Sciweavers

248 search results - page 6 / 50
» A study of preferences for sharing and privacy
Sort
View
CP
2008
Springer
13 years 9 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
CHI
2009
ACM
14 years 8 months ago
Exploring awareness needs and information display preferences between coworkers
1 Technology makes it possible to share many different types of information with coworkers. We conducted a large-scale survey (N=549) to better understand current sharing among co...
A. J. Bernheim Brush, Brian Meyers, James Scott, G...
CHI
2007
ACM
14 years 7 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
IWC
2010
86views more  IWC 2010»
13 years 5 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
HUC
2010
Springer
13 years 5 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...