It Is About What They Could Do with the Data
暂无分享,去创建一个
Volker Wulf | Dave Randall | Sameer Patil | Gunnar Stevens | Timo Jakobi | V. Wulf | D. Randall | S. Patil | G. Stevens | Timo Jakobi
[1] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[2] Alexander L. Davis,et al. Preparing for smart grid technologies: A behavioral decision research approach to understanding consumer expectations about smart meters , 2012 .
[3] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[4] Nicolette de Keizer,et al. Eliciting end-user expectations to guide the implementation process of a new electronic health record: A case study using concept mapping , 2016, Int. J. Medical Informatics.
[5] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[6] Bart P. Knijnenburg. Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions , 2013, Decisions@RecSys.
[7] M. Kane. Data Banks in a Free Society. By Alan F. Westin and Michael A. Baker. Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems , 2019 .
[8] James A. Landay,et al. The design of eco-feedback technology , 2010, CHI.
[9] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[10] J. Preece,et al. User-Centered Design , 2004 .
[11] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[12] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[13] Melanie Volkamer,et al. Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy , 2015, CSOC.
[14] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[15] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[16] Stefanie Pötzsch,et al. Privacy Awareness: A Means to Solve the Privacy Paradox? , 2008, FIDIS.
[17] A. Cavoukian. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .
[18] L. Jean Camp,et al. Peer-produced privacy protection , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[19] Tanzima Hashem,et al. "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..
[20] Alessandro Acquisti,et al. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.
[21] Sanjay Goel,et al. Smart Grid Security , 2015, SpringerBriefs in Cybersecurity.
[22] Marilyn A. Brown,et al. Smart meter deployment in Europe: A comparative case study on the impacts of national policy schemes , 2017 .
[23] Mark Rouncefield,et al. Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work) , 2007 .
[24] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[25] Zekeriya Erkin,et al. Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.
[26] Tom Rodden,et al. At home with agents: exploring attitudes towards future smart energy infrastructures , 2013, IJCAI.
[27] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[28] Carrie Gates,et al. Data Is the New Currency , 2014, NSPW '14.
[29] Volker Wulf,et al. Appropriation Infrastructure: Supporting the Design of Usages , 2009, IS-EUD.
[30] Tony Flick,et al. Securing the Smart Grid: Next Generation Power Grid Security , 2010 .
[31] Robert D. Macredie,et al. Navigation in hypermedia learning systems: experts vs. novices , 2006, Comput. Hum. Behav..
[32] Gunnar Stevens,et al. Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme , 2014, Datenschutz und Datensicherheit - DuD.
[33] Clare-Marie Karat,et al. Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.
[34] Ulrich Greveler. Die Smart-Metering-Debatte 2010–2016 und ihre Ergebnisse zum Schutz der Privatsphäre , 2016, Datenbank-Spektrum.
[35] Nancy C. Goodwin,et al. Functionality and usability , 1987, CACM.
[36] Bert-Jaap Koops,et al. Smart Metering and Privacy in Europe: Lessons from the Dutch Case , 2013, European Data Protection.
[37] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[38] Alfred Kobsa,et al. Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior , 2004, Privacy Enhancing Technologies.
[39] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[40] Volker Wulf,et al. Engaging with practices: design case studies as a research framework in CSCW , 2011, CSCW.
[41] Julia V. Gallenkamp,et al. Exploring the Role of Control - Smart Meter Acceptance of Residential Consumers , 2010, AMCIS.
[42] Xiaoqian Jiang,et al. A Randomized Response Model for Privacy Preserving Smart Metering , 2012, IEEE Transactions on Smart Grid.
[43] I. Coyne. Sampling in qualitative research. Purposeful and theoretical sampling; merging or clear boundaries? , 1997, Journal of advanced nursing.
[44] Oliver D. Doleski,et al. Smart Meter Rollout , 2013 .
[45] Giles Hogben,et al. Privacy Features: Privacy features of European eID card specifications , 2008 .
[46] Paul Dourish,et al. How HCI interprets the probes , 2007, CHI.
[47] Hamed Haddadi,et al. Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.
[48] Seda F. Gürses,et al. A critical review of 10 years of Privacy Technology , 2010 .
[49] Ian Richardson,et al. Smart meter data: Balancing consumer privacy concerns with legitimate applications , 2012 .
[50] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[51] Peter Tolmie,et al. Repacking ‘Privacy’ for a Networked World , 2017, Computer Supported Cooperative Work (CSCW).
[52] Marc Busch,et al. Consumers’ privacy concerns and implications for a privacy preserving Smart Grid architecture—Results of an Austrian study , 2015 .
[53] Andy Crabtree,et al. Design in the absence of practice: breaching experiments , 2004, DIS '04.
[54] Derek McAuley,et al. The Dataware manifesto , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[55] Volker Wulf,et al. Uncovering practices of making energy consumption accountable: A phenomenological inquiry , 2013, TCHI.
[56] I. Rubinstein. Regulating Privacy by Design , 2011 .
[57] Sarvapali D. Ramchurn,et al. "Just whack it on until it gets hot": Working with IoT Data in the Home , 2016, CHI.
[58] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[59] A. Acquisti. The Economics of Personal Data and the Economics of Privacy , 2010 .
[60] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[61] Marc Langheinrich,et al. Privacy and trust issues with invisible computers , 2005, CACM.
[62] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[63] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[64] Giacomo Verticale,et al. Privacy-preserving smart metering with multiple data Consumers , 2013, Comput. Networks.
[65] Alexander Dix,et al. Smart Meters in Europe: Privacy by Design at its Best , 2012 .
[66] Frank Pallas. Data Protection and smart grid communication - The European perspective , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[67] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[68] Klemens Böhm,et al. Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.
[69] Jack I. Lerner,et al. Taking the 'Long View' on the Fourth Amendment: Stored Records and the Sanctity of the Home , 2008 .
[70] B. Glaser. Doing grounded theory : issues and discussions , 1998 .
[71] Tony Flick,et al. Chapter 1 – Smart Grid: What Is It? , 2011 .
[72] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[73] Jason I. Hong,et al. End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..
[74] Kelly Caine,et al. Patients want granular privacy control over health information in electronic medical records , 2013, J. Am. Medical Informatics Assoc..
[75] Gillian R. Hayes. The relationship of action research to human-computer interaction , 2011, TCHI.
[76] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[77] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[78] Mary Ellen Zurko. User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[79] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[80] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[81] 可児 潤也. 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .
[82] Minghua Chen,et al. Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.
[83] Andreas Pfitzmann,et al. Multilateral Security: Enabling Technologies and Their Evaluation , 2001, Informatics.
[84] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[85] David Wright,et al. A framework for the ethical impact assessment of information technology , 2011, Ethics and Information Technology.
[86] W. Thomas,et al. The Child in America: Behavior Problems and Programs , 2017 .
[87] B. Neenan,et al. Societal Benefits of Smart Metering Investments , 2008 .
[88] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[89] H. Simon,et al. Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .
[90] Saonee Sarker,et al. Adoption of Information Systems in the Electricity Sector: The Issue of Smart Metering , 2012, AMCIS.
[91] Roger Clarke,et al. Privacy impact assessment: Its origins and development , 2009, Comput. Law Secur. Rev..
[92] Simson L. Garfinkel,et al. Security and Usability , 2005 .
[93] Lorrie Faith Cranor,et al. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .
[94] David L. Schwartz,et al. Legal Scholarship and the United States Court of Appeals for the Federal Circuit: An Empirical Study of a National Circuit , 2010 .
[95] Clark W Gellings,et al. The Smart Grid: Enabling Energy Efficiency and Demand Response , 2020 .
[96] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[97] Andreas Reckwitz. Toward a Theory of Social Practices , 2002 .
[98] Richard H. R. Harper,et al. Trust, Computing, and Society: Trust, Computing, and Society: Introduction , 2014 .
[99] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[100] Katie Shilton,et al. Four billion little brothers? , 2009, Commun. ACM.
[101] Mazdak Zamani,et al. Study of smart card technology and probe user awareness about it: A case study of Middle Eastern students , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[102] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[103] Mark W. Newman,et al. The Work to Make a Home Network Work , 2005, ECSCW.
[104] Daniela Schiek,et al. Das schriftliche Interview in der qualitativen Sozialforschung / The Written Interview in Qualitative Social Research , 2014 .
[105] G Gigerenzer,et al. Reasoning the fast and frugal way: models of bounded rationality. , 1996, Psychological review.
[106] Willett Kempton,et al. Folk quantification of energy , 1982 .
[107] Alexander Hörbst,et al. Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens , 2010, Int. J. Medical Informatics.
[108] Steven Reece,et al. Recommending energy tariffs and load shifting based on smart household usage profiling , 2013, IUI '13.
[109] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[110] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[111] Mark Rouncefield,et al. Fieldwork for Design - Theory and Practice , 2007, Computer Supported Cooperative Work.
[112] Johann Kranz,et al. The role of smart metering and decentralized electricity storage for smart grids: The importance of positive externalities , 2012 .
[113] Alan J. Dix,et al. Designing for appropriation , 2007, BCS HCI.
[114] L. Floridi. The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.
[115] H. Simon. Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .
[116] Louise Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI , 2012, CHI.
[117] K. Himma. The Handbook of Information and Computer Ethics , 2007 .
[118] William W. Gaver. What should we expect from research through design? , 2012, CHI.
[119] Emilee J. Rader,et al. The importance of visibility for folk theories of sensor data , 2017, SOUPS.
[120] David J. Danelski,et al. Privacy and Freedom , 1968 .
[121] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[122] Steve Benford,et al. The ins and outs of home networking: The case for useful and usable domestic networking , 2009, TCHI.
[123] Andy Crabtree,et al. Human Data Interaction: Historical Lessons from Social Studies and CSCW , 2015, ECSCW.
[124] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[125] Yuguang Fang,et al. Privacy-Aware Profiling and Statistical Data Extraction for Smart Sustainable Energy Systems , 2013, IEEE Transactions on Smart Grid.
[126] Rainer Knyrim,et al. Smart metering under EU Data Protection Law , 2011 .
[127] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[128] Vagelis Papakonstantinou,et al. Legal Protection of Personal Data in Smart Grid and Smart Metering Systems from the European Perspective , 2015 .
[129] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[130] Norman M. Sadeh,et al. What do they know about me? Contents and Concerns of Online Behavioral Profiles , 2015, ArXiv.
[131] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[132] C. Clastres. Smart grids: Another step towards competition, energy security and climate change objectives , 2011 .
[133] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[134] Harold Abelson,et al. No technical understanding required: helping users make informed choices about access to their personal data , 2014, MobiQuitous.
[135] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[136] Tom Rodden,et al. “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems , 2016, CSCW.