Privacy and User Trust in Context-Aware Systems
暂无分享,去创建一个
Wessel Kraaij | Mark A. Neerincx | Saskia Koldijk | Gijs Koot | Wessel Kraaij | Saskia Koldijk | Mark Antonius Neerincx | G. Koot
[1] Dola Barua. Location-Based Services for Mobile Telephony: a study of Users' privacy concerns , 2015 .
[2] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[3] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[4] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[5] Ira S. Rubinstein,et al. Big Data: The End of Privacy or a New Beginning? , 2013 .
[6] Dong-Hee Shin,et al. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..
[7] W. IJsselsteijn,et al. Investigating Privacy Attitudes and Behavior in Relation to Personalization , 2008 .
[8] David Wright,et al. The state of the art in privacy impact assessment , 2012, Comput. Law Secur. Rev..
[9] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[10] A. Cavoukian. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .
[11] Saskia Koldijk. Automatic recognition of context and stress to support knowledge workers , 2012, ECCE.
[12] Gaetano Borriello,et al. UbiComp 2002: Ubiquitous Computing: 4th International Conference Göteborg, Sweden, September 29 – October 1, 2002 Proceedings , 2002, Lecture Notes in Computer Science.
[13] Wainer Lusoli,et al. The Policy Maker's Anguish: Regulating Personal Data Behaviour Between Paradoxes and Dilemmas , 2009, WEIS.
[14] George Buchanan,et al. An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.