PRIMA — Privacy research through the perspective of a multidisciplinary mash up
暂无分享,去创建一个
Peter Seipel | Markus Bylund | Sakari Tamminen | Asko Lehmuskallio | Sakari Tamminen | Mikael Johnson | Asko Lehmuskallio | P. Seipel | Mikael Johnson | Markus Bylund
[1] Two Treatises of Government , 1961 .
[2] Kari-Jouko Räihä,et al. Faces of Privacy: Effect of Culture and Context , 2009, INTERACT.
[3] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[4] Wendy A. Kellogg,et al. Social translucence: an approach to designing systems that support social processes , 2000, TCHI.
[5] Wiebe E. Bijker,et al. Science in action : how to follow scientists and engineers through society , 1989 .
[6] Nancy Fraser. Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy , 1990 .
[7] Lorenzo Valeri,et al. Review of the European Data Protection Directive , 2009 .
[8] Amitai Etzioni,et al. The Limits Of Privacy , 1999 .
[9] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[10] Gregory D. Abowd,et al. From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary , 2008, TCHI.
[11] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[12] J. Law,et al. Complexities: Social Studies of Knowledge Practices , 2002 .
[13] John Cullen,et al. Democratizing Innovation , 2020, Encyclopedia of Creativity, Invention, Innovation and Entrepreneurship.
[14] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[15] M. Callon. Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .
[16] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[17] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[18] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[19] J. Habermas,et al. Strukturwandel der Öffentlichkeit , 1964 .
[20] The Measurement of Privacy Preferences Within Marital Relationships: The Relationship Privacy Preference Scale , 1997 .
[21] V.,et al. Notes and comments , 1922, Psychiatry.
[22] W. R. Howard. Acting with Technology: Activity Theory and Interaction Design , 2007 .
[23] Nancy Fraser. Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy , 2016, Public Space Reader.
[24] Darhl M. Pedersen,et al. A factorial comparison of privacy questionnaires , 1996 .
[25] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[26] Michael Boyle,et al. The language of privacy: Learning from video media space analysis and design , 2005, TCHI.
[27] L. Bygrave. Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .
[28] A. Clarke. Situational Analysis: Grounded Theory After the Postmodern Turn , 2005 .
[29] Kenneth L. Kraemer,et al. Computerization Movements and Technology Diffusion: From Mainframes to Ubiquitous Computing , 2008 .
[30] B. Latour,et al. Power, Action and Belief. A New Sociology of Knowledge? , 1986 .
[31] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[32] J. Habermas. Strukturwandel der Öffentlichkeit : Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft , 1964 .
[33] Simon N. L. Chalton,et al. Data protection law , 1988 .
[34] Reijo Miettinen,et al. Perspectives on activity theory: Frontmatter , 1999 .
[35] D. Norman,et al. User Centered System Design: New Perspectives on Human-Computer Interaction , 1988 .
[36] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[37] Amitai Etzioni,et al. The Common Good , 2004 .
[38] Peter Laslett,et al. Two Treatises of Government , 1948 .
[39] Richard Sennett,et al. The Fall of Public Man , 1977 .
[40] T.L.J. Ferris,et al. Participatory IT Design: Designing for Business and Workplace Realities , 2005, IEEE Transactions on Professional Communication.
[41] David J. Danelski,et al. Privacy and Freedom , 1968 .
[42] Enid Mumford,et al. The story of socio‐technical design: reflections on its successes, failures and potential , 2006, Inf. Syst. J..
[43] A. Young. Sorting Things Out: Classification and Its Consequences. , 2001 .
[44] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[45] Priscilla M. Regan. Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.
[46] Asko Lehmuskallio. 'A photo is not an extension of me, it's plain surface': views of users of a Web 2.0 photo-sharing site on photos and privacy , 2007 .
[47] Book Reviews: After Habermas – New Perspectives on the Public Sphere , 2004 .
[48] Blake J. Roessler,et al. The Value of Privacy , 2004 .
[49] H. Arendt,et al. The Human Condition , 1960 .
[50] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[51] A. Appadurai. Modernity at Large: Cultural Dimensions of Globalization , 1996 .
[52] Sakari Tamminen,et al. Managing Privacy on Social Network Sites , 2009 .
[53] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[54] H. Blumer,et al. Symbolic Interactionism: Perspective and Method , 1988 .
[55] Patricia Brierley Newell. A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .
[56] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[57] Batya Friedman,et al. Human values and the design of computer technology , 1997 .
[58] Kristina Höök,et al. Pieces of identity , 2008, NordiCHI.