1 |
Bettina Berendt, Oliver Gunther, and Sarah Spiekermann, 'Privacy in e-Commerce: Stated Preference vs. Actual Behavior', Communications of ACM, Vol. 48 No. 4, Pages: 101-106, April, 2005
|
2 |
Privacy and data-sharing-The way forward for public services Performance and Innovation Unit in the U.K., Available athttp://www.piu.gov.uk/privacy /index.htm
|
3 |
Giovanni Iacjello and Gregory D. Abowd, 'Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing', CHI ACM, Pages: 91-100, April 2-7, Portland, Oregon, USA, 2005
|
4 |
Jean-Philippe Cotis, 'Economic Policy Reforms : Going for Growth 2006', OECD Publishing 2, 7, 2006
|
5 |
Jason I. Hong, and James A. Landay, 'Support for location: An architecture for privacy-sensitive ubiquitous computing', Proceedings of the 2nd international conference on Mobile systems, applications, and services MobiSys'04, Boston, MA, USA, Pages: 177-189. June, 2004
|
6 |
Simson Garfinke, and Gene Spafford, 'Web Security, Privacy, and Commerce', O'reilly & Associates, Inc., 2nd Edition, Pages: 230-256, January, 2002
|
7 |
A list of privacy surveys, Available at http://www.w3.org/P3P/p3pfaq.html
|
8 |
조화순, 'IT혁명과 개인정보보호', 한국전산원, 05, 2004
|
9 |
Eila Niemela, and Juhani Latvakoski, 'Survey of requirements and solutions for ubiquitous software', Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia MUM '04, New York, NY, USA, Pages: 71-78, October, 2004
|
10 |
Gregory D. Abowd, and Elizabeth D. Mynatt, 'Charting past, present, andfuture research in ubiquitous computing', ACM Transactions on Computer-Human Interaction (TOCHI), Volume 7 Issue 1, Pages: 29-58, March, 2000
DOI
ScienceOn
|
11 |
개인정보보호백서 2003, 한국정보보호진흥원, 2003
|
12 |
P. W. Warren, 'From Ubiquitous Computing to Ubiquitous Intelligence', BT Technology Journal, Volume 22 Issue 2, Pages:.28-38, April, 2004
DOI
|