-
2
-
-
0346869574
-
Designing for ubiquity: The perception of privacy
-
Beckwith, R. (2003), "Designing for ubiquity: the perception of privacy", IEEE Pervasive Computing, Vol. 3 No. 2, pp. 40-6.
-
(2003)
IEEE Pervasive Computing
, vol.3
, Issue.2
, pp. 40-46
-
-
Beckwith, R.1
-
3
-
-
24644466489
-
If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy
-
Bonner, W. and Chiasson, M. (2005), "If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy", Information and Organization, Vol. 15 No. 4, pp. 267-93.
-
(2005)
Information and Organization
, vol.15
, Issue.4
, pp. 267-293
-
-
Bonner, W.1
Chiasson, M.2
-
4
-
-
33646907615
-
Freedom and privacy in ambient intelligence
-
Brey, P. (2005), "Freedom and privacy in ambient intelligence", Ethics and Information Technology, Vol. 7 No. 3, pp. 157-66.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.3
, pp. 157-166
-
-
Brey, P.1
-
5
-
-
17444413736
-
Privacy in pervasive computing environments: A contradiction in terms?
-
Cas, J. (2005), "Privacy in pervasive computing environments: a contradiction in terms?", IEEE Technology and Society Magazine, Vol. 24 No. 1, pp. 24-33.
-
(2005)
IEEE Technology and Society Magazine
, vol.24
, Issue.1
, pp. 24-33
-
-
Cas, J.1
-
6
-
-
46949108851
-
The failure of fair information practice principles
-
Winn, J.K, Ed, Ashgate, Aldershot
-
Cate, F.H. (2006), "The failure of fair information practice principles", in Winn, J.K. (Ed.), Consumer Protection in the Age of the Information Economy, Ashgate, Aldershot.
-
(2006)
Consumer Protection in the Age of the Information Economy
-
-
Cate, F.H.1
-
7
-
-
67649474005
-
-
Center for Democracy and Technology , available at:, accessed 13 August 2008
-
Center for Democracy and Technology (2000), "Fair information practices", available at: www. cdt.org/privacy/guide/basic/fips.html (accessed 13 August 2008).
-
(2000)
Fair information practices
-
-
-
8
-
-
84937407855
-
Perceptual components for context aware computing
-
Proceedings of Ubicomp, Springer, New York, NY
-
Crowley, J.L., Coutaz, J., Rey, G. and Reignier, P. (2002), "Perceptual components for context aware computing", Proceedings of Ubicomp, LNCS, Springer, New York, NY.
-
(2002)
LNCS
-
-
Crowley, J.L.1
Coutaz, J.2
Rey, G.3
Reignier, P.4
-
9
-
-
38349051248
-
-
Interdisciplinary Centre for Law and ICT ICRI, K.U. Leuven, December, available at:, accessed 13 August 2008
-
Dumortier, J. and Goemans, C. (2002), "Roadmap for European legal research in privacy and identity management", Interdisciplinary Centre for Law and ICT (ICRI), K.U. Leuven, December, available at: www.law.kuleuven.be/ icri/publications/421rapid.pdf (accessed 13 August 2008).
-
(2002)
Roadmap for European legal research in privacy and identity management
-
-
Dumortier, J.1
Goemans, C.2
-
10
-
-
4243355127
-
Directive 95/46/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament , /, 23 November
-
European Parliament (1995), "Directive 95/46/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal of the European Communities, L281/31, 23 November.
-
(1995)
Official Journal of the European Communities
-
-
-
11
-
-
15744397558
-
Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environment
-
Man and Cybernetics, IEEE Press, Piscataway, NJ
-
Eymann, T. and Morito, H. (2004), "Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environment", Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics, IEEE Press, Piscataway, NJ.
-
(2004)
Proceedings of the 2004 IEEE International Conference on Systems
-
-
Eymann, T.1
Morito, H.2
-
12
-
-
67649459638
-
-
FTD , available at:, accessed 13 August 2008
-
FTD (1998), "Privacy online: a report to congress", Federal Trade Commission, available at: www.ftc.gov/reports/privacy3/priv-23a.pdf (accessed 13 August 2008).
-
(1998)
Privacy online: A report to congress
-
-
-
13
-
-
9244222724
-
Enhancing web privacy and anonymity in the digital era
-
Gritzalis, S. (2004), "Enhancing web privacy and anonymity in the digital era", Information Management and Computer Security, Vol. 12 No. 3, pp. 255-88.
-
(2004)
Information Management and Computer Security
, vol.12
, Issue.3
, pp. 255-288
-
-
Gritzalis, S.1
-
14
-
-
79960359586
-
Online information privacy: Measuring the cost-benefit trade-off
-
ACM Press, New York, NY
-
Hann, I., Hui, K., Lee, T. and Png, I. (2002), "Online information privacy: measuring the cost-benefit trade-off", Proceedings of the 23rd International Conference on Information Systems, ACM Press, New York, NY.
-
(2002)
Proceedings of the 23rd International Conference on Information Systems
-
-
Hann, I.1
Hui, K.2
Lee, T.3
Png, I.4
-
15
-
-
0010337637
-
-
ISTAG , European Commission Community Research, IST Advisory Group, available at:, accessed 13 August 2008
-
ISTAG (2001), "Scenarios for ambient intelligence in 2010", European Commission Community Research, IST Advisory Group, available at: www.cordis.lu/ist/istag.htm (accessed 13 August 2008).
-
(2001)
Scenarios for ambient intelligence in 2010
-
-
-
16
-
-
84937391117
-
Approximate information flows: Socially based modeling of privacy in ubiquitous computing
-
Proceedings of the 4th International Conference on Ubiquitous Computing, Springer, New York, NY, pp
-
Jiang, X., Hong, J.I. and Landay, J.A. (2002), "Approximate information flows: socially based modeling of privacy in ubiquitous computing", Proceedings of the 4th International Conference on Ubiquitous Computing, LNCS 2498, Springer, New York, NY, pp. 176-93.
-
(2002)
LNCS
, vol.2498
, pp. 176-193
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.A.3
-
17
-
-
85016682337
-
Privacy through pseudonymity in user-adaptive systems
-
Kobsa, A. and Schreck, J. (2003), "Privacy through pseudonymity in user-adaptive systems", ACM Transactions on Internet Technology, Vol. 3 No. 2, pp. 149-83.
-
(2003)
ACM Transactions on Internet Technology
, vol.3
, Issue.2
, pp. 149-183
-
-
Kobsa, A.1
Schreck, J.2
-
18
-
-
84945556728
-
Privacy by design: Principles of privacy-aware ubiquitous systems
-
Abowd, G, Brumitt, B. and Shafer, S, Eds, Proceedings of Ubicomp 2001, Springer, New York, NY, pp
-
Langheinrich, M. (2001), "Privacy by design: principles of privacy-aware ubiquitous systems", in Abowd, G., Brumitt, B. and Shafer, S. (Eds), Proceedings of Ubicomp 2001, LNCS 2201, Springer, New York, NY, pp. 273-91.
-
(2001)
LNCS
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
19
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Proceedings of Ubicomp, Springer, pp
-
Langheinrich, M. (2002), "A privacy awareness system for ubiquitous computing environments", Proceedings of Ubicomp, LNCS 2498, Springer, pp. 237-45.
-
(2002)
LNCS
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
20
-
-
32844470950
-
Regulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada
-
Lasprogata, G., King, N. and Pillay, S. (2004), "Regulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada", Stanford Technology Law Review, Vol. 4.
-
(2004)
Stanford Technology Law Review
, vol.4
-
-
Lasprogata, G.1
King, N.2
Pillay, S.3
-
21
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Myles, G., Friday, A. and Davies, N. (2003), "Preserving privacy in environments with location-based applications", IEEE Pervasive Computing, Vol. 2 No. 1, pp. 56-64.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
24
-
-
62349096120
-
Ambient intelligence: The MyCampus experience
-
Vasilakos, T. and Pedrycz, W, Eds, Artech House, Norwood, MA
-
Sadeh, N., Gandon, F. and Kwon, O. (2006), "Ambient intelligence: the MyCampus experience", in Vasilakos, T. and Pedrycz, W. (Eds), Ambient Intelligence and Pervasive Computing, Artech House, Norwood, MA.
-
(2006)
Ambient Intelligence and Pervasive Computing
-
-
Sadeh, N.1
Gandon, F.2
Kwon, O.3
-
27
-
-
67649486928
-
-
W3C (2001), The platform for privacy preferences 1.0 (P3P1.0) specification, World Wide Web Consortium, available at: www.w3.org/P3P/ (accessed 13 August 2008).
-
W3C (2001), "The platform for privacy preferences 1.0 (P3P1.0) specification", World Wide Web Consortium, available at: www.w3.org/P3P/ (accessed 13 August 2008).
-
-
-
-
28
-
-
0001853125
-
The computer for the twenty-first century
-
Weiser, M. (1991), "The computer for the twenty-first century", Scientific American, Vol. 165 No. 3, pp. 94-104.
-
(1991)
Scientific American
, vol.165
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
|