Privacy Perceptions and Designs of Bystanders in Smart Homes
暂无分享,去创建一个
Yang Wang | Yaxing Yao | Justin Reed Basdeo | Oriana Rosata Mcdonough | Yaxing Yao | Yang Wang | O. Mcdonough
[1] Kenji Yoshigoe,et al. Overcoming invasion of privacy in smart home environment with synthetic packet injection , 2014, 2015 TRON Symposium (TRONSHOW).
[2] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[3] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[4] Robert E. Crossler,et al. A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers , 2012, Decis. Support Syst..
[5] Volker Wulf,et al. Evolving Needs in IoT Control and Accountability , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[6] Antorweep Chakravorty,et al. Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.
[7] Anupam Das,et al. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.
[8] M.G.D. Steen,et al. Benefits of co-design in service design projects , 2011 .
[9] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[10] Mahadev Satyanarayanan,et al. Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework , 2018, ACM Trans. Multim. Comput. Commun. Appl..
[11] Nick Feamster,et al. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.
[12] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[13] Serge Egelman,et al. "What Can't Data Be Used For?": Privacy Expectations about Smart TVs in the U.S. , 2018 .
[14] W. Keith Edwards,et al. More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.
[15] Maya Cakmak,et al. Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys , 2017, CHI.
[16] Jonathan Grudin,et al. Computer-supported cooperative work: history and focus , 1994, Computer.
[17] Andreas Jacobsson,et al. On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[18] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[19] Andreas Jacobsson,et al. A risk analysis of a smart home automation system , 2016, Future Gener. Comput. Syst..
[20] Richard E. Boyatzis,et al. Transforming Qualitative Information: Thematic Analysis and Code Development , 1998 .
[21] Yang Wang,et al. “What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes , 2019, Proc. Priv. Enhancing Technol..
[22] Yang Wang,et al. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes , 2019, CHI.
[23] Yang Wang,et al. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders , 2017, CHI.
[24] B. Everitt,et al. Statistical methods for rates and proportions , 1973 .
[25] Abdullahi Arabo,et al. Privacy in the Age of Mobility and Smart Devices in Smart Homes , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[26] Franziska Roesner,et al. End User Security and Privacy Concerns with Smart Homes , 2017, SOUPS.
[27] Yang Wang,et al. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices , 2017, CHI.
[28] Pieter Jan Stappers,et al. Contextmapping: experiences from practice , 2005 .
[29] Josephine Lau,et al. Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..
[30] Tadayoshi Kohno,et al. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.
[31] Yang Wang,et al. Folk Models of Online Behavioral Advertising , 2017, CSCW.
[32] Yang Wang,et al. Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US , 2016, Proc. Priv. Enhancing Technol..
[33] Ben Matthews,et al. Trust Me: Doubts and Concerns Living with the Internet of Things , 2016, Conference on Designing Interactive Systems.
[34] Pieter Jan Stappers,et al. Co-creation and the new landscapes of design , 2008 .
[35] Oliver Hofmann,et al. 'Home, Smart Home' - Exploring End Users' Mental Models of Smart Homes , 2018, Message Understanding Conference.
[36] Svetha Venkatesh,et al. Dynamic Privacy in a Smart House Environment , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[37] Heather Richter Lipford,et al. Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.
[38] Nick Feamster,et al. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.
[39] Bo Yang,et al. Smart home research , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[40] David J. Crandall,et al. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.
[41] J. Fleiss,et al. Statistical methods for rates and proportions , 1973 .
[42] Nick Feamster,et al. User Perceptions of Privacy in Smart Homes , 2018, ArXiv.
[43] L. M. Lieberman,et al. What If … , 1983, Journal of learning disabilities.
[44] Nick Feamster,et al. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[45] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .