Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems
暂无分享,去创建一个
[1] Alessandro Acquisti,et al. When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.
[2] Tristan Henderson,et al. An architecture for ethical and privacy-sensitive social network experiments , 2013, PERV.
[3] Celine Latulipe,et al. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[4] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[5] Aleecia M. McDonald,et al. The Cost of Reading Privacy Policies , 2009 .
[6] Sameer Patil,et al. Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice , 2012, SOUPS.
[7] L. Cranor,et al. Are They Worth Reading? An In-Depth Analysis of Online Trackers’ Privacy Policies , 2015 .
[8] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.
[9] Henriette Cramer,et al. Representation and communication: challenges in interpreting large social media datasets , 2013, CSCW.
[10] Henriette Cramer,et al. Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare , 2011, Mobile HCI.
[11] Adam J. Lee,et al. Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.
[12] Yunan Chen,et al. Using contextual integrity to examine interpersonal information boundary on social network sites , 2013, CHI.
[13] Florian Michahelles,et al. Social Networks in Pervasive Advertising and Shopping , 2011, Pervasive Advertising.
[14] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[15] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[16] Herman T. Tavani,et al. Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity , 2011, CSOC.
[17] Robert R. Harmon,et al. Perceived Effectiveness of Push vs. Pull Mobile Location Based Advertising , 2007 .
[18] M. Csíkszentmihályi,et al. Experience Sampling Method: Measuring the Quality of Everyday Life , 2006 .
[19] Eli Blevis,et al. The cloud , 2011, INTR.
[20] Lorrie Faith Cranor,et al. Empirical models of privacy in location sharing , 2010, UbiComp.
[21] Lorrie Faith Cranor,et al. When are users comfortable sharing locations with advertisers? , 2011, CHI.
[22] Norman M. Sadeh,et al. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.
[23] J. Reeve,et al. Solutions to problematic polypharmacy: learning from the expertise of patients. , 2015, The British journal of general practice : the journal of the Royal College of General Practitioners.
[24] Lorrie Faith Cranor,et al. Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.
[25] Bernardo A. Huberman,et al. A Market for Unbiased Private Data: Paying Individuals According to Their Privacy Attitudes , 2012, First Monday.
[26] Yang Wang,et al. Smart, useful, scary, creepy: perceptions of online behavioral advertising , 2012, SOUPS.
[27] Louise Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI , 2012, CHI.
[28] Alfred Kobsa,et al. What a tangled web we weave: lying backfires in location-sharing social media , 2013, CSCW.
[29] Elisabeth A. Jones,et al. Anonymity in a World of Digital Books: Google Books, Privacy, and the Freedom to Read , 2010 .