Teaching privacy with ubicomp scenarios in HCI classes
暂无分享,去创建一个
[1] Pertti Huuskonen,et al. Understanding privacy regulation in ubicomp interactions , 2008, Personal and Ubiquitous Computing.
[2] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[3] Mary Beth Rosson,et al. Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.
[4] Florence Appel. Ethics across the computer science curriculum: Privacy modules in an introductory database course , 2005, Science and engineering ethics.
[5] Kari-Jouko Räihä,et al. Faces of Privacy: Effect of Culture and Context , 2009, INTERACT.
[6] Anind K. Dey,et al. Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .
[7] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[8] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..
[9] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[10] Sandeep Purao,et al. Situating evaluation in scenarios of use , 2004, CSCW.
[11] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[12] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[13] Saul Greenberg,et al. Teaching human computer interaction to programmers , 1996, INTR.
[14] Judy Kay,et al. Integrating Ethical Content Into Computing Curricula , 2004, ACE.
[15] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[16] Elizabeth D. Mynatt,et al. Digital family portraits: supporting peace of mind for extended family members , 2001, CHI.
[17] Gregory D. Abowd,et al. Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing , 2005, CHI.
[18] L. Cassel,et al. The computing ontology: application in education , 2007, ITiCSE-WGR '07.
[19] Stefan Stieger,et al. Internet users' perceptions of 'privacy concerns' and 'privacy actions' , 2007, Int. J. Hum. Comput. Stud..
[20] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[21] Morten Hertzum,et al. The Evaluator Effect: A Chilling Fact About Usability Evaluation Methods , 2001, Int. J. Hum. Comput. Interact..
[22] Lujo Bauer,et al. Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.
[23] Gregory D. Abowd,et al. From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary , 2008, TCHI.
[24] Michael Friedewald,et al. Privacy, identity and security in ambient intelligence: A scenario analysis , 2007, Telematics Informatics.
[25] Ben Shneiderman,et al. Making a difference: integrating socially relevant projects into HCI teaching , 2006, CHI EA '06.