Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Technology and privacy: the new landscape
Technology and privacy: the new landscape
Perceptual user interfaces: perceptual intelligence
Communications of the ACM
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Integrated Person Tracking Using Stereo, Color, and Pattern Detection
International Journal of Computer Vision - Special issue on a special section on visual surveillance
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
CVPR '97 Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97)
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Human-Computer Interaction
On the Gap between Vision and Feasibility
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Architecture for user-controlled e-privacy
Proceedings of the 2003 ACM symposium on Applied computing
Interpersonal trust in online partnerships: the challenge of representation
Trust in knowledge management and systems in organizations
Usability issues in utilizing context metadata in content management of mobile devices
Proceedings of the third Nordic conference on Human-computer interaction
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web
Information Systems - Special issue: The semantic web and web services
The Role of Context in m-Commerce and the Personalization Dimension
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Understanding the Influence of the Users' Context in AmI
Social Science Computer Review
Introduction to this special issue on context-aware computing
Human-Computer Interaction
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
PCP: privacy-aware context profile towards context-aware application development
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Critical success factors for context-aware mobile communication systems
International Journal of Mobile Communications
Models in Software Engineering
Mobile Identity Management Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
An index-based privacy preserving service trigger in context-aware computing environments
Expert Systems with Applications: An International Journal
Social regulation in an online game: uncovering the problematics of code
Proceedings of the 16th ACM international conference on Supporting group work
Location privacy in a digital ecosystem for context-aware applications
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Designing natural language and structured entry methods for privacy policy authoring
INTERACT'05 Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
MoCCha: a mobile campus app for analyzing user behavior in the field
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
Location Based Context-Aware Services in a Digital Ecosystem with Location Privacy
Journal of Cases on Information Technology
Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design
Ethics and Information Technology
Hi-index | 0.00 |
Context-aware computing offers the promise of significant user gains--the ability for systems to adapt more readily to user needs, models, and goals. Dey, Abowd, and Salber (2001 [this special issue]) present a masterful step toward understanding context-aware applications. We examine Dey et al. in the light of privacy issues--that is, individuals' control over their personal data--to highlight some of the thorny issues in context-aware computing that will be upon us soon. We argue that privacy in context-aware computing, especially those with perceptually aware environments, will be quite complex. Indeed, privacy forms a co-design space between the social, the technical, and the regulatory. We recognize that Dey et al. is a necessary first step in examining important software engineering concerns, but future research will need to consider how regulatory and technical solutions might be co-designed to form a public good.