메뉴 건너뛰기




Volumn 19, Issue 2, 2009, Pages 194-208

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions

Author keywords

Computer networks; Data security; Intelligence; Privacy

Indexed keywords


EID: 67649510567     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/10662240910952346     Document Type: Article
Times cited : (27)

References (29)
  • 2
    • 0346869574 scopus 로고    scopus 로고
    • Designing for ubiquity: The perception of privacy
    • Beckwith, R. (2003), "Designing for ubiquity: the perception of privacy", IEEE Pervasive Computing, Vol. 3 No. 2, pp. 40-6.
    • (2003) IEEE Pervasive Computing , vol.3 , Issue.2 , pp. 40-46
    • Beckwith, R.1
  • 3
    • 24644466489 scopus 로고    scopus 로고
    • If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy
    • Bonner, W. and Chiasson, M. (2005), "If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy", Information and Organization, Vol. 15 No. 4, pp. 267-93.
    • (2005) Information and Organization , vol.15 , Issue.4 , pp. 267-293
    • Bonner, W.1    Chiasson, M.2
  • 4
    • 33646907615 scopus 로고    scopus 로고
    • Freedom and privacy in ambient intelligence
    • Brey, P. (2005), "Freedom and privacy in ambient intelligence", Ethics and Information Technology, Vol. 7 No. 3, pp. 157-66.
    • (2005) Ethics and Information Technology , vol.7 , Issue.3 , pp. 157-166
    • Brey, P.1
  • 5
    • 17444413736 scopus 로고    scopus 로고
    • Privacy in pervasive computing environments: A contradiction in terms?
    • Cas, J. (2005), "Privacy in pervasive computing environments: a contradiction in terms?", IEEE Technology and Society Magazine, Vol. 24 No. 1, pp. 24-33.
    • (2005) IEEE Technology and Society Magazine , vol.24 , Issue.1 , pp. 24-33
    • Cas, J.1
  • 6
    • 46949108851 scopus 로고    scopus 로고
    • The failure of fair information practice principles
    • Winn, J.K, Ed, Ashgate, Aldershot
    • Cate, F.H. (2006), "The failure of fair information practice principles", in Winn, J.K. (Ed.), Consumer Protection in the Age of the Information Economy, Ashgate, Aldershot.
    • (2006) Consumer Protection in the Age of the Information Economy
    • Cate, F.H.1
  • 7
    • 67649474005 scopus 로고    scopus 로고
    • Center for Democracy and Technology , available at:, accessed 13 August 2008
    • Center for Democracy and Technology (2000), "Fair information practices", available at: www. cdt.org/privacy/guide/basic/fips.html (accessed 13 August 2008).
    • (2000) Fair information practices
  • 8
    • 84937407855 scopus 로고    scopus 로고
    • Perceptual components for context aware computing
    • Proceedings of Ubicomp, Springer, New York, NY
    • Crowley, J.L., Coutaz, J., Rey, G. and Reignier, P. (2002), "Perceptual components for context aware computing", Proceedings of Ubicomp, LNCS, Springer, New York, NY.
    • (2002) LNCS
    • Crowley, J.L.1    Coutaz, J.2    Rey, G.3    Reignier, P.4
  • 9
    • 38349051248 scopus 로고    scopus 로고
    • Interdisciplinary Centre for Law and ICT ICRI, K.U. Leuven, December, available at:, accessed 13 August 2008
    • Dumortier, J. and Goemans, C. (2002), "Roadmap for European legal research in privacy and identity management", Interdisciplinary Centre for Law and ICT (ICRI), K.U. Leuven, December, available at: www.law.kuleuven.be/ icri/publications/421rapid.pdf (accessed 13 August 2008).
    • (2002) Roadmap for European legal research in privacy and identity management
    • Dumortier, J.1    Goemans, C.2
  • 10
    • 4243355127 scopus 로고
    • Directive 95/46/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Parliament , /, 23 November
    • European Parliament (1995), "Directive 95/46/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal of the European Communities, L281/31, 23 November.
    • (1995) Official Journal of the European Communities
  • 11
    • 15744397558 scopus 로고    scopus 로고
    • Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environment
    • Man and Cybernetics, IEEE Press, Piscataway, NJ
    • Eymann, T. and Morito, H. (2004), "Privacy issues of combining ubiquitous computing and software agent technology in a life-critical environment", Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics, IEEE Press, Piscataway, NJ.
    • (2004) Proceedings of the 2004 IEEE International Conference on Systems
    • Eymann, T.1    Morito, H.2
  • 12
    • 67649459638 scopus 로고    scopus 로고
    • FTD , available at:, accessed 13 August 2008
    • FTD (1998), "Privacy online: a report to congress", Federal Trade Commission, available at: www.ftc.gov/reports/privacy3/priv-23a.pdf (accessed 13 August 2008).
    • (1998) Privacy online: A report to congress
  • 13
    • 9244222724 scopus 로고    scopus 로고
    • Enhancing web privacy and anonymity in the digital era
    • Gritzalis, S. (2004), "Enhancing web privacy and anonymity in the digital era", Information Management and Computer Security, Vol. 12 No. 3, pp. 255-88.
    • (2004) Information Management and Computer Security , vol.12 , Issue.3 , pp. 255-288
    • Gritzalis, S.1
  • 15
    • 0010337637 scopus 로고    scopus 로고
    • ISTAG , European Commission Community Research, IST Advisory Group, available at:, accessed 13 August 2008
    • ISTAG (2001), "Scenarios for ambient intelligence in 2010", European Commission Community Research, IST Advisory Group, available at: www.cordis.lu/ist/istag.htm (accessed 13 August 2008).
    • (2001) Scenarios for ambient intelligence in 2010
  • 16
    • 84937391117 scopus 로고    scopus 로고
    • Approximate information flows: Socially based modeling of privacy in ubiquitous computing
    • Proceedings of the 4th International Conference on Ubiquitous Computing, Springer, New York, NY, pp
    • Jiang, X., Hong, J.I. and Landay, J.A. (2002), "Approximate information flows: socially based modeling of privacy in ubiquitous computing", Proceedings of the 4th International Conference on Ubiquitous Computing, LNCS 2498, Springer, New York, NY, pp. 176-93.
    • (2002) LNCS , vol.2498 , pp. 176-193
    • Jiang, X.1    Hong, J.I.2    Landay, J.A.3
  • 17
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through pseudonymity in user-adaptive systems
    • Kobsa, A. and Schreck, J. (2003), "Privacy through pseudonymity in user-adaptive systems", ACM Transactions on Internet Technology, Vol. 3 No. 2, pp. 149-83.
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.2 , pp. 149-183
    • Kobsa, A.1    Schreck, J.2
  • 18
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design: Principles of privacy-aware ubiquitous systems
    • Abowd, G, Brumitt, B. and Shafer, S, Eds, Proceedings of Ubicomp 2001, Springer, New York, NY, pp
    • Langheinrich, M. (2001), "Privacy by design: principles of privacy-aware ubiquitous systems", in Abowd, G., Brumitt, B. and Shafer, S. (Eds), Proceedings of Ubicomp 2001, LNCS 2201, Springer, New York, NY, pp. 273-91.
    • (2001) LNCS , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 19
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • Proceedings of Ubicomp, Springer, pp
    • Langheinrich, M. (2002), "A privacy awareness system for ubiquitous computing environments", Proceedings of Ubicomp, LNCS 2498, Springer, pp. 237-45.
    • (2002) LNCS , vol.2498 , pp. 237-245
    • Langheinrich, M.1
  • 20
    • 32844470950 scopus 로고    scopus 로고
    • Regulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada
    • Lasprogata, G., King, N. and Pillay, S. (2004), "Regulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada", Stanford Technology Law Review, Vol. 4.
    • (2004) Stanford Technology Law Review , vol.4
    • Lasprogata, G.1    King, N.2    Pillay, S.3
  • 21
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Myles, G., Friday, A. and Davies, N. (2003), "Preserving privacy in environments with location-based applications", IEEE Pervasive Computing, Vol. 2 No. 1, pp. 56-64.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 24
    • 62349096120 scopus 로고    scopus 로고
    • Ambient intelligence: The MyCampus experience
    • Vasilakos, T. and Pedrycz, W, Eds, Artech House, Norwood, MA
    • Sadeh, N., Gandon, F. and Kwon, O. (2006), "Ambient intelligence: the MyCampus experience", in Vasilakos, T. and Pedrycz, W. (Eds), Ambient Intelligence and Pervasive Computing, Artech House, Norwood, MA.
    • (2006) Ambient Intelligence and Pervasive Computing
    • Sadeh, N.1    Gandon, F.2    Kwon, O.3
  • 27
    • 67649486928 scopus 로고    scopus 로고
    • W3C (2001), The platform for privacy preferences 1.0 (P3P1.0) specification, World Wide Web Consortium, available at: www.w3.org/P3P/ (accessed 13 August 2008).
    • W3C (2001), "The platform for privacy preferences 1.0 (P3P1.0) specification", World Wide Web Consortium, available at: www.w3.org/P3P/ (accessed 13 August 2008).
  • 28
    • 0001853125 scopus 로고
    • The computer for the twenty-first century
    • Weiser, M. (1991), "The computer for the twenty-first century", Scientific American, Vol. 165 No. 3, pp. 94-104.
    • (1991) Scientific American , vol.165 , Issue.3 , pp. 94-104
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.