Looking at ourselves: an examination of the social organisation of two research laboratories
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Media spaces: bringing people together in a video, audio, and computing environment
Communications of the ACM
Locating systems at work: implications for the development of active badge applications
Interacting with Computers
Conceptions of the user in computer systems design
The social and interactional dimensions of human-computer interfaces
The World-Wide-Web as social hypertext
Communications of the ACM
Beyond the mirror world: privacy and the representational practices of computing
Technology and privacy
The rise of personal Web pages at work
CHI 98 Cconference Summary on Human Factors in Computing Systems
The platform for privacy preferences
Communications of the ACM
Social, individual and technological issues for groupware calendar systems
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Going wireless: behavior & practice of new mobile phone users
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
The affordances of media spaces for collaboration
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Social Interaction on the Net: Virtual Community as Participatory
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Digital Documents - Volume 6
Changing places: contexts of awareness in computing
Human-Computer Interaction
Desituating action: digital representation of context
Human-Computer Interaction
GROUP '03 Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work
Studying the effect of similarity in online task-focused interactions
GROUP '03 Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work
Examining the robustness of sensor-based statistical models of human interruptibility
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Toward a method for privacy vulnerability analysis
CHI '04 Extended Abstracts on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Personal and Ubiquitous Computing
Easing the wait in the emergency room: building a theory of public information systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Augmenting the social space of an academic conference
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Computer Supported Cooperative Work
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Making space for stories: ambiguity in the design of personal communication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
CHI '05 Extended Abstracts on Human Factors in Computing Systems
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Using relationship to control disclosure in Awareness servers
GI '05 Proceedings of Graphics Interface 2005
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Public space systems: designing for privacy?
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Role-based control of shared application views
Proceedings of the 18th annual ACM symposium on User interface software and technology
Peripheral privacy notifications for wireless networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Supporting Quality of Privacy (QoP) in Pervasive Computing
ENC '05 Proceedings of the Sixth Mexican International Conference on Computer Science
Computer Support for Social Awareness in Flexible Work
Computer Supported Cooperative Work
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Everyday practices with mobile video telephony
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy and HCI: methodologies for studying privacy issues
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
Blur filtration fails to preserve privacy for home-based video conferencing
ACM Transactions on Computer-Human Interaction (TOCHI)
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Designing Urban Pervasive Systems
Computer
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Chatting with teenagers: Considering the place of chat technologies in teen life
ACM Transactions on Computer-Human Interaction (TOCHI)
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
The social dimensions of the security of internet banking
Journal of Theoretical and Applied Electronic Commerce Research
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sharing motion information with close family and friends
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
A Look at Tokyo Youth at Leisure: Towards the Design of New Media to Support Leisure Outings
Computer Supported Cooperative Work
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security
The Journal of Strategic Information Systems
Privacy and the access of information in a smart house environment
Proceedings of the 15th international conference on Multimedia
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Proactive displays: Supporting awareness in fluid social environments
ACM Transactions on Computer-Human Interaction (TOCHI)
Proceedings of the 2007 international ACM conference on Supporting group work
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Social Science Computer Review
Contact management on the wall: a card-game metaphor for large displays
Proceedings of the 2nd international conference on Tangible and embedded interaction
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
International Journal of Mobile Communications
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary
ACM Transactions on Computer-Human Interaction (TOCHI)
The social web: global village or private cliques?
Proceedings of the 2007 conference on Designing for User eXperiences
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Urban sensing systems: opportunistic or participatory?
Proceedings of the 9th workshop on Mobile computing systems and applications
Dynamic privacy assessment in a smart house environment using multimodal sensing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Theorizing mobility in community networks
International Journal of Human-Computer Studies
The emergence of online widescale interaction in unexpected events: assistance, alliance & retreat
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Understanding the implications of social translucence for systems supporting communication at work
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
GeoPoke: rotational mechanical systems metaphor for embodied geosocial interaction
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Towards a scalable model for location privacy
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Extraordinary computing: religion as a lens for reconsidering the home
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Strategies and struggles with privacy in an online social networking community
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Improving personal privacy in social systems with people-tagging
Proceedings of the ACM 2009 international conference on Supporting group work
Image, appearance and vanity in the use of media spaces and video conference systems
Proceedings of the ACM 2009 international conference on Supporting group work
Grounding interpersonal privacy in mediated settings
Proceedings of the ACM 2009 international conference on Supporting group work
Proceedings of the 7th international conference on Mobile systems, applications, and services
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Askus: Amplifying Mobile Actions
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
Engineering Societies in the Agents World IX
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
Communications of the ACM - Scratch Programming for All
Privacy now and in the age of ambient intelligence
International Journal of Electronic Security and Digital Forensics
A privacy expectations and security assurance offer system
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Designed to Fit: Challenges of Interaction Design for Clothes Fitting Room Technologies
Proceedings of the 13th International Conference on Human-Computer Interaction. Part IV: Interacting in Various Application Domains
Smart Privacy Management in Ubiquitous Computing Environments
Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
Interactive and Lightweight Mechanisms to Coordinate Interpersonal Privacy in Mediated Communication
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
Private whispers/public eyes: Is receiving highly personal information in a public place stressful?
Interacting with Computers
Configuring audience-oriented privacy policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Digital parenting: designing children's safety
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
The future of UK data protection regulation
Information Security Tech. Report
Rendezvousing with location-aware devices: Enhancing social coordination
Interacting with Computers
Information privacy in institutional and end-user tracking and recording technologies
Personal and Ubiquitous Computing
Making love in the network closet: the benefits and work of family videochat
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Young Australians' privacy, security and trust in internet banking
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Enhancing privacy management support in instant messaging
Interacting with Computers
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Moving beyond untagging: photo privacy in a tagged world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Interactivity and non-interactivity on tabletops
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Managing disclosure of personal health information in smart home healthcare
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Design ideas for IT in public spaces
Personal and Ubiquitous Computing
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Security design based on social and cultural practice: sharing of passwords
UI-HCII'07 Proceedings of the 2nd international conference on Usability and internationalization
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
A model of triangulating environments for policy authoring
Proceedings of the 15th ACM symposium on Access control models and technologies
Tailoring collaboration according privacy needs in real-identity collaborative systems
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Users' (mis)conceptions of social applications
Proceedings of Graphics Interface 2010
Policy framework for security and privacy management
IBM Journal of Research and Development
MySpace is your space? Examining self-presentation of MySpace users
Computers in Human Behavior
Privacy issues for online personal photograph collections
Journal of Theoretical and Applied Electronic Commerce Research
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
The domestic panopticon: location tracking in families
Proceedings of the 12th ACM international conference on Ubiquitous computing
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi
Proceedings of the 12th ACM international conference on Ubiquitous computing
Studying mobile context-aware social services in the wild
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Negotiating privacy boundaries in social applications for accessibility mapping
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
User experience (UX) patterns for audio-visual networked applications: inspirations for design
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Practices of balancing privacy and publicness in social network services
Proceedings of the 16th ACM international conference on Supporting group work
Proceedings of the FSE/SDP workshop on Future of software engineering research
Tackling HCI challenges of creating personalised, pervasive learning ecosystems
EC-TEL'10 Proceedings of the 5th European conference on Technology enhanced learning conference on Sustaining TEL: from innovation to learning and practice
Identity in the Information Society
Personality-based privacy management for location-sharing in diverse subpopulations
Proceedings of the 2011 iConference
Being there with others: copresence and technologies for informal interaction
Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction
Fear and danger in nocturnal urban environments
Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction
"I'll press play, but I won't listen": profile work in a music-focused social network service
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Tertiary-Level Telehealth: A Media Space Application
Computer Supported Cooperative Work
Listing elements of rich information environments
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia
A conceptual framework for information security and privacy
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Contextual dynamics of group-based sharing decisions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
In the best families: tracking and relationships
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
We're in it together: interpersonal management of disclosure in social network services
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy dictionary: a linguistic taxonomy of privacy for content analysis
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy for a Networked World: bridging theory and design
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Welcome to the jungle: HCI after dark
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Self-disclosure in social media
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Medical record privacy: is it a facade?
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Designing for privacy in personal learning spaces
The New Review of Hypermedia and Multimedia - Special issue: Observing users of digital educational technologies
Methodological reflections on a field study of a globally distributed software project
Information and Software Technology
Healthcare and security: understanding and evaluating the risks
EHAWC'11 Proceedings of the 2011th international conference on Ergonomics and health aspects of work with computers
Living in a glass house: a survey of private moments in the home
Proceedings of the 13th international conference on Ubiquitous computing
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Proceedings of the 13th international conference on Ubiquitous computing
Understanding how visual representations of location feeds affect end-user privacy concerns
Proceedings of the 13th international conference on Ubiquitous computing
Privacy-friendly business models for location-based mobile
Journal of Theoretical and Applied Electronic Commerce Research
Super-Ego: a framework for privacy-sensitive bounded context-awareness
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Attitudes toward online availability of US public records
Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times
Sharing ephemeral information in online social networks: privacy perceptions and behaviours
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Domestic violence and information communication technologies
Interacting with Computers
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
Proceedings of the Seventh Symposium on Usable Privacy and Security
Designing natural language and structured entry methods for privacy policy authoring
INTERACT'05 Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Practices of information and secrecy in a punk rock subculture
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Finding a new normal: the role of technology in life disruptions
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Bathroom activity monitoring based on sound
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Friend or foe? relationship-based adaptation on public displays
AmI'11 Proceedings of the Second international conference on Ambient Intelligence
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fighting for my space: coping mechanisms for sns boundary regulation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
It's complicated: how romantic partners use facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Talking in circles: selective sharing in google+
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
That syncing feeling: early user experiences with the cloud
Proceedings of the Designing Interactive Systems Conference
Facebook and privacy: it's complicated
Proceedings of the Eighth Symposium on Usable Privacy and Security
Are privacy concerns a turn-off?: engagement and privacy in social networks
Proceedings of the Eighth Symposium on Usable Privacy and Security
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
Increasing service users' privacy awareness by introducing on-line interactive privacy features
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Sense and sensibility in a pervasive world
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Investigating receptiveness to sensing and inference in the home using sensor proxies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
What can 'people-nearby' applications teach us about meeting new people?
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Integrating multi-source user data to enhance privacy in social interaction
Proceedings of the 13th International Conference on Interacción Persona-Ordenador
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
Proceedings of the 3rd International Conference on Human Computer Interaction
Model-driven privacy and security in multi-modal social media UIs
MSM'11 Proceedings of the 2011 international conference on Modeling and Mining Ubiquitous Social Media
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
Grounding Privacy in Mediated Communication
Computer Supported Cooperative Work
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
What a tangled web we weave: lying backfires in location-sharing social media
Proceedings of the 2013 conference on Computer supported cooperative work
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
Globally distributed system developers: their trust expectations and processes
Proceedings of the 2013 conference on Computer supported cooperative work
Digital neighborhood watch: investigating the sharing of camera data amongst neighbors
Proceedings of the 2013 conference on Computer supported cooperative work
EmailValet: managing email overload through private, accountable crowdsourcing
Proceedings of the 2013 conference on Computer supported cooperative work
Disclosure Intention of Location-Related Information in Location-Based Social Network Services
International Journal of Electronic Commerce
Privacy-by-design rules in face recognition system
Neurocomputing
Experiences surveying the crowd: reflections on methods, participation, and reliability
Proceedings of the 5th Annual ACM Web Science Conference
Quantifying the invisible audience in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using contextual integrity to examine interpersonal information boundary on social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
All the news that's fit to read: a study of social annotations for news reading
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Digital portraits: photo-sharing after domestic violence
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Engineering adaptive privacy: on the role of privacy awareness requirements
Proceedings of the 2013 International Conference on Software Engineering
Narrowcasting in social media: effects and perceptions
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
An informed view on consent for UbiComp
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Locality and privacy in people-nearby applications
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
PriCal: dynamic privacy adaptation of collaborative calendar displays
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Retrospective privacy: managing longitudinal privacy in online social networks
Proceedings of the Ninth Symposium on Usable Privacy and Security
Sunlight or sunburn: a survey of attitudes toward online availability of US public records
Information Polity - Special issue on Open Government and Public Participation: Issues and Challenges in Creating Public Value
Moderating effect of privacy self-efficacy on location-based mobile marketing
International Journal of Mobile Communications
Privacy practices in collaborative environments: a study of emergency department staff
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Supporting Effortless Coordination: 25 Years of Awareness Research
Computer Supported Cooperative Work
Editorial: Special Issue on Advances in Computer Supported Collaboration: Systems and Technologies
Future Generation Computer Systems
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
Hi-index | 0.01 |
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settings is limited. A lack of conceptual interpretive frameworks makes it difficult to unpack interrelated privacy issues in settings where information technology is also present. Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process. We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature. These suggest new ways for thinking about privacy in socio-technical environments as a practical matter.