X hits on this document





98 / 100

275.Stasko, J., D. McColgin, T. Miller, C. Plaue, and Z. Pousman, Evaluating the InfoCanvas Peripheral Awareness System: A Longitudinal, In Situ Study. Technical Report Technical Report GIT-GVU-05-08, GVU Center / Georgia Institute of Technology, Atlanta, GA, USA, March 2005 2005.

276.Stigler, G.J., An Introduction to Privacy in Economics and Politics. Journal of Legal Studies 1980. 9.

277.Strahilevitz, L.J., A Social Networks Theory of Privacy. University of Chicago Law Review 2005. 72 U. Chi. L. Rev. 919.

278.Sutcliffe, A., On the Effectuve Use and Reuse of HCI Knowledge, in Human-Computer Interaction in the New Millennium, J.M. Carroll, Editor. ACM Press. p. 3--29, 2000.

279.Sweeney, L., k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 2002. 10(5): p. 557–570.

280.Sweeney, L., Protecting Job Seekers from Identity Theft. IEEE Internet Computing 2006. 10(2).

281.Tang, K.P., P. Keyani, J. Fogarty, and J.I. Hong. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of Conference on Human Factors in Computing Systems. Montréal, Québec, Canada: ACM Press, New York, NY. pp. 93-102 2006. http://doi.acm.org/10.1145/1124772.1124788

282.Tarasewich, P. and C. Campbell. What Are You Looking At? In Proceedings of SOUPS 2005. Pittsburgh, PA, USA: ACM Press 2005.

283.Terrell, T. and A. Jacobs, Privacy, technology, and terrorism: Bartnicki, Kyllo, and the normative struggle behind competing claims to solitude and security. Emory Law Journal 2002. 51(4): p. 1469–1511.

284.Treasury Board of the Government of Canada, Privacy Impact Assessment Policy. 2002. http://www.tbs-sct.gc.ca/pubs_pol/ciopubs/pia-pefr/siglist_e.asp

285.Trevor, J., D.M. Hilbert, and B.N. Schilit. Issues in Personalizing Shared Ubiquitous Devices. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 56-72 2002.

286.Trewin, S. Configuration agents, control and privacy. In Proceedings of 2000 conference on Universal Usability. Arlington, VA, USA: ACM Press. pp. 9–16 2000.

287.Tullio, J.C., Exploring the Design and Use of Forecasting Groupware Applications with an Augmented Shared Calendar, Unpublished Doctoral Thesis, Georgia Institute of Technology, Atlanta, GA, USA, 2005. http://etd.gatech.edu

288.United States Department of Health Education and Welfare, Records, Computers and the Rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems. Technical  1973.

289.US Department of Health and Human Services, Health Insurance Reform: Security Standards; Final Rule. 2003.

290.Varian, H.R., Economic Aspects of Personal Privacy, in Privacy and Self-Regulation in the Information Age, NTIA, Editor. US Department of Commerce, 1997.

end-user-privacy-in-human-computer-interaction-v57.docPage 98 of 85

Document info
Document views186
Page views186
Page last viewedThu Oct 27 21:08:38 UTC 2016