Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Teaching and learning as multimedia authoring: the classroom 2000 project
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
Taming the wolf in sheep's clothing: privacy in multimedia communications
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Understanding and Using Context
Personal and Ubiquitous Computing
Murky conceptual waters: The public and the private
Ethics and Information Technology
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
At Home with Ubiquitous Computing: Seven Challenges
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Evolution towards smart home environments: empirical evaluation of three user interfaces
Personal and Ubiquitous Computing
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Making multimedia meeting records more meaningful
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
A framework for the design of privacy preserving pervasive healthcare
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
TreasurePhone: context-sensitive user data protection on mobile phones
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Ubiquitous computing contains a huge promise for more intelligent services that are available anywhere and are able to dynamically adapt to the users' current context. However, what necessarily follows such an environment is the compromising of the users' privacy. We aim at analyzing this complex issue by applying and extending Altman's theoretical privacy framework, well known in social sciences, to privacy in ubicomp. Altman understands privacy as a two-way interactive process, which makes the approach promising in analyzing ubicomp where people, devices and the environment interact with each other. We point out similarities between the existing model and the features of ubicomp environment, and verify the results by applying and analyzing the resulting extended framework to typical ubicomp use cases. Based on the analysis, we argue that privacy in ubicomp can be modeled similarly to privacy in general by extending the model to cover such factors as mediation and non-human actors.