메뉴 건너뛰기




Volumn 12, Issue 8, 2008, Pages 543-553

Understanding privacy regulation in ubicomp interactions

Author keywords

Personal privacy; Privacy regulation; Ubiquitous computing

Indexed keywords

CODES (SYMBOLS);

EID: 53449089315     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-007-0163-2     Document Type: Article
Times cited : (20)

References (30)
  • 6
    • 0010602271 scopus 로고    scopus 로고
    • System software for ubiquitous computing
    • Kindberg T, Fox A (2002) System software for ubiquitous computing. Pervasive Comput 1(1):70-81
    • (2002) Pervasive Comput , vol.1 , Issue.1 , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 8
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75-84
    • (1993) Commun ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 9
    • 84900540372 scopus 로고    scopus 로고
    • Evolution towards smart home environments: Empirical evaluation of three user interfaces
    • Koskela T, Väänänen-Vainio-Mattila K (2004) Evolution towards smart home environments: Empirical evaluation of three user interfaces. PUC 8(3-4):234-240
    • (2004) PUC , vol.8 , Issue.3-4 , pp. 234-240
    • Koskela, T.1    Väänänen-Vainio-Mattila, K.2
  • 14
    • 7644223159 scopus 로고    scopus 로고
    • Maintaining privacy in pervasive computing - Enabling acceptance of sensor-based services
    • Soppera A, Burbridge T (2004) Maintaining privacy in pervasive computing - enabling acceptance of sensor-based services. BT Technol J 22(3):106-118
    • (2004) BT Technol J , vol.22 , Issue.3 , pp. 106-118
    • Soppera, A.1    Burbridge, T.2
  • 16
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237-245
    • (2002) Proceedings of UbiComp 2002 , pp. 237-245
    • Langheinrich, M.1
  • 17
    • 34147215372 scopus 로고    scopus 로고
    • Murky conceptual waters: The public and the private
    • Marx GT (2001) Murky conceptual waters: The public and the private. Ethics Inf Technol 3(3):157-169
    • (2001) Ethics Inf Technol , vol.3 , Issue.3 , pp. 157-169
    • Marx, G.T.1
  • 18
    • 0002131454 scopus 로고
    • Design for privacy in ubiquitous computing environments
    • Bellotti V, Sellen A (1993) Design for privacy in ubiquitous computing environments. In: Proceedings of ECSCW 1993, pp 77-92
    • (1993) Proceedings of ECSCW 1993 , pp. 77-92
    • Bellotti, V.1    Sellen, A.2
  • 19
    • 19944372788 scopus 로고    scopus 로고
    • Keeping ubiquitous computing to yourself: A practical model for user control of privacy
    • Price B, Adam K, Nuseibeh B (2005) Keeping ubiquitous computing to yourself: A practical model for user control of privacy. Int J Hum Comput Stud 228-253
    • (2005) Int J Hum Comput Stud , pp. 228-253
    • Price, B.1    Adam, K.2    Nuseibeh, B.3
  • 20
    • 0033279226 scopus 로고    scopus 로고
    • Taming the wolf in sheep's clothing: Privacy in multimedia communications
    • Adams A, Sasse MA (1999) Taming the wolf in sheep's clothing: Privacy in multimedia communications. In: Proceedings of ACM Multimedia 1999, pp 101-107
    • (1999) Proceedings of ACM Multimedia 1999 , pp. 101-107
    • Adams, A.1    Sasse, M.A.2
  • 23
    • 84937391117 scopus 로고    scopus 로고
    • Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
    • Jiang X, Hong JI, Landay JA (2002) Approximate information flows: socially-based modeling of privacy in ubiquitous computing. In: Proceedings of UbiComp 2002, pp 176-1993
    • (2002) Proceedings of UbiComp 2002 , pp. 176-1993
    • Jiang, X.1    Hong, J.I.2    Landay, J.A.3
  • 25
    • 53449098946 scopus 로고    scopus 로고
    • The architecture of privacy
    • In Available online at Last checked Oct 3, 2005
    • Lessig L (2005) The architecture of privacy. In: Proceedings of Taiwan NET 1998. Available online at http://www.lessig.org/content/articles/ works/architecture_priv.pdf. Last checked Oct 3, 2005
    • (2005) Proceedings of Taiwan NET 1998
    • Lessig, L.1
  • 27
    • 0346869574 scopus 로고    scopus 로고
    • Designing for ubiquity: The perception of privacy
    • Beckwith R (2003) Designing for ubiquity: The perception of privacy. Pervasive Comput 40-46
    • (2003) Pervasive Comput , pp. 40-46
    • Beckwith, R.1
  • 29
    • 84990563923 scopus 로고
    • Communication boundary management: A theoretical model of managing disclosure of private information between marital couples
    • Petronio S (1991) Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Commun Theory 1:311-335
    • (1991) Commun Theory , vol.1 , pp. 311-335
    • Petronio, S.1
  • 30
    • 84900830868 scopus 로고    scopus 로고
    • Understanding and using context
    • Dey KA (2001) Understanding and using context. Personal Ubiquitous Comput J 5(1):4-7
    • (2001) Personal Ubiquitous Comput J , vol.5 , Issue.1 , pp. 4-7
    • Dey, K.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.