Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
[图书][B] Divining a digital future: Mess and mythology in ubiquitous computing
A sociotechnical investigation of ubiquitous computing as a research enterprise and as a
lived reality. Ubiquitous computing (or ubicomp) is the label for a" third wave" of computing …
lived reality. Ubiquitous computing (or ubicomp) is the label for a" third wave" of computing …
Measuring user confidence in smartphone security and privacy
In order to direct and build an effective, secure mobile ecosystem, we must first understand
user attitudes toward security and privacy for smartphones and how they may differ from …
user attitudes toward security and privacy for smartphones and how they may differ from …
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
Smartphone operating systems warn users when third-party applications try to access
sensitive functions or data. However, all of the major smartphone platforms warn users about …
sensitive functions or data. However, all of the major smartphone platforms warn users about …
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical
world (through cameras, microphones, and accelerometers, for example) and the, network …
world (through cameras, microphones, and accelerometers, for example) and the, network …
Privacy behaviors of lifeloggers using wearable cameras
A number of wearable'lifelogging'camera devices have been released recently, allowing
consumers to capture images and other sensor data continuously from a first-person …
consumers to capture images and other sensor data continuously from a first-person …
Performing a check-in: emerging practices, norms and'conflicts' in location-sharing using foursquare
Location-sharing services have a long history in research, but have only recently become
available for consumers. Most popular commercial location-sharing services differ from …
available for consumers. Most popular commercial location-sharing services differ from …
Collective information practice: Exploring privacy and security as social and cultural phenomena
P Dourish, K Anderson - Human-computer interaction, 2006 - Taylor & Francis
As everyday life is increasingly conducted online, and as the electronic world continues to
move out into the physical, the privacy of information and action and the security of …
move out into the physical, the privacy of information and action and the security of …
Participatory personal data: An emerging research challenge for the information sciences
K Shilton - Journal of the American Society for Information …, 2012 - Wiley Online Library
Individuals can increasingly collect data about their habits, routines, and environment using
ubiquitous technologies. Running specialized software, personal devices such as phones …
ubiquitous technologies. Running specialized software, personal devices such as phones …
End-user privacy in human–computer interaction
G Iachello, J Hong - Foundations and Trends® in Human …, 2007 - nowpublishers.com
The purpose of this article is twofold. First, we summarize research on the topic of privacy in
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …