Author:
Rooney Vivien M.,Foley Simon N.
Publisher
Springer International Publishing
Reference33 articles.
1. Adams, A., Lunt, P., Cairns, P.: A qualititative approach to HCI research. In: Cairns, P., Cox, A. (eds.) Research Methods for Human-Computer Interaction. Cambridge University Press (2008)
2. Adams, A., Sasse, M.: Users are not the enemy. CACM 42(12), 40–46 (1999)
3. Ahern, S., Eckles, D., Good, N.S., King, S., Naaman, M.: Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 357–366 (2007)
4. Basin, D., Doser, J., Lodderstedt, T.: Model driven security for process-oriented systems. In: Symposium on Access control Models and Technologies (2003)
5. Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: de Michelis, G., Simone, C., Schmidt, K. (eds.) European Conference on Computer Supported Cooperative Work, pp. 77–92. Springer, Dordrecht (1993). https://doi.org/10.1007/978-94-011-2094-4_6
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献