta, GA, USA, January 2005 2005.

171.Jesdanun, A., AOL: Breach of Privacy Was a Mistake, Associated Press Financial Wire, 2006.

172.Jiang, X., J.I. Hong, and J.A. Landay. Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 176-193 2002.

173.Junestrand, S., U. Keijer, and K. Tollmar, Private and public digital domestic spaces. International Journal of Human-Computer Studies 2001. 54(5): p. 753-778.

174.Kaasinen, E., User Needs for Location-aware Mobile Services. Personal and Ubiquitous Computing 2003. 7(1): p. 70-79.

175.Karas, S., Privacy, Identity, Databases. 52 American University Law Review 393 2003.

end-user-privacy-in-human-computer-interaction-v57.docPage 91 of 85

Document info
Document views184
Page views184
Page last viewedThu Oct 27 19:04:02 UTC 2016