X hits on this document





94 / 100

206.March, W. and C. Fleuriot. Girls, technology and privacy: "is my mother listening?" In Proceedings of SIGCHI Conference on Human Factors in Computing Systems. Montréal, Québec, Canada: ACM Press. pp. 107-110, April 22 - 27, 2006 2006. http://doi.acm.org/10.1145/1124772.1124790

207.McCullagh, D., Intel Nixes Chip-Tracking ID. 2000. http://www.wired.com/news/politics/0,1283,35950,00.html

208.Melenhorst, A.S., A.D. Fisk, E.D. Mynatt, and W.A. Rogers. Potential intrusiveness of aware home technology: Perceptions of older adults. In Proceedings of Human Factors and Ergonomics Society 48th Annual Meeting: HFES Press. pp. 266–270 2004.

209.Microsoft Corporation, Protecting Americans’ Privacy, Issued March 20, 2007. 2007. http://www.microsoft.com/issues/essays/2007/03-20ProtectingPrivacy.mspx

210.Milewski, A.E. and T.M. Smith. Providing presence cues to telephone users. In Proceedings of The 2000 ACM conference on Computer supported cooperative work (CSCW2000): ACM Press. pp. 89-96 2000.

211.Millett, L.I., B. Friedman, and E. Felten, Cookies and Web Browser Design: Toward Realizing Informed Consent Online. CHI Letters 2001. 3(1): p. 46-52.

212.Mitnick, K. and W. Simon, The Art of Deception: Controlling the Human Element of Security. 1st ed: Wiley. 304, 2002.

213.Moor, J.H., Towards a Theory of Privacy in the Information Age. Computers and Society 1997. 27(3): p. 27–32.

214.Müller, G. and K. Rannenberg,  Multilateral Security in Communications, Volume 3: Technology, Infrastructure, Economy. ed. Addison Wesley: München, 1999.

215.Muller, M.J., J.G. Smith, J.Z. Shoher, and H. Goldberg, Privacy, anonymity and interpersonal competition issues identified during participatory design of project management groupware. ACM SIGCHI Bulletin 1990. 23(1).

216.Murphy, R.S., Property Rights in Personal Information: An Economic Defense of Privacy. Georgetown Law Journal 1996. 84 Geo. L.J. 2381.

217.Nagel, K., Using Availability Indicators to Enhance Context-Aware Family Communication Applications, Unpublished PhD, Georgia Institute of Technology, Atlanta, GA, USA, 2006.

218.Nagel, K., J. Hudson, and G.D. Abowd. Predictors of availability in home life context-mediated communication. In Proceedings of CSCW’04: ACM Press. pp. 497–506 2004.

219.Nagel, K., C.D. Kidd, T. O’Connell, A. Dey, and G.D. Abowd. The Family Intercom: Developing a Context-Aware Audio Communication System. In Proceedings of Ubicomp 2001. Atlanta, GA. pp. 176-183 2001.

220.Nardi, B., S. Whittaker, and E. Bradner. Interaction and Outeraction: Instant Messaging in Action. In Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW2000): ACM Press. pp. 79–88 2000.

221.Neal, A., M. Humphreys, D. Leadbetter, and P. Lindsay, Development of hazard analysis techniques for human-computer systems, in Innovation and Consolidation in Aviation, G. Edkins and P. Pfister, Editors. Ashgate: Aldershot, UK. p. 255-262, 2003.

end-user-privacy-in-human-computer-interaction-v57.docPage 94 of 85

Document info
Document views125
Page views125
Page last viewedSun Oct 23 12:08:39 UTC 2016