X hits on this document





93 / 100

190.Langheinrich, M. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of Ubicomp 2002. Goteberg, Sweden. pp. 237-245 2002.

191.Langheinrich, M. Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of Ubicomp 2001: Springer Verlag. pp. 273–291 2001.

192.Lasprogata, G., N.J. King, and S. Pillay, Regulation of Electronic Employee Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data Privacy Legislation in the European Union, United States and Canada. Stanford Technology Law Review 2004. 2004 (4).

193.Latour, B., We’ve never been modern. Cambridge, MA, USA: Harvard University Press, 1991.

194.Lau, T., O. Etzioni, and D.S. Weld, Privacy interfaces for information management. Communications of the ACM 1999. 42(10): p. 88-94.

195.Lederer, S., Designing Disclosure: Interactive Personal Privacy at the Dawn of Ubiquitous Computing, Unpublished Master of Science, University of California, Berkeley, Berkeley, CA, 2003. http://www.cs.berkeley.edu/projects/io/publications/privacy-lederer-msreport-1.01-no-appendicies.pdf

196.Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Five Pitfalls in the Design for Privacy, in Security and Usability, S. Garfinkel and L.F. Cranor, Editors. p. 421-445, 2005.

197.Lederer, S., J. Mankoff, and A. Dey. Towards a Deconstruction of the Privacy Space. In Proceedings of Workshop on Privacy In Ubicomp 2003: Ubicomp communities: privacy as boundary negotiation. Seattle, WA, USA 2003. http://guir.berkeley.edu/pubs/ubicomp2003/privacyworkshop/papers/lederer-privacyspace.pdf

198.Lederer, S., J. Mankoff, and A.K. Dey. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proceedings of Extended Abstracts of CHI 2003, ACM Conference on Human Factors in Computing Systems. Fort Lauderdale, FL. pp. 724-725 2003.

199.Lessig, L., The Architecture of Privacy. Vanderbilt Journal of Entertainment Law & Practice 1999. 1: p. 56.

200.Lessig, L., Code and Other Laws of Cyberspace. New York NY: Basic Books, 1999.

201.Ling, R., The Mobile Connection: The Cell Phone's Impact on Society. 3rd ed: Morgan Kaufmann, 2004.

202.Mackay, W.E. Ethics, lies and videotape…. In Proceedings of SIGCHI conference on Human factors in computing systems 1995.

203.MacLean, A., R.M. Young, V. Bellotti, and T.P. Moran, Questions, Options, and Criteria: Elements of Design Space Analysis. Human-Computer Interaction (HCI)1991. 6(3&4): p. 201–250.

204.MacLean, A., R.M. Young, and T.P. Moran. Design Rationale: The Argument Behind The Artifact. In Proceedings of CHI 1989: ACM Press. pp. 247–252 1989.

205.Maheu, M.M., P. Whitten, and A. Allen,  E-Health, Telehealth, and Telemedicine: A Guide to Start-up and Success. Jossey-Bass Health Series, ed. Jossey Bass: San Francisco, 2001.

end-user-privacy-in-human-computer-interaction-v57.docPage 93 of 85

Document info
Document views154
Page views154
Page last viewedTue Oct 25 12:01:36 UTC 2016