Not Even Past: Information Aging and Temporal Privacy in Online Social Networks
暂无分享,去创建一个
[1] Viktor Mayer-Schönberger,et al. Delete: The Virtue of Forgetting in the Digital Age , 2009 .
[2] Kelly G. Shaver,et al. THE ENVIRONMENT AND SOCIAL BEHAVIOR , 2015 .
[3] Lorrie Faith Cranor,et al. Are your participants gaming the system?: screening mechanical turk workers , 2010, CHI.
[4] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[5] S. Siegel,et al. Nonparametric Statistics for the Behavioral Sciences , 2022, The SAGE Encyclopedia of Research Design.
[6] 田中 久男,et al. Requiem for a Nunの構成と主題 , 1988 .
[7] Bodo Winter,et al. Linear models and linear mixed effects models in R with linguistic applications , 2013, ArXiv.
[8] A. Kühberger,et al. The Influence of Framing on Risky Decisions: A Meta-analysis. , 1998, Organizational behavior and human decision processes.
[9] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[10] Michael S. Bernstein,et al. Quantifying the invisible audience in social networks , 2013, CHI.
[11] Abigail Sellen,et al. Beyond total capture , 2010, Commun. ACM.
[12] B. Hogan. The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online , 2010 .
[13] Chris Conley,et al. The Right to Delete , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.
[14] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[15] Michael J. Muller,et al. Make new friends, but keep the old: recommending people on social networking sites , 2009, CHI.
[16] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[17] Deborah G. Johnson,et al. Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..
[18] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[19] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[20] D. C. Howell. Statistical Methods for Psychology , 1987 .
[21] Aniket Kittur,et al. Crowdsourcing user studies with Mechanical Turk , 2008, CHI.
[22] Jonathan Grudin,et al. Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..
[23] Dan Cosley,et al. Experiences With Designing Tools for Everyday Reminiscing , 2012, Hum. Comput. Interact..
[24] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[25] Panagiotis G. Ipeirotis. Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.
[26] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[27] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[28] Eran Toch,et al. Retrospective privacy: managing longitudinal privacy in online social networks , 2013, SOUPS.
[29] Jeff Jarvis,et al. Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live , 2011 .
[30] Blase Ur,et al. The post anachronism: the temporal dimension of facebook privacy , 2013, WPES.
[31] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[32] Katharine Stevenson. Delete: The Virtue of Forgetting in the Digital Age , 2010 .
[33] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[34] D. Bates,et al. Linear Mixed-Effects Models using 'Eigen' and S4 , 2015 .
[35] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[36] Xuan Zhao,et al. The many faces of facebook: experiencing social media as performance, exhibition, and personal archive , 2013, CHI.
[37] Yang Wang,et al. A field trial of privacy nudges for facebook , 2014, CHI.
[38] Judy Kay,et al. Theoretical foundations for user-controlled forgetting in scrutable long term user models , 2011, OZCHI.
[39] Lydia B. Chilton,et al. The labor economics of paid crowdsourcing , 2010, EC '10.
[40] Ronald Baecker,et al. Reconstructing the Past: Personal Memory Technologies Are Not Just Personal and Not Just for Memory , 2012, Hum. Comput. Interact..
[41] Zeynep Tufekcioglu. Grooming, gossip, facebook and myspace: What can we learn about these sites from those who won't assimilate? , 2008 .
[42] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[43] Sarah Spiekermann,et al. Oblivion on the Web: An Inquiry of User Needs and Technologies , 2014, ECIS.
[44] Steven M. Bellovin,et al. The Failure of Online Social Network Privacy Settings , 2011 .
[45] Mary Madden and Aaron Smith,et al. Reputation Management and Social Media , 2010 .
[46] Jacob Kramer-Duffield,et al. Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.
[47] Jessica Staddon,et al. Indirect content privacy surveys: measuring privacy without asking about it , 2011, SOUPS.
[48] Nicholas Christakis,et al. The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..
[49] C. Alderman. The go-between. , 2002, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[50] Urs Gasser,et al. Teens, social media, and privacy , 2013 .