Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous computing - invisibility. Dangers of invisible computing are interfaces that do not give people the needed tools of awareness and control to understand and shape the behavior of the system. By definition, ubiquitous computing systems are socio-technical, encompassing three environments: social, technical, and physical. We argue that addressing or presenting solutions in any one environment alone cannot solve the privacy issue in ubiquitous computing. Privacy is addressed best by giving users methods, mechanisms, and interfaces to understand and then shape the system in all three environments. We introduce Privacy Mirrors, a framework for desi...
Ubiquitous computing, or ubicomp, integrates technology into our everyday environments. Ubicomp fund...
The advances made in technology have unchained the user from the desktop into interactions where acc...
Handling users' privacy in ubiquitous systems is a difficult challenge. Many frameworks have been pr...
: Current developments in information technology are leading to increasing capture and storage of in...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
Over the past several years, the press, trade publications and academic literature have reported wit...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Technology is matured enough to make ubiquitous computing possible. Ubiquitous computing is the tec...
Abstract. Ubiquitous computing (UC) environments have triggered a strong research interest in privac...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing, or ubicomp, integrates technology into our everyday environments. Ubicomp fund...
The advances made in technology have unchained the user from the desktop into interactions where acc...
Handling users' privacy in ubiquitous systems is a difficult challenge. Many frameworks have been pr...
: Current developments in information technology are leading to increasing capture and storage of in...
As with all the major advances in information and communication technology, ubiquitous computing (ub...
Over the past several years, the press, trade publications and academic literature have reported wit...
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, desig...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Technology is matured enough to make ubiquitous computing possible. Ubiquitous computing is the tec...
Abstract. Ubiquitous computing (UC) environments have triggered a strong research interest in privac...
peer-reviewedThe emergence of ubiquitous computing (UbiComp) environments has increased the risk of ...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous computing, or ubicomp, integrates technology into our everyday environments. Ubicomp fund...
The advances made in technology have unchained the user from the desktop into interactions where acc...
Handling users' privacy in ubiquitous systems is a difficult challenge. Many frameworks have been pr...