ABSTRACT
No abstract available.
- Bellotti, V. and Sellen. A. "Designing for Privacy in Ubiquitous Computing Environments." Proceedings of ECSCW '93, Milan, Italy. 1993]] Google ScholarDigital Library
- "Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress." Federal Trade Commission, 2000.]]Google Scholar
- Jensen. C. and Potts, C. "Privacy Policies as Decision-Making Tools: A Usability Evaluation of Online Privacy Notices" Proceedings of CHI'04 Vienna, Austria, 2004]] Google ScholarDigital Library
- Palen, L. and Dourish, P. "Unpacking 'Privacy' for a Networked World." Proceedings of CHI'03, Ft. Lauderdale, FL. 2003]] Google ScholarDigital Library
- Potts, C. "ScenIC: A strategy for inquiry-driven requirements determination", Proceedings of RE'99, Limerick, Ireland. 1999]] Google ScholarDigital Library
Index Terms
- Toward a method for privacy vulnerability analysis
Recommendations
Toward sensitive document release with privacy guarantees
Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection ...
Experimental evaluation of a lightweight method for augmenting requirements analysis
WEASELTech '07: Proceedings of the 1st ACM international workshop on Empirical assessment of software engineering languages and technologies: held in conjunction with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE) 2007We introduce the concept of augmentation methods, methods that complement other methods by addressing specific non-functional requirements (NFRs). Since most projects do not have dedicated expertise in all relevant NFRs most team members may be ...
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. ...
Comments