Understanding and Using Context
Personal and Ubiquitous Computing
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Providing architectural support for building context-aware applications
Providing architectural support for building context-aware applications
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Privacy for RFID through trusted computing
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A smart home agent for plan recognition
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Context-Aware Pervasive Systems
Context-Aware Pervasive Systems
Bluetooth worm propagation: mobility pattern matters!
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Probing user values in the home environment within a technology driven Smart Home project
Personal and Ubiquitous Computing
Pervasive healthcare and wireless health monitoring
Mobile Networks and Applications
Exploring context-awareness for ubiquitous computing in the healthcare domain
Personal and Ubiquitous Computing
Urban Computing and Mobile Devices
IEEE Distributed Systems Online
IEEE Pervasive Computing
Experience of context-aware services in public spaces
Proceedings of the 5th international conference on Pervasive services
A pervasive personal trainer, an electronic leash, a light canvas...
IEEE Pervasive Computing
Guest Editors' Introduction: Urban Computing
IEEE Pervasive Computing
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Context management for m-commerce applications: determinants, methodology and the role of marketing
Information Technology and Management
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Personal information handling in current and anticipated context use cases is worrisome. This notwithstanding, contextual services are rapidly proliferating into most niches of society, catalysed by technological advancements in sensing, ubiquity and mobile computing. Evolving social trends, catastrophic events and the economics of personal information further escalate the frenzy. Consequently, contextual applications have propagated into personal, community, government and corporate services. Unfortunately, these services are seldom developed with onset personal information leak concerns. As a result, personal information pieces often leak in their handling, eroding the users' privacy. Privacy erosion is attributed to information leaks through covert acquisitions and re-purposing of legitimate data. Privacy loss from such erosion exposes individuals to significant harm often intractable or costly. This study identifies and sensitises information handling vulnerabilities on their privacy implications in context-aware services. We assert the need for stakeholders in contextual services to deliberate privacy implications of context throughout its life cycle as opposed to, detached focus at collection, transmission or usage points. Notably, privacy threats will intensify as computing further invades the sacred precincts of our private, public and domestic lives.