Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Murky conceptual waters: The public and the private
Ethics and Information Technology
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Intelligent Spaces — The Vision, the Opportunities and the Barriers
BT Technology Journal
The Implications of Pervasive Computing on Network Design
BT Technology Journal
Privacy in the Age of Transparency
Social Science Computer Review
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
An index-based privacy preserving service trigger in context-aware computing environments
Expert Systems with Applications: An International Journal
Different aspects of trust in ubiquitous intelligent transportation systems
Proceedings of the 28th Annual European Conference on Cognitive Ergonomics
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
An informed view on consent for UbiComp
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
In the near future, everyday objects like cars and home appliances will connect the living environment to information networks. Pervasive computing devices will allow applications to gather and share a large amount of information. This may then open up a market for a large range of new services and applications. With a world densely populated by ‘smart dust’ sensor devices, no single part of our life will be able to escape from digitisation. Soon, sensor networks will be able to track everything from our feelings to our behaviour. Besides the enormous potential value, we can foresee many undesirable uses. In a worst-case scenario, privacy implications, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing. In this paper, we introduce the privacy issues found in the field of pervasive computing in two parts. The first part provides a brief look at the understanding of privacy, factors that can be used to control privacy, and the development of fair information practices and how they relate to the world of pervasive computing. The second part introduces technology that can provide a tool-set to support these fair information practices, and maintain the role of the data subject in the management of their private information.