As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user's privacy preferences against the applicable privacy regulations a...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consume...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
Ubiquitous computing, or ubicomp, integrates technology into our everyday environments. Ubicomp fund...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
Over the past several years, the press, trade publications and academic literature have reported wit...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
With the increasing deployment of sensors, intelligent devices of all sizes, and wireless networking...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
: Current developments in information technology are leading to increasing capture and storage of in...
This paper presents a framework which allows users flexible control of the disclosure of their perso...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consume...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...
The vision of Ubiquitous Computing (UbiComp) foresees a future of context-aware smart systems which ...
Position Paper.International audienceThe main message of this position paper is that ubiquitous comp...
Ubiquitous computing, or ubicomp, integrates technology into our everyday environments. Ubicomp fund...
Providing privacy protection for ubiquitous environments is a complex task that has only recently ha...
Over the past several years, the press, trade publications and academic literature have reported wit...
This thesis addresses the discretionary privacy demands of users in heterogeneous distributed system...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous ...
With the increasing deployment of sensors, intelligent devices of all sizes, and wireless networking...
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy ...
: Current developments in information technology are leading to increasing capture and storage of in...
This paper presents a framework which allows users flexible control of the disclosure of their perso...
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired acc...
Ubiquitous IS enables novel services and business models, yet require a careful balancing of consume...
In implementing privacy protection in surveillance systems, designers must maximize privacy while re...