Privacy, isolation, and fairness are important issues for virtual commu-nities and collaborative applications that are on the other hand hard to establish. This paper presents six patterns that focus on how to establish boundaries for interaction. The patterns address issues regarding information perceived from and transmitted to other users. They discuss the importance of shielding the user from too much information in specific situations and the need for controlling how much information is provided by the local user. Note to the writer’s workshop participants: The following pattern language exceeds the length that can be reasonably discussed in one writer’s workshop session. Thus, I’d be happy to receive feedback on the patterns Attention...
Increasingly, software development teams comprise members who are geographically distributed across ...
The issue of incorporating privacy into complex information systems has grown substantially over the...
There are numerous information privacy approaches based on the four major models of privacy protecti...
ABSTRACT 1 A proper security architecture is an essential part of implementing robust and reliable n...
ABSTRACT1 A proper security architecture is an essential part of implementing robust and reliable ne...
This chapter investigates ways to deal with privacy rules when modeling preferences of users in reco...
This paper addresses the need of interpersonal privacy coordination mechanisms in the context of med...
Technological advances, specifically within the field of mobile and ubiquitous technologies, hold th...
Abstract. In this paper we describe three mechanisms that enable people to co-ordinate their interac...
In this paper we describe three mechanisms that enable people to coordinate their interaction needs ...
Privacy is the right of individuals to keep personal information to themselves or restrict the infor...
International audienceResearch in the areas of privacy-preserving techniques in databases and subseq...
Several privacy engineering methods and techniques have built on privacy patterns formaterializing t...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
There has recently been an upsurge of legislative, technical and organizational frameworks in the fi...
Increasingly, software development teams comprise members who are geographically distributed across ...
The issue of incorporating privacy into complex information systems has grown substantially over the...
There are numerous information privacy approaches based on the four major models of privacy protecti...
ABSTRACT 1 A proper security architecture is an essential part of implementing robust and reliable n...
ABSTRACT1 A proper security architecture is an essential part of implementing robust and reliable ne...
This chapter investigates ways to deal with privacy rules when modeling preferences of users in reco...
This paper addresses the need of interpersonal privacy coordination mechanisms in the context of med...
Technological advances, specifically within the field of mobile and ubiquitous technologies, hold th...
Abstract. In this paper we describe three mechanisms that enable people to co-ordinate their interac...
In this paper we describe three mechanisms that enable people to coordinate their interaction needs ...
Privacy is the right of individuals to keep personal information to themselves or restrict the infor...
International audienceResearch in the areas of privacy-preserving techniques in databases and subseq...
Several privacy engineering methods and techniques have built on privacy patterns formaterializing t...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
There has recently been an upsurge of legislative, technical and organizational frameworks in the fi...
Increasingly, software development teams comprise members who are geographically distributed across ...
The issue of incorporating privacy into complex information systems has grown substantially over the...
There are numerous information privacy approaches based on the four major models of privacy protecti...