Information technology and dataveillance
Communications of the ACM
Using ethnography in contextural design
Communications of the ACM
Accounting for system behavior: representation, reflection, and resourceful action
Computers and design in context
Technology and privacy: the new landscape
Technology and privacy: the new landscape
Socially translucent systems: social proxies, persistent conversation, and the design of “babble”
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Communications of the ACM
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Challenge: ubiquitous location-aware computing and the "place lab" initiative
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Bringing security home: a process for developing secure and usable systems
Proceedings of the 2003 workshop on New security paradigms
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Computer Supported Cooperative Work
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Authentication using graphical passwords: effects of tolerance and image choice
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Usable security and privacy: a case study of developing privacy management tools
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Desituating action: digital representation of context
Human-Computer Interaction
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Seeing further: extending visualization as a basis for usable security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Discussion of the Interaction Concept Focusing on Application Systems
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Accountabilities of presence: reframing location-based systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Theorizing mobility in community networks
International Journal of Human-Computer Studies
Situated practices of looking: visual practice in an online world
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Journal of Management Information Systems
Tangible user interface for increasing social interaction among rural women
Proceedings of the 3rd International Conference on Tangible and Embedded Interaction
The commodification of location: dynamics of power in location-based systems
Proceedings of the 11th international conference on Ubiquitous computing
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Middleware for pervasive spaces: balancing privacy and utility
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing for social interaction with mundane technologies: issues of security and trust
Personal and Ubiquitous Computing
Theme issue on social interaction and mundane technologies
Personal and Ubiquitous Computing
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Middleware for pervasive spaces: balancing privacy and utility
Middleware'09 Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware
Understanding factors affecting perceived sociability of social software
Computers in Human Behavior
Proceedings of the 12th ACM international conference on Ubiquitous computing
Factors mediating disclosure in social network sites
Computers in Human Behavior
Tertiary-Level Telehealth: A Media Space Application
Computer Supported Cooperative Work
Foodmunity: designing community interactions over food
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Tensions in developing a secure collective information practice - the case of agile ridesharing
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
I love you, let's share calendars: calendar sharing as relationship work
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
CHI '12 Extended Abstracts on Human Factors in Computing Systems
That syncing feeling: early user experiences with the cloud
Proceedings of the Designing Interactive Systems Conference
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Beyond demand management: the value of sharing electricity information
BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers
Sustainable information practice: An ethnographic investigation
Journal of the American Society for Information Science and Technology
Informing and performing: investigating how mediated sociality becomes visible
Personal and Ubiquitous Computing
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Pre-Service Teachers' Perceptions of Information Assurance and Cyber Security
International Journal of Information and Communication Technology Education
Meanings and boundaries of scientific software sharing
Proceedings of the 2013 conference on Computer supported cooperative work
It takes a network to get dinner: designing location-based systems to address local food needs
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Role-and relationship-based identity management for privacy-enhanced E-Iearning
International Journal of Artificial Intelligence in Education
"Who decides?": security and privacy in the wild
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
Rethinking the peer review process
Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are increasingly a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives--institutional, legislative, technical, interactional, and more. In this article, we wish to contribute toward a broad understanding of privacy and security not simply as technical phenomena but as embedded in social and cultural contexts. Privacy and security are difficult concepts to manage from a technical perspective precisely because they are caught up in larger collective rhetorics and practices of risk, danger, secrecy, trust, morality, identity, and more. Reductive attempts to deal with these issues separately produce incoherent or brittle results. We argue for a move away from narrow views of privacy and security and toward a holistic view of situated and collective information practice.