메뉴 건너뛰기




Volumn 63, Issue 1-2, 2005, Pages 228-253

Keeping ubiquitous computing to yourself: A practical model for user control of privacy

Author keywords

Legal; Location dependent and sensitive; Pervasive computing; Privacy; Regulation; Ubiquitous computing

Indexed keywords

DATA COMMUNICATION EQUIPMENT; DATA REDUCTION; HEURISTIC METHODS; INFORMATION TECHNOLOGY; LAWS AND LEGISLATION; REGULATORY COMPLIANCE;

EID: 19944372788     PISSN: 10715819     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2005.04.008     Document Type: Article
Times cited : (78)

References (57)
  • 1
    • 84869462085 scopus 로고    scopus 로고
    • Privacy critics: UI components to safeguard Users' privacy
    • Paper presented at the
    • Ackerman, M., Cranor, L., 1999. Privacy Critics: UI Components to Safeguard Users' Privacy. Paper presented at the CHI', 99, pp. 258-259.
    • (1999) CHI', 99 , pp. 258-259
    • Ackerman, M.1    Cranor, L.2
  • 3
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in electronic commerce and the economics of immediate gratification
    • Paper presented at the
    • Acquisti, A., 2004. Privacy in electronic commerce and the economics of immediate gratification. Paper presented at the 5th ACM conference on Electronic commerce, pp. 21-29.
    • (2004) 5th ACM Conference on Electronic Commerce , pp. 21-29
    • Acquisti, A.1
  • 4
    • 19944425668 scopus 로고    scopus 로고
    • AT&T., 2003. Privacy Bird, available from: http://www.privacybird.com
    • (2003) Privacy Bird
  • 5
    • 19944361990 scopus 로고    scopus 로고
    • Retrieved 31 January, 2005
    • AT&T., 2004. Find People Nearby. Retrieved 31 January, 2005, available from: http://www.attwireless.com/personal/features/organization/ findfriends.jhtml
    • (2004) Find People Nearby
  • 10
    • 19944368926 scopus 로고    scopus 로고
    • Children's Online Privacy Protection Act 15 USC 6501-6505
    • Children's Online Privacy Protection Act, 1998. 15 USC 6501-6505. Available from: http://www.ftc.gov/ogc/coppa1.htm
    • (1998)
  • 13
    • 19944396296 scopus 로고    scopus 로고
    • ContentGuard.com., 2005. XrML Version 2.0, available from: http://www.xrml.org
    • (2005) XrML Version 2.0
  • 16
    • 0038684367 scopus 로고    scopus 로고
    • O'Reilly & Associates Cambridge, MA
    • L. Cranor Web Privacy with P3P 2002 O'Reilly & Associates Cambridge, MA
    • (2002) Web Privacy with P3P
    • Cranor, L.1
  • 18
    • 19944388746 scopus 로고    scopus 로고
    • CreativeCommons.org., 2005. Creative Commons, available from: http://creativecommons.org/
    • (2005) Creative Commons
  • 19
  • 20
    • 19944363689 scopus 로고    scopus 로고
    • 95/46/EC
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995), 95/46/EC. Available from: http://europa.eu.int/comm/internal_market/privacy/law_en.htm
  • 21
    • 19944405612 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (2002). Available from: http://europa.eu.int/comm/internal_market/privacy/law_en.htm
  • 22
    • 33846190518 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Paper presented at the Munich, Germany, 8-13 May, to appear
    • Duckham, M., Kulik, L., 2005. A formal model of obfuscation and negotiation for location privacy. Paper presented at the Third International Conference on Pervasive Computing: Pervasive '05, Munich, Germany, 8-13 May, to appear.
    • (2005) Third International Conference on Pervasive Computing: Pervasive '05
    • Duckham, M.1    Kulik, L.2
  • 25
    • 0003098014 scopus 로고    scopus 로고
    • Social translucence: Designing social infrastructures that make collective activity visible
    • T. Erickson, C. Halverson, W.A. Kellogg, M. Laff, and T. Wolf Social translucence: designing social infrastructures that make collective activity visible Communications of the ACM 45 4 2002 40 44
    • (2002) Communications of the ACM , vol.45 , Issue.4 , pp. 40-44
    • Erickson, T.1    Halverson, C.2    Kellogg, W.A.3    Laff, M.4    Wolf, T.5
  • 27
    • 19944396962 scopus 로고    scopus 로고
    • Gramm-Leach-Bliley Act. 15 USC, Subchapter I, Sec. 6801-6809
    • Gramm-Leach-Bliley Act., 1999. 15 USC, Subchapter I, Sec. 6801-6809. Available from: http://www.ftc.gov/privacy/glbact/glbsub1.htm
    • (1999)
  • 29
    • 24944553842 scopus 로고    scopus 로고
    • A formal privacy system and its application to location based services
    • Paper presented at the Toronto, Canada
    • Gunter, C.A., May, M.J., Stubblebine, S.G., 2004. A formal privacy system and its application to location based services. Paper presented at the Workshop on Privacy Enhancing Technologies, Toronto, Canada.
    • (2004) Workshop on Privacy Enhancing Technologies
    • Gunter, C.A.1    May, M.J.2    Stubblebine, S.G.3
  • 30
    • 19944390811 scopus 로고    scopus 로고
    • Health Insurance Portability and Accountability Act 42 USC 201
    • Health Insurance Portability and Accountability Act, 1996. 42 USC 201. Available from: http://aspe.hhs.gov/admnsimp/pl104191.htm
    • (1996)
  • 32
    • 24944578141 scopus 로고    scopus 로고
    • IBM., 2003. Enterprise Privacy Authorization Language, available from: http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index. html
    • (2003) Enterprise Privacy Authorization Language
  • 33
    • 84937391117 scopus 로고    scopus 로고
    • Approximate information flows: Socially based modeling of privacy in ubiquitous computing
    • Paper presented at the Goteberg, Sweden
    • Jiang, X., Hong, J.I., Landay, J.A., 2002. Approximate information flows: socially based modeling of privacy in ubiquitous computing. Paper presented at the Fourth International Conference on Ubiquitous Computing, Goteberg, Sweden.
    • (2002) Fourth International Conference on Ubiquitous Computing
    • Jiang, X.1    Hong, J.I.2    Landay, J.A.3
  • 35
    • 15744379083 scopus 로고    scopus 로고
    • A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments
    • Computer Science Division, University of California, Berkley
    • Lederer, S., Dey, A.K., Mankoff, J., 2002. A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments (Technical Report UCB/CSD-2-1188): Computer Science Division, University of California, Berkley.
    • (2002) Technical Report , vol.UCB-CSD-2-1188
    • Lederer, S.1    Dey, A.K.2    Mankoff, J.3
  • 36
    • 85025461759 scopus 로고    scopus 로고
    • 2005, a focus on the mobile and wireless sector: Deloitte Research.
    • Lee, P., 2005. TMT Trends: Predictions, 2005, a focus on the mobile and wireless sector: Deloitte Research. Available from http://www.deloitte.com/dtt/ cda/doc/content/Mobile%20wireless_FINAL_01FEB05_LR_FA_LOCKED.pdf.
    • (2005) TMT Trends: Predictions
    • Lee, P.1
  • 38
    • 19944363997 scopus 로고    scopus 로고
    • Topiary: A tool for prototyping location-enhanced applications
    • Paper presented at the Santa Fe, New Mexico, 24-27 October
    • Li, Y., Hong, J.I., Landay, J.A., 2004. Topiary: a tool for prototyping location-enhanced applications. Paper presented at the UIST'04: Symposium on User Interface Software and Technology, Santa Fe, New Mexico, 24-27 October, pp. 217-226.
    • (2004) UIST'04: Symposium on User Interface Software and Technology , pp. 217-226
    • Li, Y.1    Hong, J.I.2    Landay, J.A.3
  • 41
    • 0001775576 scopus 로고
    • Heuristic Evaluation
    • J. Nielsen R.L. Mack Wiley New York
    • J. Nielsen Heuristic Evaluation J. Nielsen R.L. Mack Usability Inspection Methods 1994 Wiley New York
    • (1994) Usability Inspection Methods
    • Nielsen, J.1
  • 43
    • 19944393388 scopus 로고    scopus 로고
    • Consumer privacy attitudes: A major shift since 2000 and why
    • P&AB
    • P&AB Consumer privacy attitudes: a major shift since 2000 and why Privacy & American Business Newsletter 10 6 2003 23
    • (2003) Privacy & American Business Newsletter , vol.10 , Issue.6 , pp. 23
  • 44
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking "privacy" for a Networked World
    • L. Palen, and P. Dourish Unpacking "Privacy" for a Networked World CHI Letters (CHI 2003) 5 1 2003 129 136
    • (2003) CHI Letters (CHI 2003) , vol.5 , Issue.1 , pp. 129-136
    • Palen, L.1    Dourish, P.2
  • 45
    • 35048855200 scopus 로고    scopus 로고
    • Heuristic evaluation and mobile usability: Bridging the realism gap
    • Paper presented at the Glasgow, UK
    • Po, S., Howard, S., Vetere, F., Skov, M.B., 2004. Heuristic evaluation and mobile usability: bridging the realism gap. Paper presented at the MobileHCI 2004, Glasgow, UK, pp. 49-60.
    • (2004) MobileHCI 2004 , pp. 49-60
    • Po, S.1    Howard, S.2    Vetere, F.3    Skov, M.B.4
  • 46
    • 0038086632 scopus 로고
    • An economic theory of privacy
    • R. Posner An economic theory of privacy Regulation 1978 19 26
    • (1978) Regulation , pp. 19-26
    • Posner, R.1
  • 48
    • 33646522979 scopus 로고    scopus 로고
    • A document format for expressing privacy preferences for location information
    • November 28 The Internet Society. Retrieved 26 January, 2005
    • Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J., 2004, November 28. A document format for expressing privacy preferences for location information [Internet Draft]. The Internet Society. Retrieved 26 January, 2005, available from: http://www.ietf.org/internet-drafts/draft-ietf-geopriv-policy- 05.txt
    • (2004) Internet Draft
    • Schulzrinne, H.1    Tschofenig, H.2    Morris, J.3    Cuellar, J.4    Polk, J.5
  • 49
    • 0036005221 scopus 로고    scopus 로고
    • Toward a typology of internet users and online privacy concerns
    • K. Sheehan Toward a typology of internet users and online privacy concerns The Information Society 18 1 2002 21 32
    • (2002) The Information Society , vol.18 , Issue.1 , pp. 21-32
    • Sheehan, K.1
  • 51
    • 19944367443 scopus 로고    scopus 로고
    • The Moral of Santa's story
    • Sokol, D., 2004. The Moral of Santa's story. BBC News Magazine. Available from: http://news.bbc.co.uk/1/hi/magazine/4121991.stm
    • (2004) BBC News Magazine
    • Sokol, D.1
  • 53
    • 19944405611 scopus 로고    scopus 로고
    • Retrieved 29 March, 2005
    • TRUSTe.org., 2004. TRUSTe Home Page. Retrieved 29 March, 2005, available from: http://www.truste.org
    • (2004) TRUSTe Home Page
  • 54
    • 19944373576 scopus 로고
    • Video Privacy Protection Act 18 USC 2710
    • Video Privacy Protection Act, 1988. 18 USC 2710. Available from: http://www4.law.cornell.edu/uscode/18/2710.html
    • (1988)
  • 56
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Paper Presented at the Washington, DC
    • Whitten, A., Tygar, J.D., 1999. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Paper Presented at the Eighth USENIX Security Symposium, Washington, DC, pp. 169-184.
    • (1999) Eighth USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 57
    • 85001837279 scopus 로고    scopus 로고
    • Semiautomatic derivation and use of personal privacy policies in e-business
    • G. Yee, and L. Korba Semiautomatic derivation and use of personal privacy policies in e-business International Journal of E-Business Research 1 1 2005 54 69
    • (2005) International Journal of E-Business Research , vol.1 , Issue.1 , pp. 54-69
    • Yee, G.1    Korba, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.