Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Technology and privacy
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Charting past, present, and future research in ubiquitous computing
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Technology and Privacy: The New Landscape
Technology and Privacy: The New Landscape
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems
IEEE Pervasive Computing
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
The design and applications of a context service
ACM SIGMOBILE Mobile Computing and Communications Review
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A High Performance Privacy-Oriented Location System
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Development of the software infrastructure for a ubiquitous computing environment: the DSTO iRoom
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Data protection and data sharing in telematics
Mobile Networks and Applications
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Computer Supported Cooperative Work
Privacy and trust issues with invisible computers
Communications of the ACM - The disappearing computer
Tunecast " Administratively Scoped Broadcast Received by Tuned Receivers
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment
User Modeling and User-Adapted Interaction
Personalisation in intelligent environments: managing the information flow
OZCHI '05 Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Freedom and Privacy in Ambient Intelligence
Ethics and Information Technology
Communications of the ACM - Privacy and security in highly dynamic systems
A payment & receipt business model in U-commerce environment
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
On the relative importance of privacy guidelines for ambient health care
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Question-based authentication using context data
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
The Lighthouse Location System for Smart Dust
Proceedings of the 1st international conference on Mobile systems, applications and services
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Social Science Computer Review
A roadmap for research in mobile business
International Journal of Mobile Communications
A framework for systemic privacy protection in a pervasive platform
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary
ACM Transactions on Computer-Human Interaction (TOCHI)
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Where's the beep?: security, privacy, and user misunderstandings of RFID
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
MyPlace Locator: Flexible Sharing of Location Information
UM '07 Proceedings of the 11th international conference on User Modeling
The effects of transparency on trust in and acceptance of a content-based art recommender
User Modeling and User-Adapted Interaction
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Intelligent Products: A survey
Computers in Industry
Safety in discretionary access control for logic-based publish-subscribe systems
Proceedings of the 14th ACM symposium on Access control models and technologies
The Acceptance of Domestic Ambient Intelligence Appliances by Prospective Users
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Towards Ontology-Based Formal Verification Methods for Context Aware Systems
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing
ICOST '09 Proceedings of the 7th International Conference on Smart Homes and Health Telematics: Ambient Assistive Health and Wellness Management in the Heart of the City
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
An empirical investigation of attitude towards location-aware social network service
International Journal of Mobile Communications
Moving towards inclusive design guidelines for socially and ethically aware HCI
Interacting with Computers
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Enhancing privacy management support in instant messaging
Interacting with Computers
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Towards a security policy for ubiquitous healthcare systems
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Smart artefacts as affordances for awareness in distributed teams
The disappearing computer
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Editorial: Commentary on 'Software architectures and mobility: A Roadmap'
Journal of Systems and Software
Privacy-value-control harmonization for RFID adoption in retail
IBM Journal of Research and Development
Requirements and design space for interactive public displays
Proceedings of the international conference on Multimedia
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Coordinate transformation - a solution for the privacy problem of location based services?
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Listing elements of rich information environments
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia
Managing security and privacy in ubiquitous eHealth information interchange
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Living in a glass house: a survey of private moments in the home
Proceedings of the 13th international conference on Ubiquitous computing
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
DALMA – location aware alarm system for people with disabilities
ICCHP'06 Proceedings of the 10th international conference on Computers Helping People with Special Needs
Ethically aware design of a location system for people with dementia
ICCHP'06 Proceedings of the 10th international conference on Computers Helping People with Special Needs
Safe authentication method for security communication in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Seamlessness and privacy enhanced ubiquitous payment
EC-Web'06 Proceedings of the 7th international conference on E-Commerce and Web Technologies
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A study on privacy-related considerations in ubiquitous computing environment
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Look who's talking: authenticating service access points
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Balancing smartness and privacy for the ambient intelligence
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Privacy threat model for data portability in social network applications
International Journal of Information Management: The Journal for Information Professionals
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
What next, ubicomp?: celebrating an intellectual disappearing act
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Investigating receptiveness to sensing and inference in the home using sensor proxies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Mood meter: counting smiles in the wild
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Error propagation monitoring on windows mobile-based devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Smart wearable systems: Current status and future challenges
Artificial Intelligence in Medicine
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Anticipating ethical issues in emerging IT
Ethics and Information Technology
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Handset-Based Data Collection Process and Participant Attitudes
International Journal of Handheld Computing Research
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Digital neighborhood watch: investigating the sharing of camera data amongst neighbors
Proceedings of the 2013 conference on Computer supported cooperative work
Security and privacy threats in IoT architectures
Proceedings of the 7th International Conference on Body Area Networks
U-commerce research: a literature review and classification
International Journal of Ad Hoc and Ubiquitous Computing
A formal approach for inspecting privacy and trust in advanced electronic services
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
The break-time barometer: an exploratory system forworkplace break-time social awareness
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
Multimedia Tools and Applications
A wireless application overlay for ubiquitous mobile multimedia sensing and interaction
Proceedings of the 5th ACM Multimedia Systems Conference
Hi-index | 0.01 |
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.