Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, 2005. ,
DOI : 10.1109/MSP.2005.22
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision, Personal and Ubiquitous Computing, 2007. ,
DOI : 10.1007/s00779-006-0071-x
Designing for participation in local social ridesharing networks, Proceedings of the 11th Biennial Participatory Design Conference on, PDC '10, 2010. ,
DOI : 10.1145/1900441.1900478
Designing participation in agile ridesharing with mobile social software, Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group on Design: Open 24/7, OZCHI '09, 2009. ,
DOI : 10.1145/1738826.1738868
Anatomy of a systems failure: Dial-a-ride in Santa Clara County, California, Transportation, vol.5, issue.1, 1976. ,
DOI : 10.1007/BF00165244
Adaptive Security Dialogs for Improved Security Behavior of Users, 2009. ,
DOI : 10.1109/CSAC.2002.1176309
Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, Human-Computer Interaction, vol.290, issue.10, 2006. ,
DOI : 10.1088/0963-6625/1/3/004
Security in the wild: user strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing, vol.36, issue.7, 2004. ,
DOI : 10.1002/0470848693
Interaction, privacy and profiling considerations in local mobile social software, Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction, OZCHI '10, 2010. ,
DOI : 10.1145/1952222.1952307
Design from the everyday, Proceedings of the 8th ACM Conference on Designing Interactive Systems, DIS '10, 2010. ,
DOI : 10.1145/1858171.1858222
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
A face(book) in the crowd, Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , CSCW '06, 2006. ,
DOI : 10.1145/1180875.1180901
Who gets to know what when, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '05, 2005. ,
DOI : 10.1145/1054972.1054987
Transforming the 'Weakest Link' - a Human-Computer Interaction Approach to Usable and Effective security, BT Tech Journal, vol, vol.19, issue.3, pp.122-131, 2001. ,
DOI : 10.1049/PBBT004E_ch15
The Emperor's New Security Indicators, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007. ,
DOI : 10.1109/SP.2007.35
A New Privacy-Enhanced Matchmaking Protocol, IEICE Transactions on Communications, vol.96, issue.8, 2007. ,
DOI : 10.1587/transcom.E96.B.2049
The New School of Information Security, N.J, 2008. ,
I did it because I trusted you " : Challenges with the Study Environment Biasing Participant Behaviours, SOUPS, 2010. ,
E-privacy in 2nd generation Ecommerce: privacy preferences versus actual behavior, 2001. ,
DOI : 10.1145/501158.501163
The Ethnography of Infrastructure, American Behavioral Scientist, vol.17, issue.1, 1999. ,
DOI : 10.1023/A:1008651105359