Sciweavers

182 search results - page 18 / 37
» End-User Privacy in Human-Computer Interaction
Sort
View
CHI
2008
ACM
14 years 8 months ago
Accountabilities of presence: reframing location-based systems
How do mobility and presence feature as aspects of social life? Using a case study of paroled offenders tracked via Global Positioning System (GPS), we explore the ways that locat...
Emily Troshynski, Charlotte P. Lee, Paul Dourish
SOUPS
2005
ACM
14 years 1 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
CHI
2005
ACM
14 years 8 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
ACMDIS
2004
ACM
14 years 1 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
CHI
2003
ACM
14 years 8 months ago
Safe & sound: a wireless leash
Safe & Sound uses location-aware mobile phones to create a "virtual leash"; a secure zone beyond which a child may not travel. If the child leaves this zone, both ch...
Natalia Marmasse, Chris Schmandt