Privacy , Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power : Understanding Collective Information Practices
暂无分享,去创建一个
[1] Alfred Schutz,et al. The Problem of Rationality in the Social World , 1943 .
[2] E. Goffman. Behavior in Public Places , 1963 .
[3] H. Garfinkel. Studies in Ethnomethodology , 1968 .
[4] M. Sahlins. Culture and Practical Reason , 1979 .
[5] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[6] Barbara Laslett,et al. Privacy and Secrecy: A Conceptual Comparison , 1977 .
[7] The Social Construction of Dangerousness , 1979 .
[8] Gary Alan Fine,et al. Rhetorics and Action in Moral Organizations , 1979 .
[9] J. March,et al. Information in Organizations as Signal and Symbol. , 1981 .
[10] B. Erickson. Secret Societies and Social Structure , 1981 .
[11] E. Shils. The Constitution Of Society , 1982 .
[12] Laurel Richardson,et al. Secrecy and Status: The Social Construction of Forbidden Relationships , 1988 .
[13] C. Plott. psychology and economics , 1990 .
[14] Daniel G. Bobrow,et al. Design for Conversation: Lessons from Cognoter , 1991, Int. J. Man Mach. Stud..
[15] Brian Wynne,et al. Misunderstood misunderstanding: social identities and public uptake of science , 1992 .
[16] Michael B. Usher,et al. Science in action , 1993, Nature.
[17] Kristen Day,et al. ASSAULT PREVENTION AS SOCIAL CONTROL: WOMEN AND SEXUAL ASSAULT PREVENTION ON URBAN COLLEGE CAMPUSES , 1995 .
[18] Philip E. Agre,et al. Conceptions of the user in computer systems design , 1995 .
[19] G. Fine,et al. Secrecy, Trust, and Dangerous Leisure: Generating Group Cohesion in Voluntary Organizations , 1996 .
[20] Etienne Wenger,et al. Communities of Practice: Learning, Meaning, and Identity , 1998 .
[21] M. Lock,et al. Breast cancer: Reading the omens , 1998 .
[22] D. Merten,et al. ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .
[23] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[24] Wendy A. Kellogg,et al. Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.
[25] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[26] Kristen Day,et al. Constructing Masculinity and Women's Fear in Public Space in Irvine, California , 2001 .
[27] Jonathan Grudin,et al. Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..
[28] J. Overhage,et al. Sorting Things Out: Classification and Its Consequences , 2001, Annals of Internal Medicine.
[29] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[30] Madhu C. Reddy,et al. A finger on the pulse: temporal rhythms and information seeking in medical work , 2002, CSCW '02.
[31] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[32] Marco Gruteser,et al. USENIX Association , 1992 .
[33] Lorrie Faith Cranor,et al. 'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.
[34] William G. Griswold,et al. Challenge: ubiquitous location-aware computing and the "place lab" initiative , 2003, WMASH '03.
[35] D. Vaughan. In Organizational Encounters with Risk, Bridget Hutter and Michael Power, eds. New York and Cambridge: Cambridge University Press, 2004. ORGANIZATIONAL RITUALS OF RISK AND ERROR , 2003 .
[36] Bill N. Schilit,et al. Privacy and Security in the Location-enhanced World Wide Web , 2003 .
[37] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[38] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[39] Marc Langheinrich,et al. Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.
[40] Shobita Parthasarathy,et al. Regulating Risk: Defining Genetic Privacy in the United States and Britain , 2004 .
[41] J. Fosket,et al. Constructing “High-Risk Women”: The Development and Standardization of a Breast Cancer Risk Assessment Tool , 2004 .
[42] Paul Dourish,et al. Everyday Encounters with Context-Aware Computing in a Campus Environment , 2004, UbiComp.
[43] G. Cradock. Risk, Morality, and Child Protection: Risk Calculation as Guides to Practice , 2004 .
[44] William E. Kastenberg,et al. Uncertainty and Regulation: The Rhetoric of Risk in the California Low-Level Radioactive Waste Debate , 2004 .
[45] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .