Karat, John
103  results:
Search for persons X
?
3

Privacy, Security, and Trust: Human–Computer Interaction Ch..:

, In: Human Factors and Ergonomics; Human–Computer Interaction Handbook,
Karat, John ; Karat, Clare-Marie ; Brodie, Carolyn.. - p. 669-698 , 2012
 
?
4

Privacy, Security, and Trust:

, In: The Human–Computer Interaction Handbook,
 
?
5

Session details: Privacy:

, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
Karat, John , 2011
 
?
6

Session details: Privacy behaviors:

, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
Karat, John , 2010
 
?
7

Privacy-aware role-based access control:

Ni, Qun ; Bertino, Elisa ; Lobo, Jorge...
ACM Transactions on Information and System Security (TISSEC).  13 (2010)  3 - p. 1-31 , 2010
 
?
8

Privacy-aware role-based access control:

Ni, Qun ; Bertino, Elisa ; Lobo, Jorge...
ACM Transactions on Information and System Security.  13 (2010)  3 - p. 1-31 , 2010
 
?
9

Optimizing a policy authoring framework for security and pr..:

, In: Proceedings of the Sixth Symposium on Usable Privacy and Security,
 
?
10

Learning in Communities 

Interdisciplinary Perspectives on Human Centered Informatio...  Human-Computer Interaction Series
 
?
11

Human-Centered Software Engineering 

Software Engineering Models, Patterns and Architectures for...  Human-Computer Interaction Series;SpringerLink, Bücher;Springer eBook Collection, Computer Science
 
?
12

Computers in the Human Interaction Loop 

Human-Computer Interaction Series
Link: http://dx.doi.org/10.100..

Copies:  Zentrale:E02 a inf 070 m/946
 
?
13

A framework for culturally adaptive policy management in ad..:

, In: Proceedings of the 2009 international workshop on Intercultural collaboration,
Karat, John ; Sieck, Winston ; Norman, Timothy J.... - p. 257-260 , 2009
 
?
14

An Organizational View of Pervasive Computing: Policy Impli..:

Karat, John ; Karat, Clare-Marie
Social Science Computer Review.  26 (2008)  1 - p. 13-19 , 2008
 
?
15

Evaluating assistance of natural language policy authoring:

, In: Proceedings of the 4th symposium on Usable privacy and security,
 
1-15