暂无分享,去创建一个
[1] Wolter Pieters,et al. Cyber Security as Social Experiment , 2014, NSPW '14.
[2] Lorrie Faith Cranor,et al. Standardizing privacy notices: an online study of the nutrition label approach , 2010, CHI.
[3] Kim Etherington. Ethical Research in Reflexive Relationships , 2007 .
[4] D. Taruscio,et al. Improving the informed consent process in international collaborative rare disease research: effective consent for effective research , 2016, European Journal of Human Genetics.
[5] Arthur P. Bochner,et al. Composing Ethnography: Alternative Forms of Qualitative Writing , 1999 .
[6] V. Dickson-Swift,et al. Doing sensitive research: what challenges do qualitative researchers face? , 2007 .
[7] Mary Ellen Zurko. User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[8] J. Olsen. Nine months that last a lifetime. Experience from the Danish National Birth Cohort and lessons learned. , 2012, International journal of hygiene and environmental health.
[9] Salvatore Ruggieri,et al. A multidisciplinary survey on discrimination analysis , 2013, The Knowledge Engineering Review.
[10] S. Kvale,et al. InterViews: Learning the Craft of Qualitative Research Interviewing , 1996 .
[11] V. Rooney. Consent in longitudinal intimacy research: adjusting formal procedure as a means of enhancing reflexivity in ethically important decisions , 2015 .
[12] Michael Morrison,et al. Dynamic consent: a patient interface for twenty-first century research networks , 2014, European Journal of Human Genetics.
[13] J. Domingo-Ferrer,et al. Beyond Informed Consent—Investigating Ethical Justifications for Disclosing, Donating or Sharing Personal Data in Research , 2017 .
[14] B. Macfarlane. Researching with Integrity: The Ethics of Academic Enquiry , 2008 .
[15] A. Young. Dwelling on the Threshold , 1990 .
[16] P. Casali,et al. Risks of the new EU Data Protection Regulation: an ESMO position paper endorsed by the European oncology community. , 2014, Annals of oncology : official journal of the European Society for Medical Oncology.
[17] Simon N. Foley,et al. I'm OK, You're OK, the System's OK: Normative Security for Systems , 2014, NSPW '14.
[18] A. Azzouz. 2011 , 2020, City.
[19] S. M. García,et al. 2014: , 2020, A Party for Lazarus.
[20] Ruzanna Chitchyan,et al. Discovering "Unknown Known" Security Requirements , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[21] Lisa M. Tillmann-healy,et al. Friendship as Method , 2003 .
[22] K. Charmaz,et al. Constructing Grounded Theory , 2014 .
[23] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[24] Britt Rusert. “A Study in Nature”: The Tuskegee Experiments and the New South Plantation , 2009, The Journal of medical humanities.
[25] Gerhard Fischer,et al. Revisiting and Broadening the Meta-Design Framework for End-User Development , 2017, New Perspectives in End-User Development.
[26] A. James. 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.
[27] A. Grinyer,et al. The Anonymity of Research Participants: Assumptions, Ethics, and Practicalities , 2009 .
[28] Florence March,et al. 2016 , 2016, Affair of the Heart.
[29] Bart W. Schermer,et al. The crisis of consent: how stronger legal protection may lead to weaker consent in data protection , 2014, Ethics and Information Technology.
[30] Nigel Cross,et al. Developments in design methodology , 1984 .
[31] Jennifer Shore and Jill Steinman. Did You Really Agree to That? The Evolution of Facebook’s Privacy Policy , 2015 .
[32] Thomas Herrmann,et al. Socio-Technical Systems: A Meta-Design Perspective , 2011, Int. J. Sociotechnology Knowl. Dev..
[33] K. Dannenfeldt,et al. Technology in World Civilization , 1991 .
[34] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[35] Johnny Saldaña,et al. Longitudinal Qualitative Research: Analyzing Change Through Time , 2003 .
[36] M. Gribaudo,et al. 2002 , 2001, Cell and Tissue Research.
[37] I. Parker. Qualitative Psychology: Introducing Radical Research , 2004 .
[38] Bashar Nuseibeh,et al. Distilling privacy requirements for mobile applications , 2014, ICSE.
[39] Heidi M. Hurd. The Moral Magic of Consent , 1996, Legal Theory.
[40] Arnold Pacey,et al. Meaning in Technology , 1999 .
[41] Alan Wertheimer,et al. The Fair Transaction Model of Informed Consent: An Alternative to Autonomous Authorization , 2011, Kennedy Institute of Ethics journal.
[42] L. Gillam,et al. Ethics, Reflexivity, and “Ethically Important Moments” in Research , 2004 .
[43] Ross J. Anderson,et al. The collection, linking and use of data in biomedical research and health care: ethical issues , 2015 .
[44] Masooda Bashir,et al. Online privacy and informed consent: The dilemma of information asymmetry , 2015, ASIST.
[45] Christine Horne,et al. Privacy, technology, and norms: the case of Smart Meters. , 2015, Social science research.
[46] Nancy J. King,et al. Smart metering systems and data sharing: why getting a smart meter should also mean getting strong information privacy controls to manage data sharing , 2014, Int. J. Law Inf. Technol..
[47] Mike Surridge,et al. Towards a Model of User-centered Privacy Preservation , 2017, ARES.
[48] J. Warin. Ethical Mindfulness and Reflexivity , 2011 .
[49] M. Bailey,et al. Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report , 2013 .
[50] G. Crow,et al. Informed Consent and the Research Process: Following Rules or Striking Balances? , 2007 .
[51] R. Wiles. What are Qualitative Research Ethics , 2012 .
[52] J. Reveley. Path Dependence , 2008, Prisoners of the Past.
[53] D. Dittrich,et al. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research , 2012 .
[54] David W. Chadwick,et al. Expressions of expertness: the virtuous circle of natural language for access control policy specification , 2008, SOUPS '08.
[55] Bart Custers,et al. Click here to consent forever: Expiry dates for informed consent , 2016, Big Data Soc..
[56] Bart Custers,et al. Big Data and Data Reuse: A Taxonomy of Data Reuse for Balancing Big Data Benefits and Personal Data Protection , 2016 .
[57] C. Ellis. Telling Secrets, Revealing Lives , 2007 .
[58] S. Milgram. BEHAVIORAL STUDY OF OBEDIENCE. , 1963, Journal of abnormal psychology.
[59] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[60] K. Kavanagh. Book review: Reading Lives: Working-class Children and Literacy Learning , 2004 .
[61] Simon N. Foley,et al. Developer-centered security and the symmetry of ignorance , 2017, NSPW.