Ethical issues in the use of computers
Usability inspection methods
Values, personal information privacy, and regulatory approaches
Communications of the ACM
Social translucence: designing social infrastructures that make collective activity visible
Communications of the ACM - Supporting community and building social capital
IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Web Privacy with P3p
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Topiary: a tool for prototyping location-enhanced applications
Proceedings of the 17th annual ACM symposium on User interface software and technology
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
GI '07 Proceedings of Graphics Interface 2007
Disappearing for a while - using white lies in pervasive computing
Proceedings of the 2007 ACM workshop on Privacy in electronic society
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
Office window of the future?-Field-based analyses of a new use of a large display
International Journal of Human-Computer Studies
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
APCHI '08 Proceedings of the 8th Asia-Pacific conference on Computer-Human Interaction
Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
`Aware of What?' A Formal Model of Awareness Systems That Extends the Focus-Nimbus Model
Engineering Interactive Systems
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
Encountering SenseCam: personal recording technologies in everyday life
Proceedings of the 11th international conference on Ubiquitous computing
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Optimal Choice and Beliefs with Ex Ante Savoring and Ex Post Disappointment
Management Science
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
How the web of things challenges requirements engineering
ICWE'12 Proceedings of the 12th international conference on Current Trends in Web Engineering
International Journal of Human-Computer Studies
International Journal of Human-Computer Studies
Similarity awareness: Using context sensing to support connectedness in intra-family communication
Journal of Ambient Intelligence and Smart Environments - Design and Deployment of Intelligent Environments
Hi-index | 0.00 |
As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user's privacy preferences against the applicable privacy regulations and incorporates five types of user controlled "noise" to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.