X hits on this document





96 / 100

239.Pfitzmann, A., Technologies for Multilateral Security, in Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 85--91, 1999.

240.Posner, R.A., An Economic Theory of Privacy. Regulation 1978: p. 19–26.

241.Povey, D. Optimistic Security: A New Access Control Paradigm. In Proceedings of 1999 New Security Paradigms Workshop 1999. http://security.dstc.edu.au/staff/povey/papers/optimistic.pdf

242.Price, B.A., K. Adam, and B. Nuseibeh, Keeping ubiquitous computing to yourself: A practical model for user control of privacy. Int. J. Human-Computer Studies 2005. 63: p. 228–253.

243.Privacy & American Business, Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. Privacy & American Business Newsletter 2003. 10(6).

244.Privacy Protection Study Commission, Personal Privacy in an Information Society. Technical, Government Printing Office, Washington D.C., USA 1977.

245.Rambøll Management Denmark, Economic Evaluation of the Data Protection Directive 95/46/EC Final Report. Technical, May 2005 2005.

246.Rannenberg, K. Multilateral Security: A Concept and Examples for Balanced Security. In Proceedings of New Security Paradigms Workshop. Ballycotton, Ireland: ACM Press. pp. 151–162 2000.

247.Rannenberg, K. Recent Development in Information Technology Security Evaluation – The Need for Evaluation Criteria for Multilateral Security. In Proceedings of Security and Control of Information Technology in Society – Proceedings of the IFIP TC9/WG 9.6 Working Conference. Onboard M/S Ilich and ashore at St. Petersburg, Russia: North-Holland, Amsterdam. pp. 113–128, August 12–17, 1993 1993.

248.Rannenberg, K., What can IT Security Certification do for Multilateral Security? in Technology, Infrastructure, Economy, G. Müller and K. Rannenberg, Editors. Addison Wesley Longman Verlag GmbH. p. 515--530, 1999.

249.Rheingold, H., PARC is Back! Wired 1994. 2(2).

250.Rogers, E., Diffusion of Innovations. 5th ed: Free Press, 2003.

251.Root, R.W. Design of a multi-media vehicle for social browsing. In Proceedings of The 1988 ACM Conference on Computer-supported Cooperative Work (CSCW 88) 1988. http://doi.acm.org/10.1145/62266.62269

252.Roßnagel, A., R. Haux, and W. Herzog,  Mobile und sichere Kommunikation im Gesundheitswesen. ed. Vieweg: Braunschweig, Germany, 1999.

253.Rowan, G., Visionaries See Invisible Computing, The Globe and Mail, 1997.

254.Samuelson, P., Privacy As Intellectual Property? 52 Stanford Law Review 1125 2000.

255.Sasse, A. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery. In Proceedings of 2003 Workshop on Human-Computer Interaction and Security Systems at CHI 2003 2003. http://www.andrewpatrick.ca/CHI2003/HCISEC/

256.Scacchi, W., Socio-Technical Design, in The Encyclopedia of Human-Computer Interaction, W.S. Bainbridge, Editor. Berkshire Publishing Group, 2004.

257.Scalet, S.D., The Five Most Shocking Things About the Choice Point Debacle, CSO Magazine, 2005.

end-user-privacy-in-human-computer-interaction-v57.docPage 96 of 85

Document info
Document views297
Page views297
Page last viewedTue Jan 17 22:01:09 UTC 2017