1 Privacy Issues and Human-Computer Interaction
暂无分享,去创建一个
[1] Jonathan Grudin,et al. Toward Understanding Preferences for Sharing and Privacy , 2004 .
[2] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[3] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[4] Jonathan Grudin,et al. Managerial use and emerging norms: effects of activity patterns on software design and deployment , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[5] Paul Dourish,et al. A Tale of Two Toolkits: Relating Infrastructure and Use in Flexible CSCW Toolkits , 1999, Computer Supported Cooperative Work (CSCW).
[6] Bernard Mérialdo,et al. Design of Extensible Component-Based Groupware , 1999, Computer Supported Cooperative Work (CSCW).
[7] Austin Henderson,et al. Your place or mine? Learning from long-term use of Audio-Video communication , 1996, Computer Supported Cooperative Work (CSCW).
[8] Richard Beckwith,et al. Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..
[9] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[10] Gurpreet Dhillon,et al. Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..
[11] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[12] Mark S. Ackerman,et al. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..
[13] David R. Millen,et al. Rapid ethnography: time deepening strategies for HCI field research , 2000, DIS '00.
[14] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[15] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[16] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[17] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[18] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[19] Mark S. Ackerman,et al. Hanging on the ‘wire: a field study of an audio-only media space , 1997, TCHI.
[20] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[21] Susanne Bødker,et al. From implementation to design: tailoring and the emergence of systematization in CSCW , 1994, CSCW '94.
[22] Jonathan Grudin,et al. Computer-supported cooperative work: history and focus , 1994, Computer.
[23] Bonnie A. Nardi,et al. A Small Matter of Programming: Perspectives on End User Computing , 1993 .
[24] Stephen J. Westerman,et al. Individual differences in human-computer interaction , 1993 .
[25] Wanda J. Orlikowski,et al. Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.
[26] Wendy E. Mackay,et al. Triggers and barriers to customizing software , 1991, CHI.
[27] Wendy E. Mackay,et al. Patterns of sharing customizable software , 1990, CSCW '90.
[28] Thomas W. Mastaglio,et al. Using critics to empower users , 1990, CHI '90.
[29] Kevin Crowston,et al. How do experienced information lens users use rules? , 1989, CHI '89.
[30] Gerhard Fischer,et al. Construction Kits and Design Environments: Steps Toward Human Problem-Domain Communication , 1987, Hum. Comput. Interact..
[31] K. A. Ericsson,et al. Protocol Analysis: Verbal Reports as Data , 1984 .