Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
A context-sensitive security model for privacy protection on mobile phones
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
TreasurePhone: context-sensitive user data protection on mobile phones
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Concepts for mobile programming
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
Hi-index | 0.00 |
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion---digital systems that remember forever and can be data-mined retroactively, years after the event, ignoring any privacy promise under which the original data may have been acquired. Even for systems under your own control, though, the situation is alarming. As your capacious digital butlers faithfully collect as much data as possible about you, your private information is increasingly likely to become compromised. New solutions are needed. But technical countermeasures alone are not the whole story.