Is Privacy Controllable?
暂无分享,去创建一个
[1] Sarah Spiekermann,et al. Online social networks: why we disclose , 2010, J. Inf. Technol..
[2] P. Kleingeld,et al. The Stanford Encyclopedia of Philosophy , 2013 .
[3] R. Marken,et al. The Origins and Future of Control Theory in Psychology , 2015 .
[4] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[5] Sameer Patil,et al. Reflection or action?: how feedback and control affect location sharing decisions , 2014, CHI.
[6] Bruce A. Francis,et al. Feedback Control Theory , 1992 .
[7] Jeffrey B. Vancouver,et al. Modeling the Mind and the Milieu , 2012 .
[8] Dr B Santhosh Kumar Santhosh Balan,et al. Closeness : A New Privacy Measure for Data Publishing , 2022 .
[9] Roksana Boreli,et al. Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[10] Yefim Shulman,et al. Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures , 2017, Privacy and Identity Management.
[11] Bashar Nuseibeh,et al. Privacy Itch and Scratch: On Body Privacy Warnings and Controls , 2016, CHI Extended Abstracts.
[12] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[13] Sarah Theiss,et al. Introduction To Dynamic Systems Theory Models And Applications , 2016 .
[14] John M. Flach,et al. Control Theory for Humans: Quantitative Approaches To Modeling Performance , 2002 .
[15] Joachim Meyer,et al. Is It Harmful? Re-examining Privacy Concerns , 2017, Privacy and Identity Management.
[16] James A. Landay,et al. Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..
[17] W. Parent. Privacy, morality, and the law , 1985 .
[18] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[19] Klaus Wehrle,et al. Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany , 2015 .
[20] W. Mansell,et al. A biopsychosocial model based on negative feedback and control , 2014, Front. Hum. Neurosci..
[21] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[22] Minerva M. Yeung,et al. Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.
[23] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[24] Sameer Patil,et al. Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback , 2015, CHI.
[25] W. T. Powers,et al. A General Feedback Theory of Human Behavior: Part I , 1960 .
[26] C. Carver. Control Processes, Priority Management, and Affective Dynamics , 2015 .
[27] Yuguang Fang,et al. Optimal Task Recommendation for Mobile Crowdsourcing With Privacy Control , 2016, IEEE Internet of Things Journal.
[28] Eamonn O'Neill,et al. Feasibility of structural network clustering for group-based privacy control in social networks , 2010, SOUPS.
[29] Jessica Colnago,et al. How to inform privacy agents on preferred level of user control? , 2016, UbiComp Adjunct.
[30] F. Fairman. Introduction to dynamic systems: Theory, models and applications , 1979, Proceedings of the IEEE.
[31] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[32] Adam J. Lee,et al. Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks , 2017, CSCW.
[33] Nees Jan van Eck,et al. Bibliometric mapping of computer and information ethics , 2011, Ethics and Information Technology.
[34] Joseph Kupfer,et al. PRIVACY, AUTONOMY, AND SELF-CONCEPT , 2016 .
[35] Alfred Kobsa,et al. Increasing Sharing Tendency Without Reducing Satisfaction: Finding the Best Privacy-Settings User Interface for Social Networks , 2014, ICIS.
[36] Erik Wästlund,et al. What Would It Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services , 2014, NordSec.
[37] Lorrie Faith Cranor,et al. Locaccino: a privacy-centric location sharing application , 2010, UbiComp '10 Adjunct.
[38] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[39] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[40] Adam J. Lee,et al. Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.
[41] Yang Wang,et al. Nudges for Privacy and Security , 2017, ACM Comput. Surv..
[42] Anna Cinzia Squicciarini,et al. Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).
[43] David J. Danelski,et al. Privacy and Freedom , 1968 .
[44] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[45] Nora A Draper,et al. The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation , 2015 .
[46] A. Moore,et al. Defining Privacy , 2008 .
[47] Simone Fischer-Hübner,et al. Tools for Achieving Usable Ex Post Transparency: A Survey , 2017, IEEE Access.
[48] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[49] Sunil Choenni,et al. Privacy protection in data sharing: towards feedback based solutions , 2014, ICEGOV.
[50] Sonia Chiasson,et al. User Perceptions of Sharing, Advertising, and Tracking , 2015, SOUPS.
[51] Thomas B. Sheridan,et al. Man-machine systems;: Information, control, and decision models of human performance , 1974 .
[52] David A. Wagner,et al. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences , 2017, SOUPS.
[53] M. Hoagland,et al. Feedback Systems An Introduction for Scientists and Engineers SECOND EDITION , 2015 .