Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Computational disclosure control: a primer on data privacy protection
Computational disclosure control: a primer on data privacy protection
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
The Digital Person: Technology And Privacy In The Information Age
The Digital Person: Technology And Privacy In The Information Age
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Dealing with sensor displacement in motion-based onbody activity recognition systems
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Discovering semantically meaningful places from pervasive RF-beacons
Proceedings of the 11th international conference on Ubiquitous computing
Encountering SenseCam: personal recording technologies in everyday life
Proceedings of the 11th international conference on Ubiquitous computing
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A long-term evaluation of sensing modalities for activity recognition
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Is older, wiser?: an age-specific study of exposure of private information
Proceedings of the 50th Annual Southeast Regional Conference
Contexts and sharing/not sharing private information
Proceedings of the 50th Annual Southeast Regional Conference
Democratizing ubiquitous computing: a right for locality
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |
Various miniaturized computing devices that store our identity information are emerging rapidly and are likely to become ubiquitous in the future. They allow private information to be exposed and accessed easily via wireless networks. When identity and context information is gathered by pervasive computing devices, personal privacy might be sacrificed to a greater extent than ever before. People whose information is targeted may have different privacy protection skills, awareness, and privacy preferences. In this research, we studied the following issues and their relations: (a) identity information that people think is important to keep private; (b) actions that people claim to take to protect their identities and privacy; (c) privacy concerns; (d) how people expose their identity information in pervasive computing environments; and (e) how our RationalExposure model can help minimize unnecessary identity exposure. We conducted the research in three stages, a comprehensive survey and two in-lab experiments. We built a simulated pervasive computing shopping system, called InfoSource. It consisted of two applications and our RationalExposure model. Our data show that identity exposure decisions depended on participants' attitudes about maintaining privacy, but did not depend on participants' concerns or security actions that they claimed to have taken. Our RationalExposure model did help the participants reduce unnecessary disclosures.