Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest everyday utility to users, as they gradually engender the user’s conceptual model of ubicomp privacy. Navigating the regular deluge of personal information collection events in ubicomp requires that notice be minimally intrusive and consent be implicitly granted by a persistent, situation-specific set of user preferences. We extend our model ...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artif...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artif...
: Current developments in information technology are leading to increasing capture and storage of in...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Effective end-user privacy management in everyday ubiquitous computing environments requires giving ...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
Abstract. In this paper, we propose a framework for supporting socially-compatible privacy objective...
Abstract. Ubiquitous computing (UC) environments have triggered a strong research interest in privac...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artif...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artif...
: Current developments in information technology are leading to increasing capture and storage of in...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Effective end-user privacy management in everyday ubiquitous computing environments requires giving ...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
Abstract. In this paper, we propose a framework for supporting socially-compatible privacy objective...
Abstract. Ubiquitous computing (UC) environments have triggered a strong research interest in privac...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...