Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

[图书][B] Divining a digital future: Mess and mythology in ubiquitous computing

P Dourish, G Bell - 2011 - books.google.com
A sociotechnical investigation of ubiquitous computing as a research enterprise and as a
lived reality. Ubiquitous computing (or ubicomp) is the label for a" third wave" of computing …

Measuring user confidence in smartphone security and privacy

E Chin, AP Felt, V Sekar, D Wagner - … of the eighth symposium on usable …, 2012 - dl.acm.org
In order to direct and build an effective, secure mobile ecosystem, we must first understand
user attitudes toward security and privacy for smartphones and how they may differ from …

I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns

AP Felt, S Egelman, D Wagner - … of the second ACM workshop on …, 2012 - dl.acm.org
Smartphone operating systems warn users when third-party applications try to access
sensitive functions or data. However, all of the major smartphone platforms warn users about …

Anonysense: privacy-aware people-centric sensing

C Cornelius, A Kapadia, D Kotz, D Peebles… - Proceedings of the 6th …, 2008 - dl.acm.org
Personal mobile devices are increasingly equipped with the capability to sense the physical
world (through cameras, microphones, and accelerometers, for example) and the, network …

Privacy behaviors of lifeloggers using wearable cameras

R Hoyle, R Templeman, S Armes, D Anthony… - Proceedings of the …, 2014 - dl.acm.org
A number of wearable'lifelogging'camera devices have been released recently, allowing
consumers to capture images and other sensor data continuously from a first-person …

Performing a check-in: emerging practices, norms and'conflicts' in location-sharing using foursquare

H Cramer, M Rost, LE Holmquist - … of the 13th international conference on …, 2011 - dl.acm.org
Location-sharing services have a long history in research, but have only recently become
available for consumers. Most popular commercial location-sharing services differ from …

Collective information practice: Exploring privacy and security as social and cultural phenomena

P Dourish, K Anderson - Human-computer interaction, 2006 - Taylor & Francis
As everyday life is increasingly conducted online, and as the electronic world continues to
move out into the physical, the privacy of information and action and the security of …

Participatory personal data: An emerging research challenge for the information sciences

K Shilton - Journal of the American Society for Information …, 2012 - Wiley Online Library
Individuals can increasingly collect data about their habits, routines, and environment using
ubiquitous technologies. Running specialized software, personal devices such as phones …

End-user privacy in human–computer interaction

G Iachello, J Hong - Foundations and Trends® in Human …, 2007 - nowpublishers.com
The purpose of this article is twofold. First, we summarize research on the topic of privacy in
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …