Taming the wolf in sheep's clothing: privacy in multimedia communications
暂无分享,去创建一个
[1] Victoria Bellotti,et al. Design for privacy in multimedia computing and communications environments , 1997 .
[2] Colin Perkins,et al. Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.
[3] R. Brown,et al. Social Psychology, 2nd Ed , 1965 .
[4] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[5] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1992 .
[6] Susan Davies,et al. Re-Engineering the Right to Privacy , 1997 .
[7] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[8] Anne Adams,et al. Users' perception of privacy in multimedia communication , 1999, CHI Extended Abstracts.
[9] Steven McCanne,et al. vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.
[10] Andreas Girgensohn,et al. NYNEX portholes: initial user reactions and redesign implications , 1997, GROUP.
[11] J. H. Davis,et al. An integrative model of organizational trust, Academy of Management Review, : . , 1995 .
[12] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[13] Wendy E. Mackay,et al. Ethics, lies and videotape… , 1995, CHI '95.
[14] Steven McCanne,et al. Receiver-driven layered multicast , 2001 .
[15] M. Angela Sasse,et al. Successful multiparty audio communication over the Internet , 1998, CACM.
[16] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[17] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[18] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[19] Boon-Lock Yeo,et al. Technical trials and legal tribulations , 1998, CACM.
[20] M. Angela Sasse,et al. Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.
[21] Paul Dourish,et al. Culture and Control in a Media Space , 1993, ECSCW.
[22] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[23] Alan J. Dix,et al. Information processing, context and privacy , 1990, INTERACT.
[24] Michael R. Macedonia,et al. MBone provides audio and video across the Internet , 1994, Computer.
[25] Andreas Girgensohn,et al. Initial User Reactions and Redesign Implications , 1997 .