BibTeX records: Giovanni Iachello

download as .bib file

@article{DBLP:journals/tochi/IachelloA08,
  author       = {Giovanni Iachello and
                  Gregory D. Abowd},
  title        = {From privacy methods to a privacy toolbox: Evaluation shows that heuristics
                  are complementary},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {15},
  number       = {2},
  pages        = {8:1--8:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375761.1375763},
  doi          = {10.1145/1375761.1375763},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tochi/IachelloA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fthci/IachelloH07,
  author       = {Giovanni Iachello and
                  Jason I. Hong},
  title        = {End-User Privacy in Human-Computer Interaction},
  journal      = {Found. Trends Hum. Comput. Interact.},
  volume       = {1},
  number       = {1},
  pages        = {1--137},
  year         = {2007},
  url          = {https://doi.org/10.1561/1100000004},
  doi          = {10.1561/1100000004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fthci/IachelloH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/HayesPIPGAT07,
  author       = {Gillian R. Hayes and
                  Erika Shehan Poole and
                  Giovanni Iachello and
                  Shwetak N. Patel and
                  Andrea Grimes and
                  Gregory D. Abowd and
                  Khai N. Truong},
  title        = {Physical, Social, and Experiential Knowledge in Pervasive Computing
                  Environments},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {6},
  number       = {4},
  pages        = {56--63},
  year         = {2007},
  url          = {https://doi.org/10.1109/MPRV.2007.82},
  doi          = {10.1109/MPRV.2007.82},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/HayesPIPGAT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Iachello06,
  author       = {Giovanni Iachello},
  title        = {Privacy and Proportionality},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2006},
  url          = {https://hdl.handle.net/1853/10487},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Iachello06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/IachelloTAHS06,
  author       = {Giovanni Iachello and
                  Khai N. Truong and
                  Gregory D. Abowd and
                  Gillian R. Hayes and
                  Molly M. Stevens},
  editor       = {Rebecca E. Grinter and
                  Tom Rodden and
                  Paul M. Aoki and
                  Edward Cutrell and
                  Robin Jeffries and
                  Gary M. Olson},
  title        = {Prototyping and sampling experience to evaluate ubiquitous computing
                  privacy in the real world},
  booktitle    = {Proceedings of the 2006 Conference on Human Factors in Computing Systems,
                  {CHI} 2006, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, April
                  22-27, 2006},
  pages        = {1009--1018},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1124772.1124923},
  doi          = {10.1145/1124772.1124923},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/IachelloTAHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/IachelloT05,
  author       = {Giovanni Iachello and
                  Lucia Terrenghi},
  title        = {Mobile {HCI} 2004: Experience and Reflection},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {4},
  number       = {1},
  pages        = {88--91},
  year         = {2005},
  url          = {https://doi.org/10.1109/MPRV.2005.19},
  doi          = {10.1109/MPRV.2005.19},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/IachelloT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/AbowdHIKPST05,
  author       = {Gregory D. Abowd and
                  Gillian R. Hayes and
                  Giovanni Iachello and
                  Julie A. Kientz and
                  Shwetak N. Patel and
                  Molly M. Stevens and
                  Khai N. Truong},
  title        = {Prototypes and paratypes: designing mobile and ubiquitous computing
                  applications},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {4},
  number       = {4},
  pages        = {67--73},
  year         = {2005},
  url          = {https://doi.org/10.1109/MPRV.2005.83},
  doi          = {10.1109/MPRV.2005.83},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/AbowdHIKPST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/IachelloA05,
  author       = {Giovanni Iachello and
                  Gregory D. Abowd},
  editor       = {Gerrit C. van der Veer and
                  Carolyn Gale},
  title        = {Privacy and proportionality: adapting legal evaluation techniques
                  to inform design in ubiquitous computing},
  booktitle    = {Proceedings of the 2005 Conference on Human Factors in Computing Systems,
                  {CHI} 2005, Portland, Oregon, USA, April 2-7, 2005},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1054972.1054986},
  doi          = {10.1145/1054972.1054986},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/IachelloA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/IachelloSCAHHPSSHL05,
  author       = {Giovanni Iachello and
                  Ian E. Smith and
                  Sunny Consolvo and
                  Gregory D. Abowd and
                  Jeff Hughes and
                  James Howard and
                  Fred Potter and
                  James Scott and
                  Timothy Sohn and
                  Jeffrey Hightower and
                  Anthony LaMarca},
  editor       = {Michael Beigl and
                  Stephen S. Intille and
                  Jun Rekimoto and
                  Hideyuki Tokuda},
  title        = {Control, Deception, and Communication: Evaluating the Deployment of
                  a Location-Enhanced Messaging Service},
  booktitle    = {UbiComp 2005: Ubiquitous Computing, 7th International Conference,
                  UbiComp 2005, Tokyo, Japan, September 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3660},
  pages        = {213--231},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551201\_13},
  doi          = {10.1007/11551201\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/IachelloSCAHHPSSHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/SmithCLHSSHIA05,
  author       = {Ian E. Smith and
                  Sunny Consolvo and
                  Anthony LaMarca and
                  Jeffrey Hightower and
                  James Scott and
                  Timothy Sohn and
                  Jeff Hughes and
                  Giovanni Iachello and
                  Gregory D. Abowd},
  editor       = {Hans{-}Werner Gellersen and
                  Roy Want and
                  Albrecht Schmidt},
  title        = {Social Disclosure of Place: From Location Technology to Communication
                  Practices},
  booktitle    = {Pervasive Computing, Third International Conference, {PERVASIVE} 2005,
                  Munich, Germany, May 8-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3468},
  pages        = {134--151},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428572\_9},
  doi          = {10.1007/11428572\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/SmithCLHSSHIA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/IachelloSCCA05,
  author       = {Giovanni Iachello and
                  Ian E. Smith and
                  Sunny Consolvo and
                  Mike Y. Chen and
                  Gregory D. Abowd},
  editor       = {Lorrie Faith Cranor},
  title        = {Developing privacy guidelines for social location disclosure applications
                  and services},
  booktitle    = {Proceedings of the 1st Symposium on Usable Privacy and Security, {SOUPS}
                  2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {93},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073001.1073008},
  doi          = {10.1145/1073001.1073008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/IachelloSCCA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/PousmanIFMS04,
  author       = {Zachary Pousman and
                  Giovanni Iachello and
                  Rachel Fithian and
                  Jehan Moghazy and
                  John T. Stasko},
  title        = {Design iterations for a location-aware event planner},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {8},
  number       = {2},
  pages        = {117--125},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00779-004-0266-y},
  doi          = {10.1007/S00779-004-0266-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/PousmanIFMS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/HayesPTIKFA04,
  author       = {Gillian R. Hayes and
                  Shwetak N. Patel and
                  Khai N. Truong and
                  Giovanni Iachello and
                  Julie A. Kientz and
                  Rob Farmer and
                  Gregory D. Abowd},
  editor       = {Stephen A. Brewster and
                  Mark D. Dunlop},
  title        = {The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory
                  Aid},
  booktitle    = {Mobile Human-Computer Interaction - Mobile {HCI} 2004, 6th International
                  Symposium, Glasgow, UK, September 13-16, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3160},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28637-0\_15},
  doi          = {10.1007/978-3-540-28637-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mhci/HayesPTIKFA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/SmithIR04,
  author       = {Ian E. Smith and
                  Giovanni Iachello and
                  Mika Raento},
  editor       = {Stephen A. Brewster and
                  Mark D. Dunlop},
  title        = {Mobile {HCI} 2004 Workshop on Location Systems Privacy and Control},
  booktitle    = {Mobile Human-Computer Interaction - Mobile {HCI} 2004, 6th International
                  Symposium, Glasgow, UK, September 13-16, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3160},
  pages        = {525--526},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28637-0\_72},
  doi          = {10.1007/978-3-540-28637-0\_72},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mhci/SmithIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Iachello03,
  author       = {Giovanni Iachello},
  title        = {Protecting Personal Data: Can {IT} Security Management Standards Help?},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {266--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254331},
  doi          = {10.1109/CSAC.2003.1254331},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Iachello03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswc/WeiIDSJF03,
  author       = {Sha Xin Wei and
                  Giovanni Iachello and
                  Steven Dow and
                  Yoichiro Serita and
                  Tazama U. St. Julien and
                  Julien Fistre},
  title        = {Continuous Sensing of Gesture for Control of Audio-Visual Media},
  booktitle    = {7th International Symposium on Wearable Computers {(ISWC} 2003), 21-23
                  October 2003, White Plains, NY, {USA}},
  pages        = {236--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISWC.2003.1241417},
  doi          = {10.1109/ISWC.2003.1241417},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iswc/WeiIDSJF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/FithianIMPS03,
  author       = {Rachel Fithian and
                  Giovanni Iachello and
                  Jehan Moghazy and
                  Zachary Pousman and
                  John T. Stasko},
  editor       = {Luca Chittaro},
  title        = {The Design and Evaluation of a Mobile Location-Aware Handheld Event
                  Planner},
  booktitle    = {Human-Computer Interaction with Mobile Devices and Services, 5th International
                  Symposium, Mobile {HCI} 2003, Udine, Italy, September 8-11, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2795},
  pages        = {145--160},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45233-1\_12},
  doi          = {10.1007/978-3-540-45233-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mhci/FithianIMPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RannenbergI00,
  author       = {Kai Rannenberg and
                  Giovanni Iachello},
  title        = {Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria
                  Help?},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {107},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898864},
  doi          = {10.1109/ACSAC.2000.898864},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RannenbergI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/diau/IachelloR00,
  author       = {Giovanni Iachello and
                  Kai Rannenberg},
  editor       = {Hannes Federrath},
  title        = {Protection Profiles for Remailer Mixes},
  booktitle    = {Designing Privacy Enhancing Technologies, International Workshop on
                  Design Issues in Anonymity and Unobservability, Berkeley, CA, USA,
                  July 25-26, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2009},
  pages        = {181--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44702-4\_11},
  doi          = {10.1007/3-540-44702-4\_11},
  timestamp    = {Wed, 16 Mar 2022 23:55:03 +0100},
  biburl       = {https://dblp.org/rec/conf/diau/IachelloR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics