Towards a Deconstruction of the Privacy Space
暂无分享,去创建一个
[1] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[2] M. Angela Sasse,et al. Taming the wolf in sheep's clothing: privacy in multimedia communications , 1999, MULTIMEDIA '99.
[3] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[4] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[5] M. Foucault. Discipline and Punish, Panopticism , 1977 .
[6] Philip E. Agre,et al. Surveillance and Capture: Two Models of Privacy , 1994, Inf. Soc..
[7] Ellen Alderman,et al. Right to Privacy , 2001, Challenging Human Rights Violations: Using International Law in U.S. Courts.
[8] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[9] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[10] Benjamin D. Brunk. Understanding the Privacy Space , 2002, First Monday.
[11] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[12] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[13] Douglas B. Terry,et al. Using collaborative filtering to weave an information tapestry , 1992, CACM.
[14] Rohan Samarajiva,et al. Interactivity as though privacy mattered , 1997 .
[15] Philip E. Agre,et al. Changing Places: Contexts of Awareness in Computing , 2001, Hum. Comput. Interact..