Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Activity sensing in the wild: a field trial of ubifit garden
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Exploring Privacy Concerns about Personal Sensing
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
Mercury: a wearable sensor network platform for high-fidelity motion analysis
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Generating default privacy policies for online social networks
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi
Proceedings of the 12th ACM international conference on Ubiquitous computing
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Understanding sharing preferences and behavior for mHealth devices
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
On the feasibility of user de-anonymization from shared mobile sensor data
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Scalable crowd-sourcing of video from mobile devices
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Understanding the coverage and scalability of place-centric crowdsensing
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Internet of things: a review of literature and products
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
ipShield: a framework for enforcing context-aware privacy
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.01 |
Wearable sensors are revolutionizing healthcare and science by enabling capture of physiological, psychological, and behavioral measurements in natural environments. However, these seemingly innocuous measurements can be used to infer potentially private behaviors such as stress, conversation, smoking, drinking, illicit drug usage, and others. We conducted a study to assess how concerned people are about disclosure of a variety of behaviors and contexts that are embedded in wearable sensor data. Our results show participants are most concerned about disclosures of conversation episodes and stress - inferences that are not yet widely publicized. These concerns are mediated by temporal and physical context associated with the data and the participant's personal stake in the data. Our results provide key guidance on the extent to which people understand the potential for harm and data characteristics researchers should focus on to reduce the perceived harm from such datasets.