Understanding and Capturing People’s Privacy Policies in a People Finder Application
暂无分享,去创建一个
Lorrie Faith Cranor | Norman Sadeh | Jason Hong | Jinghai Rao | Patrick Gage Kelley | Ian Fette | Madhu K. Prabaker | Madhu Prabaker | Jason I. Hong | L. Cranor | N. Sadeh | Ian Fette | Jinghai Rao
[1] Ashraf Khalil,et al. Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.
[2] Sameer Patil,et al. Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.
[3] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[4] Louise Barkhuus. Privacy in Location-Based Services , Concern vs . Coolness , 2004 .
[5] Yitao Duan,et al. Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments , 2004, Privacy Enhancing Technologies.
[6] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[7] William G. Griswold,et al. Mobility Detection Using Everyday GSM Traces , 2006, UbiComp.
[8] James Fogarty,et al. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.
[9] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[10] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[11] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[12] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[13] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[14] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[15] Lujo Bauer,et al. User-Controllable Security and Privacy for Pervasive Computing , 2007 .
[16] Fabien L. Gandon,et al. Ambient Intelligence: The MyCampus Experience , 2005 .
[17] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[18] Dan Suciu,et al. Expressing Privacy Policies Using Authorization Views , 2007 .
[19] Jonathan Grudin. Presenting choices in context: approaches to information sharing , 2003 .
[20] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[21] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[22] Marco Gruteser,et al. USENIX Association , 1992 .
[23] R. Harper. Why people do and don't wear active badges: a case study , 1995 .
[24] Jason I. Hong,et al. Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.
[25] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.