Identity theft, social security numbers, and the Web
Communications of the ACM
The mutable mobile: social theory in the wireless world
Wireless world
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting private data in public
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Mobile interaction design: Integrating individual and organizational perspectives
Information-Knowledge-Systems Management - Enterprise Mobility: Applications, Technologes and Strategies
Human agency in a wireless world: Patterns of technology use in nomadic computing environments
Information and Organization
Hi-index | 0.00 |
Maintaining information privacy and security in the mobile environment, an issue having personal and organizational implications, remains a challenge because the context of a mobile device can change rapidly. In response to this, the authors have been investigating methods of maintaining the privacy of sensitive information accessed in mobile environments (i.e. potentially in public places). This particular study, still in progress, will collect and analyze data on employee information privacy and security practices and perceptions. A complicating factor is that the classification of information as "private" may not be absolute. Privacy levels of organizational information will be dictated by company policy, while privacy concerns with personal information are based on the employee's own comfort level. Hence potential conflict arises if an individual uses a single mobile device for both personal and organizational information access. A summary and status of design activities and the planned implementation of the study is provided.