Giovanni Iachello, Ph.D. - Publications

Affiliations: 
2006 Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

17/18 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2008 Iachello G, Abowd GD. From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary Acm Transactions On Computer-Human Interaction. 15. DOI: 10.1145/1375761.1375763  1
2007 Iachello G, Hong J. End-user privacy in human-computer interaction Foundations and Trends in Human-Computer Interaction. 1: 1-137. DOI: 10.1561/1100000004  1
2007 Hayes GR, Poole ES, Iachello G, Patel SN, Grimes A, Abowd GD, Truong KN. Physical, social, and experiential knowledge in pervasive computing environments Ieee Pervasive Computing. 6: 56-63. DOI: 10.1109/Mprv.2007.82  1
2006 Iachello G, Truong KN, Abowd GD, Hayes GR, Stevens M. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world Conference On Human Factors in Computing Systems - Proceedings. 2: 1009-1018.  1
2005 Iachello G, Smith I, Consolvo S, Chen M, Abowd GD. Developing privacy guidelines for social location disclosure applications and services Acm International Conference Proceeding Series. 93: 65-76. DOI: 10.1145/1073001.1073008  1
2005 Abowd GD, Hayes GR, Iachello G, Kientz JA, Patel SN, Stevens MM, Truong KN. Prototypes and paratypes: Designing mobile and ubiquitous computing applications Ieee Pervasive Computing. 4: 67-73. DOI: 10.1109/Mprv.2005.83  0.72
2005 Iachello G, Abowd GD. Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing Chi 2005: Technology, Safety, Community: Conference Proceedings - Conference On Human Factors in Computing Systems. 91-100.  1
2005 Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD. Social disclosure of place: From location technology to communication practices Lecture Notes in Computer Science. 3468: 134-151.  1
2005 Iachello G, Smith I, Consolvo S, Abowd GD, Hughes J, Howard J, Potter F, Scott J, Sohn T, Hightower J, LaMarca A. Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3660: 213-231.  1
2004 Pousman Z, Iachello G, Fithian R, Moghazy J, Stasko J. Design iterations for a location-aware event planner Personal and Ubiquitous Computing. 8: 117-125. DOI: 10.1007/s00779-004-0266-y  1
2004 Smith I, Iachello G, Raento M. Mobile HCI 2004 workshop on location systems privacy and control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3160: 525-526.  1
2004 Hayes GR, Patel SN, Truong KN, Iachello G, Kientz JA, Farmer R, Abowd GD. The personal audio loop: Designing a ubiquitous audio-based memory aid Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3160: 168-179.  1
2003 Iachello G. Protecting personal data: Can IT security management standards help? Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 266-275. DOI: 10.1109/CSAC.2003.1254331  1
2003 Fithian R, Iachello G, Moghazy J, Pousman Z, Stasko J. The design and evaluation of a mobile location-aware handheld event planner Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2795: 145-160.  1
2003 Sha XW, Iachello G, Dow S, Serita Y, St. Julien T, Fistre J. Continuous sensing of gesture for control of audio-visual media Proceedings - International Symposium On Wearable Computers, Iswc. 236-237.  1
2001 Iachello G, Rannenberg K. Protection profiles for remailer mixes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009: 181-230.  0.72
2000 Rannenberg K, Iachello G. Protection profiles for remailer mixes. Do the new evaluation criteria help? Proceedings - Annual Computer Security Applications Conference, Acsac. 2000: 107-118. DOI: 10.1109/ACSAC.2000.898864  0.72
Low-probability matches
2005 Iachello G, Terrenghi L. Mobile HCI 2004: Experience and Reflection Ieee Pervasive Computing. 4: 88-91. DOI: 10.1109/Mprv.2005.19  0.28
Hide low-probability matches.