Toward Understanding Preferences for Sharing and Privacy
暂无分享,去创建一个
[1] Anind K. Dey,et al. Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .
[2] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[3] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[4] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[5] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[6] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .
[7] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[8] Mark S. Ackerman,et al. Developing for privacy: civility frameworks and technical design , 2000, CFP '00.
[9] Volker Wulf,et al. A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.
[10] J. Horrigan,et al. Trust and privacy online: Why Americans want to rewrite the rules , 2000 .
[11] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[12] John K. Butler. Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory , 1991 .
[13] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[14] Rudi Volti,et al. America Calling: A Social History of the Telephone to 1940 , 1992 .
[15] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[16] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[17] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[18] Volker Wulf,et al. Beyond "Yes or No" - Extending Access Control in Groupware with Awareness and Negotiation , 2000 .
[19] Dean Povey. Optimistic security: a new access control paradigm , 1999, NSPW '99.