Filter
Conference contribution

Search results

  • 2012

    Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising

    Leon, P. G., Ur, B., Balebako, R., Cranor, L. F., Shay, R. & Wang, Y., May 24 2012, Conference Proceedings - The 30th ACM Conference on Human Factors in Computing Systems, CHI 2012. p. 589-598 10 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Intelligent reactive access control for moving user data

    Wang, Y., Aghasaryan, A., Shrihari, A., Pergament, D., Kamga, G. B. & Betgé-Brezetz, S., 2011, Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. p. 942-950 9 p. 6113244. (Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • "I regretted the minute I pressed share": A qualitative study of regrets on Facebook

    Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G. & Cranor, L. F., 2011, SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security. (SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Who is concerned about what? A study of American, Chinese and Indian users’ privacy concerns on social network sites

    Wang, Y., Norice, G. & Cranor, L. F., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Balacheff, B., Beres, Y., Sasse, A., McCune, J. M., Perrig, A. & Sadeghi, A.-R. (eds.). Springer, p. 146-153 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Privacy in cross-system personalization

    Wang, Y. & Kobsa, A., Oct 21 2010, Intelligent Privacy Management - Papers from the AAAI Spring Symposium, Technical Report. AI Access Foundation, p. 184-186 3 p. (AAAI Spring Symposium - Technical Report; vol. SS-10-05).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Performance evaluation of a privacy-enhancing framework for personalized websites

    Wang, Y. & Kobsa, A., Oct 15 2009, User Modeling, Adaptation, and Personalization - 17th International Conference, UMAP 2009 formerly UM and AH, Proceedings. p. 78-89 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5535 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy in online social networking at workplace

    Wang, Y. & Kobsa, A., Dec 4 2009, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - 2009 IEEE International Conference on Social Computing, SocialCom 2009. p. 975-978 4 p. 5283735. (Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Serial hook-ups: A comparative usability study of secure device pairing methods

    Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E. & Wang, Y., Nov 10 2009, SOUPS 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. 1572546. (SOUPS 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Situating productive play: Online gaming practices and Guanxi in China

    Lindtner, S., Mainwaring, S., Dourish, P. & Wang, Y., Nov 6 2009, Human-Computer Interaction - INTERACT 2009 - 12th IFIP TC 13 International Conference, Proceedings. PART 1 ed. p. 328-341 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5726 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2008

    A hybrid cultural ecology: World of Warcraft in China

    Lindtner, S., Nardi, B., Wang, Y., Mainwaring, S., Jing, H. & Liang, W., 2008, CSCW 08 - Conference Proceedings, 2008 ACM Conference on Computer Supported Cooperative Work. p. 371-381 11 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Human-currency interaction": Learning from virtual currency use in China

    Wang, Y. & Mainwaring, S. D., Dec 22 2008, 26th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings, CHI 2008. p. 25-28 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    MAPGrid: A new architecture for empowering mobile data placement in grid environments

    Huang, Y., Venkatasubramanian, N. & Wang, Y., Sep 4 2007, Proceedings - Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2007. p. 725-730 6 p. 4215444. (Proceedings - Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Respecting users' individual privacy constraints in web personalization

    Wang, Y. & Kobsa, A., Dec 24 2007, User Modeling 2007 - 11th International Conference, UM 2007, Proceedings. Springer, p. 157-166 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4511 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    PLA-based runtime dynamism in support of privacy-enhanced web personalization

    Wang, Y., Kobsa, A., Van Der Hoek, A. & White, J., 2006, Proceedings - 10th International Software Product Line Conference, SPLC 2006. p. 151-162 12 p. 1691587. (Proceedings - 10th International Software Product Line Conference, SPLC 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A bosom buddy afar brings a distant land near: Are bloggers a global community?

    Su, N. M., Wang, Y., Mark, G., Aiyelokun, T. & Nakano, T., Dec 1 2005, Proceedings of the 2nd Communities and Technologies Conference, C and T 2005. Kluwer Academic Publishers, p. 171-190 20 p. (Proceedings of the 2nd Communities and Technologies Conference, C and T 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constraint-sensitive privacy management for personalized web-based systems

    Wang, Y., Dec 1 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, p. 524-526 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3538 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution