Towards Everyday Privacy for Ubiquitous Computing
暂无分享,去创建一个
Jason Hong | Anind K. Dey | James A. Landay | Jennifer Mankoff | Xiaodong Jiang | Scott Lederer | Jason I. Hong | A. Dey | J. Landay | Scott Lederer | X. Jiang | J. Mankoff
[1] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[2] A. Acquisti. Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments , 2002 .
[3] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[4] Simson Garfinkel,et al. Database Nation , 2000 .
[5] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[6] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[7] James A. Landay,et al. An Infrastructure Approach to Context-Aware Computing , 2001, Hum. Comput. Interact..
[8] Dogan Kesdogan,et al. Analysis of Security and Privacy in Mobile-IP , 1996 .
[9] Joshua Cole,et al. :Documenting Individual Identity: The Development of State Practices in the Modern World , 2004 .
[10] Steve Talbott. The trouble with ubiquitous technology pushers , 2000, CFP '00.
[11] Gary Alan Fine,et al. The Social Fabric: Dimensions and Issues , 1989 .
[12] Jonathan Grudin,et al. Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..
[13] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[14] Selma C. Etter. Database Nation the Death of Privacy in the 21st Century , 2000, Journal of Computing in Higher Education.
[15] Anne Adams,et al. Multimedia information changes the whole privacy ballgame , 2000, CFP '00.
[16] Gary T. Marx,et al. 17. Identity and Anonymity: Some Conceptual Distinctions and Issues for Research , 2002 .
[17] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[18] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[19] Richard Harper. Why do People Wear Active Badges , 1993 .
[20] Allison Woodruff,et al. How push-to-talk makes talk less pushy , 2003, GROUP.
[21] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[22] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[23] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[24] Bonnie A. Nardi,et al. Interaction and outeraction: instant messaging in action , 2000, CSCW '00.
[25] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.