Sciweavers

408 search results - page 1 / 82
» Tailoring Privacy to Users' Needs
Sort
View
UM
2001
Springer
13 years 9 months ago
Tailoring Privacy to Users' Needs
This article discusses how the deployment of personalized systems is affected by users’ privacy concerns and by privacy legislation. It shows that these impacts are substantial a...
Alfred Kobsa
UM
2007
Springer
13 years 11 months ago
Respecting Users' Individual Privacy Constraints in Web Personalization
Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personaliz...
Yang Wang 0005, Alfred Kobsa
ESORICS
2008
Springer
13 years 5 months ago
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques
The evaluation of privacy-preserving techniques for LBS is often based on simulations of mostly random user movements that only partially capture real deployment scenarios. We clai...
Sergio Mascetti, Dario Freni, Claudio Bettini, Xia...
SOUPS
2010
ACM
13 years 2 months ago
Influence of user perception, security needs, and social factors on device pairing method choices
Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaragu...
DAGSTUHL
2007
13 years 6 months ago
Aging Users are Still Users
Today’s tech-savvy boomers will remain comfortable with technology as they age, though they may need different interfaces. They need help with evaluating technical resources, but...
Mary Shaw