A study of preferences for sharing and privacy
暂无分享,去创建一个
[1] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[2] Volker Wulf,et al. Beyond "Yes or No" - Extending Access Control in Groupware with Awareness and Negotiation , 2000 .
[3] Volker Wulf,et al. A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.
[4] John K. Butler. Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory , 1991 .
[5] Dean Povey. Optimistic security: a new access control paradigm , 1999, NSPW '99.
[6] Mark S. Ackerman,et al. Developing for privacy: civility frameworks and technical design , 2000, CFP '00.
[7] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[8] Anind K. Dey,et al. Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .
[9] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[10] Jonathan Grudin,et al. Toward Understanding Preferences for Sharing and Privacy , 2004 .
[11] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.