Reflection or action?: how feedback and control affect location sharing decisions
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[2] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[3] M. Khan,et al. SOCIOLINGVISTIKA/ SOCIOLINGUISTICS Academic Sojourners, Culture Shock and Intercultural Adaptation: a Trend Analysis , 2007 .
[4] Jason I. Hong,et al. Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.
[5] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[6] Deirdre K. Mulligan,et al. Geopriv Requirements , 2004, RFC.
[7] Alfred Kobsa,et al. Preference-based location sharing: are more privacy options really better? , 2013, CHI.
[8] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[9] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[10] Sameer Patil,et al. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice , 2012, SOUPS.
[11] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[12] Ashraf Khalil,et al. Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.
[13] Adam J. Lee,et al. Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.
[14] Gregory D. Abowd,et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.
[15] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[16] Lorrie Faith Cranor,et al. Empirical models of privacy in location sharing , 2010, UbiComp.
[17] Sameer Patil,et al. Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.
[18] John Zimmerman,et al. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.
[19] Hassan Takabi,et al. Exploring reactive access control , 2010, CHI Extended Abstracts.
[20] M. Csíkszentmihályi,et al. The Experience Sampling Method , 2014 .
[21] Peter Steenkiste,et al. Implementing access control to people location information , 2004, SACMAT '04.
[22] Xin Shuai,et al. Loose tweets: an analysis of privacy leaks on twitter , 2011, WPES.
[23] Adam J. Lee,et al. When privacy and utility are in harmony: towards better design of presence technologies , 2012, Personal and Ubiquitous Computing.
[24] Adam J. Lee,et al. PlexC: a policy language for exposure control , 2012, SACMAT '12.
[25] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[26] Brian P. Bailey,et al. Understanding changes in mental workload during execution of goal-directed tasks and its application for interruption management , 2008, TCHI.