Opportunities and Challenges Around a Tool for Social and Public Web Activity Tracking Citation
暂无分享,去创建一个
[1] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[2] John C. Tang,et al. Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.
[3] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[4] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[5] Joseph Turow,et al. Americans Online Privacy: The System Is Broken , 2003 .
[6] Maria da Graça Campos Pimentel,et al. Automatically sharing web experiences through a hyperdocument recommender system , 2003, HYPERTEXT '03.
[7] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[8] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[9] Kori Inkpen Quinn,et al. Examining the content and privacy of web browsing incidental information , 2006, WWW '06.
[10] James Fogarty,et al. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.
[11] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[12] Aniket Kittur,et al. Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia , 2008, CSCW.
[13] James A. Hendler,et al. Information accountability , 2008, CACM.
[14] J. Turow,et al. Americans Reject Tailored Advertising and Three Activities that Enable It , 2009 .
[15] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[16] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[17] Jeffrey Nichols,et al. Here's what i did: sharing and reusing web activity with ActionShot , 2010, CHI.
[18] Celine Latulipe,et al. Contextual gaps: privacy issues on Facebook , 2009, Ethics and Information Technology.
[19] Danah Boyd,et al. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..
[20] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[21] Alice E. Marwick. The Public Domain: Surveillance in Everyday Life , 2012 .
[22] James D. Herbsleb,et al. Social coding in GitHub: transparency and collaboration in an open software repository , 2012, CSCW.
[23] S. Hofmann,et al. Why Do People Use Facebook? , 2012, Personality and individual differences.
[24] Ericka Menchen-Trevino,et al. Researching Real-World Web Use with Roxy: Collecting Observational Web Data with Informed Consent , 2012 .
[25] Manfred Hauswirth,et al. DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).
[26] Meredith Ringel Morris,et al. Enhancing Technical Q&A Forums with CiteHistory , 2013, ICWSM.
[27] Yang Wang,et al. A field trial of privacy nudges for facebook , 2014, CHI.
[28] Sean A. Munson,et al. From "nobody cares" to "way to go!": A Design Framework for Social Sharing in Personal Informatics , 2015, CSCW.
[29] Ilaria Liccardi,et al. Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.
[30] Frank M. Shipman,et al. Exploring the Ownership and Persistent Value of Facebook Content , 2015, CSCW.
[31] Laura A. Dabbish,et al. The Perverse Effects of Social Transparency on Online Advice Taking , 2015, CSCW.