sometimes less is more: multi-perspective exploration of disclosure abstractions in location-aware social mobile applications
暂无分享,去创建一个
[1] Wendy A. Kellogg,et al. Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.
[2] Debby Hindus,et al. Ubiquitous audio: capturing spontaneous collaboration , 1992, CSCW '92.
[3] Loren G. Terveen,et al. Sharescape: an interface for place annotation , 2008, NordiCHI.
[4] Cliff Lampe,et al. A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.
[5] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[6] Bill N. Schilit,et al. Privacy and Security in the Location-enhanced World Wide Web , 2003 .
[7] Norman M. Sadeh,et al. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.
[8] P. Resnick. Beyond Bowling Together: SocioTechnical Capital , 2001 .
[9] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[10] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[11] Mika Raento,et al. ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration , 2005, Mobile HCI.
[12] Fredrik Espinoza,et al. GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.
[13] Peter F. Patel-Schneider,et al. Enabling context-aware and privacy-conscious user data sharing , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[14] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[15] Frank Bentley,et al. Sharing motion information with close family and friends , 2007, CHI.
[16] Georg Treu,et al. Implicit Authorization for Accessing Location Data in a Social Context , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[17] Mohamed F. Mokbel,et al. Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.
[18] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[19] Eyal de Lara,et al. Are GSM Phones THE Solution for Localization? , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).
[20] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[21] Anind K. Dey,et al. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.
[22] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[23] Kori Inkpen Quinn,et al. "Need to Know": Examining Information Need in Location Discourse , 2006, Pervasive.
[24] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[25] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[26] Shelly D. Farnham,et al. Swarm: Text messaging designed to enhance social coordination , 2005 .
[27] Lujo Bauer,et al. User-Controllable Security and Privacy for Pervasive Computing , 2007 .
[28] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[29] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[30] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[31] Danah Boyd,et al. Friendster and publicly articulated social networking , 2004, CHI EA '04.
[32] Loren Terveen,et al. Talking about Place: An Experiment in How People Describe Places ¤ , 2005 .
[33] Shelly Farnham,et al. Swarm: Hyper Awareness, Micro Coordination, and Smart Convergence through Mobile Group Text Messaging , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[34] B. Depaulo,et al. Everyday lies in close and casual relationships. , 1998, Journal of personality and social psychology.
[35] Judith Donath,et al. Public Displays of Connection , 2004 .
[36] John Krumm,et al. Accuracy characterization for metropolitan-scale Wi-Fi localization , 2005, MobiSys '05.
[37] Matthew Chalmers,et al. From awareness to repartee: sharing location within social groups , 2008, CHI.
[38] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[39] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[40] Lorrie Faith Cranor,et al. The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing , 2009, SOUPS.
[41] Jason I. Hong,et al. Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.
[42] Roy Want. You're Not Paranoid; They Really Are Watching You! , 2007, IEEE Pervasive Comput..
[43] E. Laurier. Why People Say Where They are during Mobile Phone Calls , 2001 .
[44] Paul Dourish,et al. Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.
[45] Xiao-lei Chen,et al. [The relationship between tumor suppressor genes p14ARF and p53 expression and biological behavior of pancreatic carcinoma]. , 2003, Zhonghua yi xue za zhi.
[46] Andrew J. May,et al. Pedestrian navigation aids: information requirements and design implications , 2003, Personal and Ubiquitous Computing.
[47] Gregory D. Abowd,et al. Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.
[48] Jenna Burrell,et al. E-graffiti: evaluating real-world use of a context-aware system , 2002, Interact. Comput..
[49] Allan Ahlberg. Who Knows? , 1999, Security Protocols Workshop.
[50] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[51] Keith N. Hampton,et al. Does the Internet Increase, Decrease, or Supplement Social Capital? , 2001 .
[52] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[53] Debby Hindus,et al. Casablanca: designing social communication devices for the home , 2001, CHI 2001.
[54] Jonathan Steinberg,et al. All or nothing : the Axis and the Holocaust, 1941-1943 , 1990 .
[55] Chris Schmandt,et al. Location-Aware Information Delivery with ComMotion , 2000, HUC.
[56] Ravi Kumar,et al. "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.
[57] Mark Zuckerberg. Thoughts on Beacon , 2007 .
[58] R. Harper. Why people do and don't wear active badges: a case study , 1995 .
[59] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[60] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[61] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[62] Mika Raento,et al. Interpreting and Acting on Mobile Awareness Cues , 2007, Hum. Comput. Interact..
[63] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[64] Alex S. Taylor,et al. Locating Family Values: A Field Trial of the Whereabouts Clock , 2007, UbiComp.
[65] Lujo Bauer,et al. A user study of policy creation in a flexible access-control system , 2008, CHI.
[66] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[67] Louise Barkhuus. Privacy in Location-Based Services , Concern vs . Coolness , 2004 .
[68] Ashraf Khalil,et al. Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.
[69] James T. Enns,et al. Visualizing real-time multivariate data using preattentive processing , 1995, TOMC.
[70] Elizabeth D. Mynatt,et al. Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .
[71] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[72] Gregory D. Abowd,et al. Social Disclosure of Place: From Location Technology to Communication Practices , 2005, Pervasive.
[73] Gregory D. Abowd,et al. The Family Intercom: Developing a Context-Aware Audio Communication System , 2001, UbiComp.
[74] Per Persson,et al. DeDe: design and evaluation of a context-enhanced mobile messaging system , 2005, CHI.
[75] Loren G. Terveen,et al. Capturing, sharing, and using local place information , 2007, CHI.
[76] John C. Tang,et al. ConNexus to awarenex: extending awareness to mobile users , 2001, CHI.
[77] James Fogarty,et al. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.
[78] William G. Griswold,et al. Challenge: ubiquitous location-aware computing and the "place lab" initiative , 2003, WMASH '03.
[79] Marc Smith,et al. Where were we: communities for sharing space-time trails , 2007, GIS.
[80] Scott E. Hudson,et al. Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions , 2007, Behav. Inf. Technol..
[81] Jason Hong,et al. Towards Everyday Privacy for Ubiquitous Computing , 2003 .
[82] Kumiko Aoki,et al. An analysis of young people's use of and attitudes toward cell phones , 2003, Telematics Informatics.
[83] Gregory D. Abowd,et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.
[84] Marco Gruteser,et al. USENIX Association , 1992 .
[85] Ben Shneiderman,et al. Readings in information visualization - using vision to think , 1999 .
[86] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[87] Alexandra Weilenmann,et al. “I Can't Talk Now, I'm in a Fitting Room”: Formulating Availability and Location in Mobile-Phone Conversations , 2003 .
[88] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[89] Norman M. Sadeh,et al. Modeling people's place naming preferences in location sharing , 2010, UbiComp.
[90] Richard Harper,et al. Why people do and don't wear active badges: A case study , 1995, Computer Supported Cooperative Work (CSCW).
[91] Mike Y. Chen,et al. Practical Metropolitan-Scale Positioning for GSM Phones , 2006, UbiComp.
[92] Anne Adams,et al. Multimedia information changes the whole privacy ballgame , 2000, CFP '00.
[93] Allison Woodruff,et al. Making space for stories: ambiguity in the design of personal communication systems , 2005, CHI.
[94] Alessandro Acquisti,et al. Nudging Privacy: The Behavioral Economics of Personal Information , 2009, IEEE Security & Privacy.
[95] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[96] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[97] Jonathan Grudin. Presenting choices in context: approaches to information sharing , 2003 .
[98] Martin Colbert,et al. A diary study of rendezvousing: implications for position-aware computing and communications for the general public , 2001, GROUP.
[99] Dan Frankowski,et al. Because I carry my cell phone anyway: functional location-based reminder applications , 2006, CHI.
[100] Mark Zuckerberg,et al. An Open Letter from Mark Zuckerberg , 2006 .
[101] James D. Hollan,et al. A diary study of mobile information needs , 2008, CHI.
[102] Bonnie A. Nardi,et al. Interaction and outeraction: instant messaging in action , 2000, CSCW '00.
[103] Chris Schmandt,et al. WatchMe: Communication and Awareness Between Members of a Closely-Knit Group , 2004, UbiComp.