Effective end-user privacy management in everyday ubiquitous computing environments requires giving users complex, contextual information about potential privacy breaches and enabling management of these breaches in a timely, engaging and intuitive manner. In this paper, we propose using empirically grounded image schema-based metaphors to help design these interactions. Results from our exploratory user study (N=22) demonstrate end users’ preferences for changes in physical attributes and spatial properties of objects for privacy awareness. For privacy control, end users prefer to exert force and create spatial movement. The study also explores user preferences for wearable vs. ambient form-factors for managing privacy and concludes that a...
Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation ...
As more consumer products and services are getting intelligent and collect data about the user, priv...
We present a strategy to privacy aimed at stimulating the adoption of privacy-preserving behaviours ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
Due to the ubiquity of IoT devices, privacy violations can now occur across our cyber-physical-socia...
In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, ...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
peer-reviewedIn the age of ubiquitous computing increasing amounts of personal data are being logge...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
peer-reviewedPhysical or bodily privacy is an innate need that drives a variety of human behaviours...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
Context awareness is important for human senses of places as well as human computer interaction. The...
Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation ...
As more consumer products and services are getting intelligent and collect data about the user, priv...
We present a strategy to privacy aimed at stimulating the adoption of privacy-preserving behaviours ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
Due to the ubiquity of IoT devices, privacy violations can now occur across our cyber-physical-socia...
In the age of ubiquitous computing increasing amounts of personal data are being logged and shared, ...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
peer-reviewedIn the age of ubiquitous computing increasing amounts of personal data are being logge...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
peer-reviewedPhysical or bodily privacy is an innate need that drives a variety of human behaviours...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
Context awareness is important for human senses of places as well as human computer interaction. The...
Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation ...
As more consumer products and services are getting intelligent and collect data about the user, priv...
We present a strategy to privacy aimed at stimulating the adoption of privacy-preserving behaviours ...