Using critics to empower users
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Embedding computer-based critics in the contexts of design
INTERCHI '93 Proceedings of the INTERCHI '93 conference on Human factors in computing systems
The platform for privacy preferences
Communications of the ACM
Developing for privacy: civility frameworks and technical design
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
ACM Transactions on Internet Technology (TOIT)
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Human values, ethics, and design
The human-computer interaction handbook
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Values at play: design tradeoffs in socially-oriented game design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sociotechnical Architecture for Online Privacy
IEEE Security and Privacy
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment
User Modeling and User-Adapted Interaction
Peripheral privacy notifications for wireless networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Personalisation in intelligent environments: managing the information flow
OZCHI '05 Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future
PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web
Information Systems - Special issue: The semantic web and web services
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Proceedings of the 3rd ACM workshop on Secure web services
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
Controlling inference: avoiding p-level reduction during analysis
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
MyPlace Locator: Flexible Sharing of Location Information
UM '07 Proceedings of the 11th international conference on User Modeling
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Human-Computer Interaction
Sharescape: an interface for place annotation
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Interface design and evaluation of a personal information space for mobile learners
International Journal of Mobile Learning and Organisation
Enhancing privacy management support in instant messaging
Interacting with Computers
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Contexts and sharing/not sharing private information
Proceedings of the 50th Annual Southeast Regional Conference
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
Hi-index | 0.00 |
Creating usable systems to protect online privacy is an inherently difficult problem. Privacy critics are semi-autonomous agents that help people protect their online privacy by offering suggestions and warnings. Two sample critics are presented.