Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Groupware and social dynamics: eight challenges for developers
Communications of the ACM
User and task analysis for interface design
User and task analysis for interface design
Social, individual and technological issues for groupware calendar systems
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
The origins of ubiquitous computing research at PARC in the late 1980s
IBM Systems Journal
Database nation: the death of privacy in the 21st century
Database nation: the death of privacy in the 21st century
Usability Engineering
The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience
Technology and Privacy: The New Landscape
Technology and Privacy: The New Landscape
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Challenge: ubiquitous location-aware computing and the "place lab" initiative
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Wireless Location Privacy Protection
Computer
How push-to-talk makes talk less pushy
GROUP '03 Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work
Development and evaluation of emerging design patterns for ubiquitous computing
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Supporting Quality of Privacy (QoP) in Pervasive Computing
ENC '05 Proceedings of the Sixth Mexican International Conference on Computer Science
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the relative importance of privacy guidelines for ambient health care
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
A privacy controller approach for privacy protection in web services
Proceedings of the 2007 ACM workshop on Secure web services
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Journal of Theoretical and Applied Electronic Commerce Research
Social Science Computer Review
Experimental evaluation of a lightweight method for augmenting requirements analysis
Proceedings of the 1st ACM international workshop on Empirical assessment of software engineering languages and technologies: held in conjunction with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE) 2007
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
International Journal of Mobile Communications
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary
ACM Transactions on Computer-Human Interaction (TOCHI)
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Cooperative Visualization of Privacy Risks
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
A privacy-preserving UBICOMP architecture
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
The portal monitor: a privacy-enhanced event-driven system for elder care
Proceedings of the 4th International Conference on Persuasive Technology
Ubiquitous systems and the family: thoughts about the networked home
Proceedings of the 5th Symposium on Usable Privacy and Security
Ubiquitous Computing for Capture and Access
Foundations and Trends in Human-Computer Interaction
Pervasive computing and disability: designing for independence?
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Private whispers/public eyes: Is receiving highly personal information in a public place stressful?
Interacting with Computers
A spotlight on security and privacy risks with future household robots: attacks and lessons
Proceedings of the 11th international conference on Ubiquitous computing
A framework for the design of privacy preserving pervasive healthcare
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Rendezvousing with location-aware devices: Enhancing social coordination
Interacting with Computers
Mobile map interactions during a rendezvous: exploring the implications of automation
Personal and Ubiquitous Computing
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Enhancing privacy management support in instant messaging
Interacting with Computers
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Proceedings of the 16th ACM international conference on Supporting group work
How to log sleeping trends? a case study on the long-term capturing of user data
EuroSSC'10 Proceedings of the 5th European conference on Smart sensing and context
Listing elements of rich information environments
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Building secure robot applications
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Living in a glass house: a survey of private moments in the home
Proceedings of the 13th international conference on Ubiquitous computing
Proceedings of the 39th annual ACM SIGUCCS conference on User services
“Need to know”: examining information need in location discourse
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
A generic privacy enhancing technology for pervasive computing environments
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Research on risk probability estimating using fuzzy clustering for dynamic security assessment
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Investigating receptiveness to sensing and inference in the home using sensor proxies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
Model Based Process to Support Security and Privacy Requirements Engineering
International Journal of Secure Software Engineering
Risk-based adaptive security for smart IoT in eHealth
Proceedings of the 7th International Conference on Body Area Networks
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Adaptive security and privacy management for the internet of things (ASPI 2013)
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
A framework to support selection of cloud providers based on security and privacy requirements
Journal of Systems and Software
Hi-index | 0.00 |
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on designing for privacy, there are few practical methods for helping designers create applications that provide end-users with a reasonable level of privacy protection that is commensurate with the domain, with the community of users, and with the risks and benefits to all stakeholders in the intended system. Towards this end, we propose privacy risk models as a general method for refining privacy from an abstract concept into concrete issues for specific applications and prioritizing those issues. In this paper, we introduce a privacy risk model we have developed specifically for ubiquitous computing, and outline two case studies describing our use of this privacy risk model in the design of two ubiquitous computing applications.