X hits on this document





97 / 100

258.Schilit, B.N., D.M. Hilbert, and J. Trevor, Context-aware communication. IEEE Wireless Communications. 9(5): p. 46 -54.

259.Schmandt, C., J. Kim, K. Lee, G. Vallejo, and M. Ackerman. Mediated voice communication via mobile IP. In Proceedings of 15th Annual ACM Symposium on User interface Software and Technology UIST '02. Paris, France, October 27 - 30, 2002: ACM Press. pp. 141-150 2002. http://doi.acm.org/10.1145/571985.572005

260.Schneier, B., Beyond Fear. New York, NY, USA: Springer, 2006.

261.Schneier, B., Secrets and Lies: Digital Security in a Networked World. New York, NY, USA: Wiley Computer Publishing. xv+412, 2000.

262.Sheehan, K.B., In poor health: An assessment of privacy policies at direct-to-consumer web sites. Journal of Public Policy & Marketing 2005. 24(2).

263.Shneiderman, B., Designing trust into online experiences. Commun. ACM 2000. 43(12): p. 57-59.

264.Shoemaker, G.B. and K.M. Inkpen. Single display privacyware: augmenting public displays with private information. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems. Seattle, Washington, United States: ACM Press. pp. 522-529 2001. http://doi.acm.org/10.1145/365024.365349

265.SiteAdvisor, M., McAfee SiteAdvisor. 2007. http://www.siteadvisor.com/

266.Sloane, L., Orwellian Dream Come True: A Badge That Pinpoints You, New York Times pp. 14, 1992.

267.Smith, A.D. and F. Offodile, Information management of automatic data capture: an overview of technical developments. Information Management & Computer Security 2002. 10(3): p. 109–118.

268.Smith, H.J., S.J. Milberg, and S.J. Burke, Information privacy: measuring individuals’ concerns about organizational practices. MIS Quart 1996. 20(2): p. 167–196.

269.Sohlenkamp, M. and G. Chwelos. Integrating Communication, Cooperation, and Awareness: The DIVA Virtual Office Environment. In Proceedings of CSCW 94. Chapel Hill, NC, USA: ACM Press, 10/94 1994.

270.Song, X. and L.J. Osterweil, Toward Objective, Systematic Design-Method Comparisons. IEEE Software 1992. 9(3): p. 43–53.

271.Spiekermann, S. Perceived Control: Scales for Privacy in Ubiquitous Computing. In Proceedings of Conference on User Modeling – UM’05, 2005. Edinburgh, UK, 24–29 July 2005 2005.

272.Spiekermann, S., J. Grossklags, and B. Berendt. E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In Proceedings of ACM conference on electronic commerce (EC 2001). Tampa, Florida. pp. 38-46, October 2001 2001.

273.Spiekermann, S. and H. Ziekow. RFID: a 7-point plan to ensure privacy. In Proceedings of 13th European Conference on Information Systems. ECIS, Regensburg, Germany, May 2005 2005.

274.Spinuzzi, C. A Scandinavian Challenge, a US Response: Methodological Assumptions in Scandinavian and US Prototyping Approaches. In Proceedings of SIGDOC’02. Toronto, Ontario, Canada: ACM Press, October 20-23, 2002 2002.

end-user-privacy-in-human-computer-interaction-v57.docPage 97 of 85

Document info
Document views175
Page views175
Page last viewedThu Oct 27 07:11:22 UTC 2016