Trust and Privacy Permissions for an Ambient World
暂无分享,去创建一个
[1] Tharam S. Dillon,et al. The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.
[2] Kenton O'Hara,et al. Dealing with mobility: understanding access anytime, anywhere , 2001, TCHI.
[3] Andrew Brien,et al. Professional Ethics and The Culture of Trust , 1998 .
[4] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[5] F. Fukuyama. Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .
[6] Y. Chan,et al. Privacy in the Family: Its Hierarchical and Asymmetric Nature , 2000 .
[7] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[8] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[9] Matthew K. O. Lee,et al. EC-Trust (Trust in Electronic Commerce): Exploring the Antecedent Factors , 1999 .
[10] Frank Biocca,et al. Internet attitudes and Internet use: some surprising findings from the HomeNetToo project , 2003, Int. J. Hum. Comput. Stud..
[11] M. Dibben. Exploring Interpersonal Trust in the Entrepreneurial Venture , 2000 .
[12] Bashar Nuseibeh,et al. Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..
[13] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[14] S. Bok,et al. Lying: Moral Choice in Public and Private Life , 1979 .
[15] Darhl M. Pedersen,et al. MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .
[16] Jonathan Grudin,et al. A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.
[17] Stephen Marsh,et al. The role of trust in information science and technology , 2005, Annu. Rev. Inf. Sci. Technol..
[18] Craig M. Arndt. The loss of privacy and identity , 2005 .
[19] Justine Cassell,et al. Relational agents: a model and implementation of building user trust , 2001, CHI.
[20] Joseph Luft,et al. Of human interaction , 1969 .
[21] J. Lewis,et al. Trust as a Social Reality , 1985 .
[22] H. Kelley,et al. The social psychology of groups , 1960 .
[23] Leonard M. Jessup,et al. The relevance of social issues in ubiquitous computing environments , 2002, CACM.
[24] D. Good,et al. Individuals, Interpersonal Relations, and Trust , 2000 .
[25] D. M. Pedersen. Dimensions of Privacy , 1979 .
[26] Rino Falcone,et al. The Socio-cognitive Dynamics of Trust: Does Trust Create Trust? , 2000, Trust in Cyber-societies.
[27] Alfarez Abdul-Rahman,et al. A framework for decentralised trust reasoning , 2005 .
[28] Sirkka L. Jarvenpaa,et al. Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..
[29] Marco De Boni,et al. Cultural aspects of internet privacy , 2002 .
[30] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[31] Fn Florian Egger. FROM INTERACTIONS TO TRANSACTIONS: Designing the Trust Experience for Business-to-Consumer Electronic Commerce , 2003 .
[32] Colin Camerer,et al. Not So Different After All: A Cross-Discipline View Of Trust , 1998 .
[33] S. Boon,et al. The dynamics of interpersonal trust: resolving uncertainty in the ace of risk , 1991 .
[34] R. Nisbett,et al. The cultural matrix of social psychology , 1998 .
[35] R. Ahas,et al. Location based services—new challenges for planning and public administration? , 2005 .
[36] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[37] Samuel D. Warren,et al. Philosophical Dimensions of Privacy: The right to privacy [the implicit made explicit] , 1984 .
[38] Lorrie Faith Cranor,et al. Web Privacy with P3p , 2002 .
[39] Elizabeth Sillence,et al. Trust and mistrust of online health sites , 2004, CHI.
[40] Privacy of Communication , 1970 .
[41] Mark Weiser. The computer for the 21st century , 1991 .
[42] Diego Gambetta. Can We Trust Trust , 2000 .
[43] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[44] P. Sztompka. Trust: A Sociological Theory , 2000 .
[45] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[46] D. Brin. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .
[47] Lea Viljanen,et al. Towards an Ontology of Trust , 2005, TrustBus.
[48] Yves Punie,et al. A social and technological view of Ambient Intelligence in Everyday Life : What bends the trend ? Key Deliverable The European Media and Technology in Everyday Life Network , 2000-2003 , 2003 .
[49] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[50] Shailey Minocha,et al. Social and Cultural Obstacles to the (B2C) E-Commerce Experience , 2004 .
[51] Keng Siau,et al. Building customer trust in mobile commerce , 2003, CACM.
[52] Thomas Rist,et al. Lost in ambient intelligence? , 2004, CHI EA '04.
[53] Khai N. Truong,et al. PHEmail: designing a privacy honoring email system , 2003, CHI Extended Abstracts.
[54] Naz Kaya,et al. Cross-cultural differences in the perception of crowding and privacy regulation : American and Turkish students , 2003 .
[55] I. Altman,et al. Culture and Environment , 1984 .
[56] Batya Friedman,et al. Trust online , 2000, CACM.
[57] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[58] Florian N. Egger,et al. "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.
[59] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[60] Costas Lambrinoudakis,et al. Protecting privacy and anonymity in pervasive computing: trends and perspectives , 2006, Telematics Informatics.
[61] V. Sugumaran. The Inaugural Issue of the International Journal of Intelligent Information Technologies , 2005 .
[62] Norbert A. Streitz,et al. The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.
[63] Victoria Y. Yoon,et al. Using Ontological Reasoning for an Adaptive E-Commerce Experience , 2009, Int. J. Intell. Inf. Technol..
[64] N. Luhmann. Trust and Power , 1979 .
[65] D. M. Pedersen. PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .
[66] Linda Little,et al. Public space systems: Designing for privacy? , 2005, Int. J. Hum. Comput. Stud..
[67] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .