Method for privacy requirements elicitation in ubiquitous computing
暂无分享,去创建一个
Cristiano Maciel | Patricia Cristiane de Souza | Deógenes Pereira da Silva Junior | Cristiano Maciel | P. D. Souza | D. Junior
[1] John M. Carroll,et al. Five reasons for scenario-based design , 2000, Interact. Comput..
[2] Patricia Cristiane de Souza,et al. Prominent issues for privacy establishment in privacy policies of mobile apps , 2016, IHC.
[3] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[4] Florian Schaub,et al. Territorial privacy in ubiquitous computing , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.
[5] Simone D. J. Barbosa,et al. Design da interação humano-computador com MoLIC , 2014, IHC.
[6] Cristiano Maciel,et al. Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective , 2015, HCI.
[7] Lorrie Faith Cranor,et al. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .
[8] Yang Wang,et al. Nudges for Privacy and Security , 2017, ACM Comput. Surv..
[9] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[10] Célia Ghedini Ralha,et al. I GranDSI-BR , 2017 .
[11] Norman M. Sadeh,et al. Crowdsourcing privacy policy analysis: Potential, challenges and best practices , 2016, it Inf. Technol..
[12] Jaeyoung Choi,et al. Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing , 2005, ICCSA.
[13] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[14] Florian Schaub. Dynamic privacy adaptation in ubiquitous computing , 2014 .
[15] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[16] Naseem Ahmadpour,et al. Lights, Camera, Action: Using animations to co-evaluate user experience scenarios , 2015, OZCHI.
[17] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[18] Herbert A. Simon,et al. The Decision-Making Schema@@@Administrative Behavior; A Study of Decision-Making Processes in Administrative Organization , 1957 .
[19] Monika Taddicken,et al. The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..
[20] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[21] Lorrie Faith Cranor,et al. Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.
[22] Mikio Aoyama,et al. Persona-and-scenario based requirements engineering for software embedded in digital consumer products , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).