Views for Multilevel Database Security
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Using critics to empower users
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Embedding computer-based critics in the contexts of design
CHI '93 Proceedings of the INTERACT '93 and CHI '93 Conference on Human Factors in Computing Systems
Bridging physical and virtual worlds with electronic tags
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
WebStickers: using physical tokens to access, manage and share bookmarks to the Web
DARE '00 Proceedings of DARE 2000 on Designing augmented reality environments
Going wireless: behavior & practice of new mobile phone users
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
GeoNotes: Social and Navigational Aspects of Location-Based Information Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Context-Aware Computing: A Test Case
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
QueryLens: Beyond ID-Based Information Access
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Magic Medicine Cabinet: A Situated Portal for Consumer Healthcare
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Using Views in a Multilevel Secure Database Management System
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
People, places, things: Web presence for the real world
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Developing Consumer-Friendly Pervasive Retail Systems
IEEE Pervasive Computing
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
What we talk about when we talk about context
Personal and Ubiquitous Computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Meta-design: a manifesto for end-user development
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Communications of the ACM - Special issue: RFID
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
RFID Technology and Applications
IEEE Pervasive Computing
The Evolution of RFID Security
IEEE Pervasive Computing
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalization in privacy-aware highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
Of pill boxes and piano benches: "home-made" methods for managing medication
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments
Personal and Ubiquitous Computing
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Introduction to this special issue on context-aware computing
Human-Computer Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Scanning objects in the wild: assessing an object triggered information system
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Hi-index | 0.00 |
RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in everyday environments, there is a heightening tension in the design and shaping of social boundaries in the digitally enhanced real world. Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. We discuss awareness issues and cognitive costs in regulating RFID-triggered information flows and propose a framework for privacy-observant RFID applications. The proposed framework supports users' in situ privacy boundary control by allowing users to (1) see how their information is socially disclosed and viewed by others, (2) dynamically negotiate their privacy boundaries, and (3) automate certain information disclosure processes.