Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights
暂无分享,去创建一个
David A. Wagner | Serge Egelman | Pratyush Mishra | Rebecca S. Portnoff | Derek Leung | Linda N. Lee | D. Wagner | Pratyush Mishra | Serge Egelman | Derek Leung | Linda N. Lee | L. Lee
[1] Stephen Checkoway,et al. iSeeYou: Disabling the MacBook Webcam Indicator LED , 2014, USENIX Security Symposium.
[2] Abigail Sellen,et al. Now let me see where i was: understanding how lifelogs mediate memory , 2010, CHI.
[3] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[4] Alex Pentland,et al. The memory glasses: subliminal vs. overt memory support with imperfect information , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[5] Ronald Azuma,et al. Recent Advances in Augmented Reality , 2001, IEEE Computer Graphics and Applications.
[6] Ronald Azuma,et al. A Survey of Augmented Reality , 1997, Presence: Teleoperators & Virtual Environments.
[7] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[8] Paul Lukowicz,et al. The WearARM: modular, high performance, low power computing platform designed for integration into everyday clothing , 2001, Proceedings Fifth International Symposium on Wearable Computers.
[9] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[10] J. Patton,et al. Factor structure of the Barratt impulsiveness scale. , 1995, Journal of clinical psychology.
[11] Jo-Mae B. Maris,et al. Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects , 2006, J. Inf. Syst..
[12] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[13] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[14] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[15] Kori Inkpen Quinn,et al. Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.
[16] Lorrie Faith Cranor,et al. Timing is everything?: the effects of timing and placement of online privacy indicators , 2009, CHI.
[17] W. Keith Edwards,et al. At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.
[18] Roberto Tamassia,et al. Secure Visualization of Authentication Information: A Case Study , 2004, 2004 IEEE Symposium on Visual Languages - Human Centric Computing.
[19] Eric Campo,et al. A review of smart homes - Present state and future challenges , 2008, Comput. Methods Programs Biomed..
[20] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[21] S. Frederick. Journal of Economic Perspectives—Volume 19, Number 4—Fall 2005—Pages 25–42 Cognitive Reflection and Decision Making , 2022 .
[22] M. Chan,et al. Smart homes - current features and future perspectives. , 2009, Maturitas.
[23] Ingrid M. Martin,et al. Intended and Unintended Consequences of Warning Messages: A Review and Synthesis of Empirical Research , 1994 .
[24] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[25] Pattie Maes,et al. eye-q: eyeglass peripheral display for subtle intimate notifications , 2006, Mobile HCI.
[26] Jeffrey S. Shell,et al. Augmenting and sharing memory with eyeBlog , 2004, CARPE'04.
[27] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[28] Lorrie Faith Cranor,et al. What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.
[29] Gareth J. F. Jones,et al. Augmenting human memory using personal lifelogs , 2010, AH.
[30] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.