Users' perception of privacy in multimedia communication
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Hi-index | 0.00 |
An information rich environment creates a host of privacy related issues that have been addressed through frameworks, principles and models [6, 4, 2, 10, 11, 12]. But when a product that handles rich information is created, users need to be informed about how their information is collected, stored and distributed. The author uses Weiser's ubiquitous scenario as a reference point to create as well as validate a list of elements to represent this information through: 1) Cue Points, 2) Identity Recognition, 3) Data Share, 4) Data Storage and 5) Data Access.