Author image not provided
 Carolyn A Brodie

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.25
Citation Count245
Publication count20
Publication years2002-2010
Available for download7
Average downloads per article1,436.00
Downloads (cumulative)10,052
Downloads (12 Months)275
Downloads (6 Weeks)33
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


20 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 20
Result page: 1 2

Sort by:

1 published by ACM
July 2010 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 3, July 2010
Publisher: ACM
Bibliometrics:
Citation Count: 31
Downloads (6 Weeks): 12,   Downloads (12 Months): 90,   Downloads (Overall): 2,005

Full text available: PDFPDF
In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data containing personally identifiable information and, as such, privacy sensitive. The key component of the framework is a family of models (P-RBAC) that extend the well-known ...
Keywords: Role-based access control, model, Privacy, purpose

2
March 2009 IBM Journal of Research and Development: Volume 53 Issue 2, March 2009
Publisher: IBM Corp.
Bibliometrics:
Citation Count: 5

Policies that address security and privacy are pervasive parts of both technical and social systems, and technology that enables both organizations and individuals to create and manage such policies is a critical need in information technology (IT). This paper describes the notion of end-to-end policy management and advances a framework ...

3
March 2009 IBM Journal of Research and Development: Volume 53 Issue 2, March 2009
Publisher: IBM Corp.
Bibliometrics:
Citation Count: 3

The distributed nature of the environment in which privacy and security policies operate requires tools that help enforce consistency of policy rules across different domains. Furthermore, because changes to policy rules are required as policies evolve over time, such tools can be used by policy administrators to ensure the consistency ...

4 published by ACM
February 2009 IWIC '09: Proceedings of the 2009 international workshop on Intercultural collaboration
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 87

Full text available: PDFPDF
A three-phase fundamental research project is underway to determine the value of providing context-sensitive policy management technology, which is informed by algorithms based on cultural models and collaborative decision making, to partners in collaborative mission planning and execution. Three research teams are collaborating and leveraging their research frameworks and current ...
Keywords: cultural models, decision support, policy management

5 published by ACM
July 2008 SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 223

Full text available: PDFPDF
The goal of the research study reported here was to investigate policy authors' ability to take descriptions of changes to policy situations and author high-quality, complete policy rules that would parse with high accuracy. As a part of this research, we investigated ways in which we could assist policy authors ...
Keywords: natural language interfaces, privacy, privacy policies, social and legal issues, design process, syntax highlighting

6
June 2008 POLICY '08: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

We are investigating computing platform-independent policy frameworks to specify, analyze, and deploy security and networking policies. The goal is to provide easy to use mechanisms for refining high-level user-specified goals into low-level controls. This scenario-based demo of a Coalition Policy Management Portal prototype uses the context of a hostage rescue ...
Keywords: policy authoring, policy analysis, policy verification, policy deployment, portal, demonstration

7
September 2007 INTERACT'07: Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 15

Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of authoring methods has received limited treatment from usability experts. With the rise in networked applications, distributed data storage, and pervasive computing, authoring comprehensive and accurate ...
Keywords: policy, privacy, security, usability, policy-authoring

8 published by ACM
July 2006 SOUPS '06: Proceedings of the second symposium on Usable privacy and security
Publisher: ACM
Bibliometrics:
Citation Count: 42
Downloads (6 Weeks): 3,   Downloads (12 Months): 32,   Downloads (Overall): 842

Full text available: PDFPDF
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, our human-centered research has focused on understanding organizational privacy management needs, and, based on those needs, creating a usable and effective policy workbench called ...
Keywords: design, policy, privacy, security, usability, social and legal issues

9 published by ACM
April 2006 CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 4,   Downloads (12 Months): 22,   Downloads (Overall): 1,276

Full text available: PDFPDF
Privacy policy rules are often written in organizations by a team of people in different roles. Currently, people in these roles have no technological tools to guide the creation of clear and implementable high-quality privacy policy rules. High-quality privacy rules can be the basis for verifiable automated privacy access decisions. ...
Keywords: natural language interfaces, privacy, privacy policies, social and legal issues, design process

10 published by ACM
January 2006 Communications of the ACM - Personal information management: Volume 49 Issue 1, January 2006
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 6,   Downloads (12 Months): 58,   Downloads (Overall): 2,923

Full text available: HtmlHtml  PDFPDF
The goal is a policy workbench enabling users to create and transform natural language policies into machine-readable code for enforcement and compliance audits.

11
September 2005 INTERACT'05: Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

As information technology continues to spread, we believe that there will be an increasing awareness of a fundamental need to seriously consider privacy concerns, and that doing so will require an understanding of policies that govern information use accompanied by development of technologies that can implement such policies. The research ...

12 published by ACM
July 2005 SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 6,   Downloads (12 Months): 57,   Downloads (Overall): 2,696

Full text available: PDFPDF
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980's and 1990's. Design to make information easily accessible, without particular attention to issues such as whether an individual had a desire or right to control access to and use ...
Keywords: social and legal issues, design, privacy, privacy policies, security

13
July 2005 International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now: Volume 63 Issue 1-2, July 2005
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 10


14
July 2005 International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now: Volume 63 Issue 1-2, July 2005
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 31

As information technology continues to spread, we believe that there will be an increasing awareness of a fundamental need to address privacy concerns, and that doing so will require an understanding of policies that govern information use accompanied by development of technologies that can implement such policies. The research reported ...
Keywords: social and legal issues, design process, natural language interfaces, privacy, privacy policies, security

15
October 2004 International Journal of Human-Computer Studies: Volume 61 Issue 4, October 2004
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0


16
January 2004 Designing personalized user experiences in eCommerce
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 8


17
January 2004 Designing personalized user experiences in eCommerce
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1


18
November 2003 User Modeling and User-Adapted Interaction: Volume 13 Issue 4, November 2003
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 15

Despite an abundance of recommendations by researchers and more recently by commercial enterprises for adaptive interaction techniques and technologies, there exists little experimental validation of the value of such approaches to users. We have conducted user studies focussed on the perceived value of a variety of personalization features for an ...
Keywords: eCommerce, human-computer interaction, user profile, personalization, adaptive interaction, collaborative filtering, user studies

19
October 2003 IBM Systems Journal: Volume 42 Issue 4, October 2003
Publisher: IBM Corp.
Bibliometrics:
Citation Count: 17

In this paper, we describe the results of an effort to first understand the value of personalizing a Web site, as perceived by the visitors to the site as well as by the stakeholder organization that owns it, and then to develop a strategy for introducing personalization to the ibm.com ...

20
January 2002 SAINT-W '02: Proceedings of the 2002 Symposium on Applications and the Internet (SAINT) Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we present what we have learned while working with a large distributed marketing organization in order to design and develop ContactPoint, a personalized content delivery system and collaborative tool. It can be very difficult for members of large organizations to stay informed about what is happening in ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us