Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Markets for attention: will postage for email help?
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Contact management: identifying contacts to support long-term communication
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Public space systems: designing for privacy?
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Sequenced release of privacy-accurate information in a forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Controlling one's personal and private information could help alleviate one of the greatest harms facing the Internet today - the loss of attention due to the over abundance of unsolicited email (spam). If one could control the dissemination and usage of one's email address, one could eliminate spam. We introduce a privacy honoring email system that leverages the user's social network to provide access control to the user's email.