178.Kindberg, T., A. Sellen, and E. Geelhoed. Security and Trust in Mobile Interactions: a Study of Users' Perceptions and Reasoning. In Proceedings of Ubicomp 2004. Nottingham, UK: Springer Verlag. pp. 196–213, September 7–10, 2004 2004.
182.Knapp, K.J., T.E. Marshall, R.K. Rainer, and D.W. Morrow, Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results. Technical, Auburn University, Auburn, AL 2004.
185.Kontio, J., L. Lehtola, and J. Bragge. Using the Focus Group Method in Software Engineering: Obtaining Practitioner and User Experiences. In Proceedings of International Symposium on Empirical Software Engineering (ISESE). Redondo Beach, U.S.A.: IEEE Computer Society, Aug 19-20, 2004 2004.
187.Kraut, R.E., C. Cool, R.E. Rice, and R.S. Fish. Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium. In Proceedings of CSCW 94. Chapel Hill, NC, USA: ACM Press. pp. 13–21 1994.
188.Kumaraguru, P. and L.F. Cranor, Privacy Indexes: A Survey of Westin's Studies. Technical Report CMU-ISRI-05-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University, December 2005 2005.
189.Lahlou, S. Living in a goldfish bowl: lessons learned about privacy issues in a privacy-challenged environment. In Proceedings of Privacy Workshop at Ubicomp Conference. Tokyo Japan, 9/11/2005 2005.
end-user-privacy-in-human-computer-interaction-v57.docPage 92 of 85