Sciweavers

182 search results - page 18 / 37
» End-User Privacy in Human-Computer Interaction
Sort
View
CHI
2008
ACM
15 years 11 months ago
Accountabilities of presence: reframing location-based systems
How do mobility and presence feature as aspects of social life? Using a case study of paroled offenders tracked via Global Positioning System (GPS), we explore the ways that locat...
Emily Troshynski, Charlotte P. Lee, Paul Dourish
SOUPS
2005
ACM
15 years 4 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
82
Voted
CHI
2005
ACM
15 years 11 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
ACMDIS
2004
ACM
15 years 4 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
CHI
2003
ACM
15 years 11 months ago
Safe & sound: a wireless leash
Safe & Sound uses location-aware mobile phones to create a "virtual leash"; a secure zone beyond which a child may not travel. If the child leaves this zone, both ch...
Natalia Marmasse, Chris Schmandt