The Watcher and the Watched: Social Judgments About Privacy in a Public Place
暂无分享,去创建一个
Batya Friedman | Peter H. Kahn | Brian T. Gill | Rachel L. Severson | Jennifer Hagman | P. H. Kahn | R. L. Severson | Batya Friedman | Jennifer Hagman | P. Kahn
[1] Anne Colby,et al. A Longitudinal Study of Moral Judgment. , 1983 .
[2] Robert,et al. The VideoWindow System in Informal Communications , 1990 .
[3] E. Turiel,et al. Judging social issues: difficulties, inconsistencies, and consistencies. , 1991, Monographs of the Society for Research in Child Development.
[4] Patricia Brierley Newell. A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .
[5] Larry Nucci,et al. Conceptions of Personal Issues: A Domain Distinct from Moral or Societal Concepts. , 1981 .
[6] M. Šitum,et al. Value of life. , 2002, Croatian medical journal.
[7] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[8] H. Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.
[9] Philip Davidson,et al. The effect of stimulus familiarity on the use of criteria and justifications in children's social reasoning. , 1983 .
[10] S. Milgram. BEHAVIORAL STUDY OF OBEDIENCE. , 1963, Journal of abnormal psychology.
[11] David R. Krathwohl,et al. Methods of Educational and Social Science Research: An Integrated Approach , 1992 .
[12] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[13] Virgilio Pinera,et al. Culture and Morality , 2002 .
[14] Scott E. Hudson,et al. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.
[15] William Damon,et al. The social world of the child , 1977 .
[16] E. Turiel,et al. The Development of Social Knowledge: Morality and Convention , 1983 .
[17] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[18] Sara A. Bly,et al. The Portland Experience: A Report on a Distributed Research Group , 1991, Int. J. Man Mach. Stud..
[19] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[20] M. Killen,et al. Children's evaluations of morality in the context of peer, teacher-child, and familial relations. , 1990, The Journal of genetic psychology.
[21] Jonathan Karro,et al. Patient perceptions of privacy infringements in an emergency department , 2005, Emergency medicine Australasia : EMA.
[22] Austin Henderson,et al. Methods in search of methodology—combining HCI and object orientation , 1994, CHI '94.
[23] Marilyn Tremaine,et al. Experiences in the use of a media space , 1991, CHI.
[24] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[25] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[26] Anoop Gupta,et al. Linking public spaces: technical and social issues , 2001, CHI.
[27] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[28] FriedmanBatya,et al. Office window of the future?-Field-based analyses of a new use of a large display , 2008 .
[29] Barrington Moore,et al. Privacy: Studies in Social and Cultural History. , 1986 .
[30] Elliot Turiel,et al. The development of social knowledge , 1983 .
[31] J. Rubenfeld. The Right of Privacy , 1989 .
[32] Rónán O'Beirne,et al. Berkshire Encyclopedia of Human‐Computer Interaction , 2006 .
[33] C. Geertz. "From the Native's Point of View": On the Nature of Anthropological Understanding , 1974 .
[34] Shuk Ying Ho,et al. Human-computer interaction and management information systems: Foundations , 2008, J. Assoc. Inf. Sci. Technol..
[35] P. H. Kahn,et al. Children's obligatory and discretionary moral judgments. , 1992, Child development.
[36] Lauriston Sharp,et al. Steel Axes for Stone-Age Australians , 1952 .
[37] P. Pelto. The snowmobile revolution : technology and social change in the Arctic , 1976 .
[38] Batya Friedman,et al. Human values and the design of computer technology , 1997 .
[39] Batya Friedman,et al. The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2005, Hum. Comput. Interact..
[40] Elliot Turiel,et al. Dominance, subordination, and concepts of personal entitlements in cultural contexts , 1994 .
[41] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[42] John C. Tang,et al. Montage: providing teleproximity for distributed groups , 1994, CHI '94.
[43] Batya Friedman,et al. Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .
[44] Austin Henderson,et al. Your place or mine? Learning from long-term use of Audio-Video communication , 1996, Computer Supported Cooperative Work (CSCW).
[45] DourishPaul,et al. Your place or mine? Learning from long-term use of audio-video communication , 1996 .
[46] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[47] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[48] J. W. DeCew,et al. Uneasy Access: Privacy for Women in a Free Society , 1988 .
[49] J. Burger. Obedience to Authority , 2011 .
[50] J. Spradley. You Owe Yourself a Drunk: An Ethnography of Urban Nomads , 1972 .
[51] L. Kohlberg. Stage and sequence: The cognitive-developmental approach to socialization , 1969 .
[52] Konrad Tollmar,et al. Private and public spaces: the use of video mediated communication in a future home environment , 2000, CHI Extended Abstracts.
[53] G. Holton. Sociobiology: the new synthesis? , 1977, Newsletter on science, technology & human values.
[54] Darhl M. Pedersen,et al. Sex Differences in Privacy Preferences , 1987 .
[55] P. H. Kahn,et al. Human values, ethics, and design , 2002 .
[56] Jean L. Briggs,et al. Never in Anger: Portrait of an Eskimo Family , 1970 .
[57] S. Pinker,et al. Natural language and natural selection , 1990, Behavioral and Brain Sciences.
[58] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[59] Peter H. Kahn,et al. The Human Relationship with Nature: Development and Culture , 1999 .
[60] L. Cosmides,et al. The Adapted mind : evolutionary psychology and the generation of culture , 1992 .
[61] Batya Friedman,et al. Value-sensitive design , 1996, INTR.
[62] Paul Dourish,et al. Portholes: supporting awareness in a distributed work group , 1992, CHI.
[63] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[64] Allison Druin,et al. Technology probes: inspiring design for and with families , 2003, CHI '03.
[65] A. Rüstemli,et al. Privacy Dimensions and Preferences Among Turkish Students , 1993 .
[66] F. Schoeman,et al. Philosophical Dimensions of Privacy: Privacy: philosophical dimensions of the literature , 1984 .
[67] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[68] Robert W. Root,et al. Design of a multi-media vehicle for social browsing , 1988, CSCW '88.
[69] Unni Wikan,et al. Generous Betrayal: Politics of Culture in the New Europe , 2001 .
[70] J. Reiman,et al. Privacy, Intimacy, and Personhood , 1984 .
[71] R. J. B.. The Child's Conception of the World , 1929, Nature.
[72] Jonathan Grudin,et al. Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..
[73] C. C. Helwig,et al. Adolescents' and young adults' conceptions of civil liberties: freedom of speech and religion. , 1995, Child development.
[74] Darhl M. Pedersen,et al. MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .