Beyond LED Status Lights - Design Requirements of Privacy Notices for Body-worn Cameras
暂无分享,去创建一个
[1] Chris Harrison,et al. Unlocking the expressivity of point lights , 2012, CHI.
[2] Rami Albatal,et al. A privacy by design approach to lifelogging , 2014 .
[3] Ivo Flammer. Genteel Wearables: Bystander-Centered Design , 2016, IEEE Security & Privacy.
[4] Colin Boyd,et al. "Who decides?": security and privacy in the wild , 2013, OZCHI.
[5] Gerald F. Smith. Idea‐Generation Techniques: A Formulary of Active Ingredients , 1998 .
[6] Sriram Subramanian,et al. Would you do that?: understanding social acceptance of gestural interfaces , 2010, Mobile HCI.
[7] Tim Marsh,et al. Using Cinematography Conventions to Inform Guidelines For the Design and Evaluation of Virtual Off-Screen Space , 2000 .
[8] Ardalan Amiri Sani,et al. Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems , 2018, IEEE Trans. Mob. Comput..
[9] Anthony Dunne,et al. Design Noir: The Secret Life of Electronic Objects , 2001 .
[10] Lorrie Faith Cranor,et al. What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.
[11] Jiro Tanaka,et al. Ensuring Privacy during Pervasive Logging by a Passerby , 2014, J. Inf. Process..
[12] Roderick Murray-Smith,et al. The GAIME project: gestural and auditory interactions for mobile environments , 2009 .
[13] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[14] Albrecht Schmidt,et al. Lifelogging: You're Wearing a Camera? , 2014, IEEE Pervasive Comput..
[15] James M. Higgins. 101 Creative Problem Solving Techniques: The Handbook of New Ideas for Business , 1994 .
[16] P. Mayring. Qualitative content analysis: theoretical foundation, basic procedures and software solution , 2014 .
[17] Joemon M. Jose,et al. Analysing privacy in visual lifelogging , 2017, Pervasive Mob. Comput..
[18] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[19] Katharina Krombholz,et al. Exploring Design Directions for Wearable Privacy , 2017 .
[20] U. Hengartner,et al. NotiSense : An Urban Sensing Notification System To Improve Bystander Privacy , 2011 .
[21] Rainer Böhme,et al. Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior , 2016 .
[22] Thomas A. Schwandt. Constructivist, interpretivist approaches to human inquiry. , 1994 .
[23] Serge Egelman,et al. Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms , 2015, CHI.
[24] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[25] Jakob Nielsen,et al. Finding usability problems through heuristic evaluation , 1992, CHI.
[26] Joemon M. Jose,et al. Bystander Privacy in Lifelogging , 2016, BCS HCI.
[27] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[28] John Zimmerman,et al. Research through design as a method for interaction design research in HCI , 2007, CHI.
[29] Gerhard Fischer,et al. Transcending the individual human mind—creating shared understanding through collaborative design , 2000, TCHI.
[30] Lassi A. Liikkanen,et al. The preference effect in design concept evaluation , 2014 .
[31] Barry Werth,et al. How short is too short? , 1991, The New York times magazine.
[32] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[33] Lorrie Faith Cranor,et al. How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices , 2016, SOUPS.
[34] Oussama Khatib,et al. The haptic display of complex graphical environments , 1997, SIGGRAPH.
[35] Gregory D. Abowd,et al. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world , 2006, CHI.
[36] James M. Higgins. Innovate or evaporate: Creative techniques for strategists , 1996 .
[37] Meera Blattner,et al. Earcons and Icons: Their Structure and Common Design Principles , 1989, Hum. Comput. Interact..
[38] Seong Joon Oh,et al. I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.
[39] E. Guba,et al. Competing paradigms in qualitative research. , 1994 .
[40] T. Brown,et al. Change by Design , 2011 .
[41] Gregory Kramer,et al. Auditory Display: Sonification, Audification, And Auditory Interfaces , 1994 .
[42] Sheridan Tatsuno,et al. Created in Japan: From Imitators to World-Class Innovators , 1991, The Journal of Asian Studies.
[43] Elizabeth B.-N. Sanders,et al. Virtuosos of the Experience Domain , 2001 .
[44] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[45] Alexander De Luca,et al. Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization , 2011, INTERACT.
[46] David A. Wagner,et al. Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights , 2015, CHI.
[47] Halley Profita,et al. The AT Effect: How Disability Affects the Perceived Social Acceptability of Head-Mounted Display Use , 2016, CHI.
[48] Tim Brown,et al. Design Thinking for Social Innovation , 2010 .
[49] Marion Koelle,et al. Don't look at me that way!: Understanding User Attitudes Towards Data Glasses Usage , 2015, MobileHCI.
[50] Tadayoshi Kohno,et al. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.
[51] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[52] Tovi Grossman,et al. Candid Interaction: Revealing Hidden Mobile and Wearable Computing Activities , 2015, UIST.
[53] Carl Gutwin,et al. Wedge: clutter-free visualization of off-screen locations , 2008, CHI.
[54] JOCELYN WYATT,et al. Design Thinking for Social Innovation IDEO , 2010 .
[55] Stephen Checkoway,et al. iSeeYou: Disabling the MacBook Webcam Indicator LED , 2014, USENIX Security Symposium.