Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Towards ubiquitous database in mobile commerce
Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Security, payment, and privacy for network commerce
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more complexes and distributed, but most system-related research is still focused on the 'performance' or 'efficiency'. And that most studied papers in privacy have been focused on encryption technology and protocols for securing the personal information data transaction. This paper secondly points out the problem that law-related researcher thinks that law can controller technology beyond human control. Today, due to the complexity of the problem, new privacy-related research based on total solution is integrative needed to consider laws, technology, economy, norms and so on. This paper will focus on analysis about Privacy in Ubiquitous computing Environment and total protection considerations on privacy. We present new privacy-related considerations in UC (Ubiquitous computing) Environment, point out the mechanism which new re-design privacy concept (protection scope) is affected from the UC (Ubiquitous computing) Environment and provide the total considerations for Privacy protection especially personal information protection by improve the intelligent technology applied in context aware technology.