Author image not provided
 Denise L Anthony

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.78
Citation Count115
Publication count9
Publication years2005-2015
Available for download5
Average downloads per article904.40
Downloads (cumulative)4,522
Downloads (12 Months)331
Downloads (6 Weeks)24
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


9 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 9 of 9
Sort by:

1 published by ACM
April 2015 CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 74,   Downloads (Overall): 298

Full text available: PDFPDF
While media reports about wearable cameras have focused on the privacy concerns of bystanders, the perspectives of the `lifeloggers' themselves have not been adequately studied. We report on additional analysis of our previous in-situ lifelogging study in which 36 participants wore a camera for a week and then reviewed the ...
Keywords: privacy, lifelogging, wearable cameras

2 published by ACM
September 2014 UbiComp '14: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Publisher: ACM
Bibliometrics:
Citation Count: 30
Downloads (6 Weeks): 8,   Downloads (12 Months): 142,   Downloads (Overall): 929

Full text available: PDFPDF
A number of wearable 'lifelogging' camera devices have been released recently, allowing consumers to capture images and other sensor data continuously from a first-person perspective. Unlike traditional cameras that are used deliberately and sporadically, lifelogging devices are always 'on' and automatically capturing images. Such features may challenge users' (and bystanders') ...
Keywords: privacy, lifelogging, wearable cameras

3
November 2013 IEEE Security and Privacy: Volume 11 Issue 6, November 2013
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Dartmouth College's Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the workshops.
Keywords: Security,Medical services,Privacy,Network security,Mobile communication,Information technology,Information technology,workshop,healthcare,mHealth,information technology,electronic health records,security,privacy

4
September 2013 ICHI '13: Proceedings of the 2013 IEEE International Conference on Healthcare Informatics
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Patient access to electronic health records (EHR) is expected to have a variety of benefits, including enhanced patient involvement in care and access to health information, yet little is known about potential demand. We used the 2007 Health Information and National Trends Survey, a national probability-based survey, to determine which ...
Keywords: electronic health records, health disparities, patient involvement, patient knowledge

5 published by ACM
October 2012 WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 7,   Downloads (12 Months): 79,   Downloads (Overall): 501

Full text available: PDFPDF
If people are not in control of the collection and sharing of their personal health information collected using mobile health (mHealth) devices and applications, privacy concerns could limit their willingness to use and reduce potential benefits provided via mHealth. We investigated users' willingness to share their personal information, collected using ...
Keywords: mhealth, mobile, health, privacy

6
August 2011 HealthSec'11: Proceedings of the 2nd USENIX conference on Health security and privacy
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2


7 published by ACM
November 2009 SPIMACS '09: Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3,   Downloads (12 Months): 10,   Downloads (Overall): 469

Full text available: PDFPDF
As the baby boomers age and the focus of healthcare shifts from acute care to chronic care, home healthcare will become increasingly important in controlling cost and improving quality. Health IT will undoubtedly play critical role toward these goals. Yet, growing adoption of Health IT raises important questions related to ...
Keywords: neo-institutional theory, hipaa compliance, home health agencies

8
October 2007 IEEE Pervasive Computing: Volume 6 Issue 4, October 2007
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 43

As location-aware and pervasive computing technologies become more prevalent, privacy concerns are becoming increasingly more important. User preferences about location privacy may depend on place, not only in terms of their physical location but also in terms of their social context: how they define where they are, what they are ...
Keywords: location-dependent, pervasive computing, privacy, privacy, location-dependent, location-sensitive, location-aware, pervasive computing, location-aware, location-sensitive

9 published by ACM
May 2005 ACM Transactions on Information and System Security (TISSEC): Volume 8 Issue 2, May 2005
Publisher: ACM
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 2,   Downloads (12 Months): 26,   Downloads (Overall): 2,325

Full text available: PDFPDF
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually terminate in a human. The gap between the human and the computer creates potential for security problems. We examine this gap, as it is manifested in secure Web servers. Felten et al. demonstrated the ...
Keywords: Trust path, Web browser security, HCISEC



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us