X hits on this document

253 views

0 shares

0 downloads

0 comments

92 / 100

176.Karat, C.-M., J. Karat, C. Brodie, and J. Feng. Evaluating interfaces for privacy policy rule authoring. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems. Montréal, Québec, Canada: ACM Press. pp. 83-92, April 22 - 27, 2006 2006. http://doi.acm.org/10.1145/1124772.1124787

177.Keller, A.M., D. Mertz, J.L. Hall, and A. Urken. Privacy issues in an electronic voting machine. In Proceedings of 2004 ACM workshop on Privacy in the electronic society: ACM Press, October 2004.

178.Kindberg, T., A. Sellen, and E. Geelhoed. Security and Trust in Mobile Interactions: a Study of Users' Perceptions and Reasoning. In Proceedings of Ubicomp 2004. Nottingham, UK: Springer Verlag. pp. 196–213, September 7–10, 2004 2004.

179.Kinzie, S. and Y. Noguchi, In Online Social Club, Sharing Is the Point Until It Goes Too Far, Washington Post pp. A01, 2006.

180.Kling, R., Fair Information Practices with Computer Supported Cooperative Work (CSCW). Computer-Mediated Communication Magazine 1994. 1(2): p. 5.

181.Klinke, A. and O. Renn, A New Approach to Risk Evaluation and Management: Risk-Based, Precaution-Based, and Discourse-Based Strategies. Risk Analysis 2002. 22(6): p. 1071-1094.

182.Knapp, K.J., T.E. Marshall, R.K. Rainer, and D.W. Morrow, Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results. Technical, Auburn University, Auburn, AL 2004.

183.Kobsa, A., Personalized hypermedia and international privacy. Communications of the ACM 2002. 45(5): p. 64-67.

184.Kobsa, A. and J. Schreck, Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology (TOIT) 2003. 3(2).

185.Kontio, J., L. Lehtola, and J. Bragge. Using the Focus Group Method in Software Engineering: Obtaining Practitioner and User Experiences. In Proceedings of International Symposium on Empirical Software Engineering (ISESE). Redondo Beach, U.S.A.: IEEE Computer Society, Aug 19-20, 2004 2004.

186.Kowitz, B. and L. Cranor. Peripheral Privacy Notifications for Wireless Networks. In Proceedings of Workshop On Privacy In The Electronic Society '05. Alexandria, VA, USA. pp. 90–96 2005.

187.Kraut, R.E., C. Cool, R.E. Rice, and R.S. Fish. Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium. In Proceedings of CSCW 94. Chapel Hill, NC, USA: ACM Press. pp. 13–21 1994.

188.Kumaraguru, P. and L.F. Cranor, Privacy Indexes: A Survey of Westin's Studies. Technical Report CMU-ISRI-05-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University, December 2005 2005.

189.Lahlou, S. Living in a goldfish bowl: lessons learned about privacy issues in a privacy-challenged environment. In Proceedings of Privacy Workshop at Ubicomp Conference. Tokyo Japan, 9/11/2005 2005.

end-user-privacy-in-human-computer-interaction-v57.docPage 92 of 85

Document info
Document views253
Page views253
Page last viewedThu Dec 08 06:59:25 UTC 2016
Pages100
Paragraphs1533
Words44427

Comments