Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Giovanni Iachello
@article{DBLP:journals/tochi/IachelloA08, author = {Giovanni Iachello and Gregory D. Abowd}, title = {From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {15}, number = {2}, pages = {8:1--8:30}, year = {2008}, url = {https://doi.org/10.1145/1375761.1375763}, doi = {10.1145/1375761.1375763}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/IachelloA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fthci/IachelloH07, author = {Giovanni Iachello and Jason I. Hong}, title = {End-User Privacy in Human-Computer Interaction}, journal = {Found. Trends Hum. Comput. Interact.}, volume = {1}, number = {1}, pages = {1--137}, year = {2007}, url = {https://doi.org/10.1561/1100000004}, doi = {10.1561/1100000004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fthci/IachelloH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/HayesPIPGAT07, author = {Gillian R. Hayes and Erika Shehan Poole and Giovanni Iachello and Shwetak N. Patel and Andrea Grimes and Gregory D. Abowd and Khai N. Truong}, title = {Physical, Social, and Experiential Knowledge in Pervasive Computing Environments}, journal = {{IEEE} Pervasive Comput.}, volume = {6}, number = {4}, pages = {56--63}, year = {2007}, url = {https://doi.org/10.1109/MPRV.2007.82}, doi = {10.1109/MPRV.2007.82}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/HayesPIPGAT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Iachello06, author = {Giovanni Iachello}, title = {Privacy and Proportionality}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2006}, url = {https://hdl.handle.net/1853/10487}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Iachello06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/IachelloTAHS06, author = {Giovanni Iachello and Khai N. Truong and Gregory D. Abowd and Gillian R. Hayes and Molly M. Stevens}, editor = {Rebecca E. Grinter and Tom Rodden and Paul M. Aoki and Edward Cutrell and Robin Jeffries and Gary M. Olson}, title = {Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world}, booktitle = {Proceedings of the 2006 Conference on Human Factors in Computing Systems, {CHI} 2006, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, April 22-27, 2006}, pages = {1009--1018}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1124772.1124923}, doi = {10.1145/1124772.1124923}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/IachelloTAHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/IachelloT05, author = {Giovanni Iachello and Lucia Terrenghi}, title = {Mobile {HCI} 2004: Experience and Reflection}, journal = {{IEEE} Pervasive Comput.}, volume = {4}, number = {1}, pages = {88--91}, year = {2005}, url = {https://doi.org/10.1109/MPRV.2005.19}, doi = {10.1109/MPRV.2005.19}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/IachelloT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/AbowdHIKPST05, author = {Gregory D. Abowd and Gillian R. Hayes and Giovanni Iachello and Julie A. Kientz and Shwetak N. Patel and Molly M. Stevens and Khai N. Truong}, title = {Prototypes and paratypes: designing mobile and ubiquitous computing applications}, journal = {{IEEE} Pervasive Comput.}, volume = {4}, number = {4}, pages = {67--73}, year = {2005}, url = {https://doi.org/10.1109/MPRV.2005.83}, doi = {10.1109/MPRV.2005.83}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/AbowdHIKPST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/IachelloA05, author = {Giovanni Iachello and Gregory D. Abowd}, editor = {Gerrit C. van der Veer and Carolyn Gale}, title = {Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing}, booktitle = {Proceedings of the 2005 Conference on Human Factors in Computing Systems, {CHI} 2005, Portland, Oregon, USA, April 2-7, 2005}, pages = {91--100}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1054972.1054986}, doi = {10.1145/1054972.1054986}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/IachelloA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/IachelloSCAHHPSSHL05, author = {Giovanni Iachello and Ian E. Smith and Sunny Consolvo and Gregory D. Abowd and Jeff Hughes and James Howard and Fred Potter and James Scott and Timothy Sohn and Jeffrey Hightower and Anthony LaMarca}, editor = {Michael Beigl and Stephen S. Intille and Jun Rekimoto and Hideyuki Tokuda}, title = {Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service}, booktitle = {UbiComp 2005: Ubiquitous Computing, 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3660}, pages = {213--231}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551201\_13}, doi = {10.1007/11551201\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/huc/IachelloSCAHHPSSHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pervasive/SmithCLHSSHIA05, author = {Ian E. Smith and Sunny Consolvo and Anthony LaMarca and Jeffrey Hightower and James Scott and Timothy Sohn and Jeff Hughes and Giovanni Iachello and Gregory D. Abowd}, editor = {Hans{-}Werner Gellersen and Roy Want and Albrecht Schmidt}, title = {Social Disclosure of Place: From Location Technology to Communication Practices}, booktitle = {Pervasive Computing, Third International Conference, {PERVASIVE} 2005, Munich, Germany, May 8-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3468}, pages = {134--151}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428572\_9}, doi = {10.1007/11428572\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/pervasive/SmithCLHSSHIA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/IachelloSCCA05, author = {Giovanni Iachello and Ian E. Smith and Sunny Consolvo and Mike Y. Chen and Gregory D. Abowd}, editor = {Lorrie Faith Cranor}, title = {Developing privacy guidelines for social location disclosure applications and services}, booktitle = {Proceedings of the 1st Symposium on Usable Privacy and Security, {SOUPS} 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {93}, pages = {65--76}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073001.1073008}, doi = {10.1145/1073001.1073008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/IachelloSCCA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/PousmanIFMS04, author = {Zachary Pousman and Giovanni Iachello and Rachel Fithian and Jehan Moghazy and John T. Stasko}, title = {Design iterations for a location-aware event planner}, journal = {Pers. Ubiquitous Comput.}, volume = {8}, number = {2}, pages = {117--125}, year = {2004}, url = {https://doi.org/10.1007/s00779-004-0266-y}, doi = {10.1007/S00779-004-0266-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/PousmanIFMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/HayesPTIKFA04, author = {Gillian R. Hayes and Shwetak N. Patel and Khai N. Truong and Giovanni Iachello and Julie A. Kientz and Rob Farmer and Gregory D. Abowd}, editor = {Stephen A. Brewster and Mark D. Dunlop}, title = {The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid}, booktitle = {Mobile Human-Computer Interaction - Mobile {HCI} 2004, 6th International Symposium, Glasgow, UK, September 13-16, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3160}, pages = {168--179}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28637-0\_15}, doi = {10.1007/978-3-540-28637-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mhci/HayesPTIKFA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/SmithIR04, author = {Ian E. Smith and Giovanni Iachello and Mika Raento}, editor = {Stephen A. Brewster and Mark D. Dunlop}, title = {Mobile {HCI} 2004 Workshop on Location Systems Privacy and Control}, booktitle = {Mobile Human-Computer Interaction - Mobile {HCI} 2004, 6th International Symposium, Glasgow, UK, September 13-16, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3160}, pages = {525--526}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28637-0\_72}, doi = {10.1007/978-3-540-28637-0\_72}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mhci/SmithIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Iachello03, author = {Giovanni Iachello}, title = {Protecting Personal Data: Can {IT} Security Management Standards Help?}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {266--275}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254331}, doi = {10.1109/CSAC.2003.1254331}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Iachello03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswc/WeiIDSJF03, author = {Sha Xin Wei and Giovanni Iachello and Steven Dow and Yoichiro Serita and Tazama U. St. Julien and Julien Fistre}, title = {Continuous Sensing of Gesture for Control of Audio-Visual Media}, booktitle = {7th International Symposium on Wearable Computers {(ISWC} 2003), 21-23 October 2003, White Plains, NY, {USA}}, pages = {236--237}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISWC.2003.1241417}, doi = {10.1109/ISWC.2003.1241417}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iswc/WeiIDSJF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/FithianIMPS03, author = {Rachel Fithian and Giovanni Iachello and Jehan Moghazy and Zachary Pousman and John T. Stasko}, editor = {Luca Chittaro}, title = {The Design and Evaluation of a Mobile Location-Aware Handheld Event Planner}, booktitle = {Human-Computer Interaction with Mobile Devices and Services, 5th International Symposium, Mobile {HCI} 2003, Udine, Italy, September 8-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2795}, pages = {145--160}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45233-1\_12}, doi = {10.1007/978-3-540-45233-1\_12}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/mhci/FithianIMPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RannenbergI00, author = {Kai Rannenberg and Giovanni Iachello}, title = {Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {107}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898864}, doi = {10.1109/ACSAC.2000.898864}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RannenbergI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/diau/IachelloR00, author = {Giovanni Iachello and Kai Rannenberg}, editor = {Hannes Federrath}, title = {Protection Profiles for Remailer Mixes}, booktitle = {Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2009}, pages = {181--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44702-4\_11}, doi = {10.1007/3-540-44702-4\_11}, timestamp = {Wed, 16 Mar 2022 23:55:03 +0100}, biburl = {https://dblp.org/rec/conf/diau/IachelloR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.