-
1
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A., and Stajano, F. 2003. Location privacy in pervasive computing. IEEE Pervasive Computing 2(1):46-55.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
3
-
-
70450161983
-
A spotlight on security and privacy risks with future household robots
-
New York, NY, USA: ACM
-
Denning, T.; Matuszek, C.; Koscher, K.; Smith, J. R.; and Kohno, T. 2009. A spotlight on security and privacy risks with future household robots. In Proc. of the IIth Intl. Conference on Ubiquitous Computing, 105-114. New York, NY, USA: ACM.
-
(2009)
Proc. of the IIth Intl. Conference on Ubiquitous Computing
, pp. 105-114
-
-
Denning, T.1
Matuszek, C.2
Koscher, K.3
Smith, J.R.4
Kohno, T.5
-
4
-
-
67650337204
-
Legal safeguards for privacy and data protection in ambient intelligence
-
Hert, P.; Gutwirth, S.; Moscibroda, A.; Wright, D.; and González Fuster, G. 2009. Legal safeguards for privacy and data protection in ambient intelligence. Personal Ubiquitous Computing 13(6):435-444.
-
(2009)
Personal Ubiquitous Computing
, vol.13
, Issue.6
, pp. 435-444
-
-
Hert, P.1
Gutwirth, S.2
Moscibroda, A.3
Wright, D.4
González Fuster, G.5
-
5
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
Boston, USA: ACM
-
Hong, J. I., and Landay, J. A. 2004. An architecture for privacy-sensitive ubiquitous computing. In Proc. of the 2nd Intl. Conference on Mobile Systems, Applications, and Services, 177-189. Boston, USA: ACM.
-
(2004)
Proc. of the 2nd Intl. Conference on Mobile Systems, Applications, and Services
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
6
-
-
84937391117
-
Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
-
Springer
-
Jiang, X.; Hong, J.; and Landay, J. 2002. Approximate information flows: Socially-Based modeling of privacy in ubiquitous computing. In Proc. of the 4th Intl. Conference on Ubiquitous Computing, 176-193. Springer.
-
(2002)
Proc. of the 4th Intl. Conference on Ubiquitous Computing
, pp. 176-193
-
-
Jiang, X.1
Hong, J.2
Landay, J.3
-
7
-
-
67650320950
-
A survey of computational location privacy
-
Krumm, J. 2008. A survey of computational location privacy. Personal and Ubiquitous Computing 13(6):391-399.
-
(2008)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
8
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
London, UK: Springer
-
Langheinrich, M. 2001. Privacy by design - principles of Privacy-Aware ubiquitous systems. In Proc. of the 3rd Intl. Conference on Ubiquitous Computing, 273-291. London, UK: Springer.
-
(2001)
Proc. of the 3rd Intl. Conference on Ubiquitous Computing
, pp. 273-291
-
-
Langheinrich, M.1
-
9
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
London, UK: Springer
-
Langheinrich, M. 2002. A privacy awareness system for ubiquitous computing environments. In Proc. of the 4th Intl. Conference on Ubiquitous Computing. London, UK: Springer. 237-245.
-
(2002)
Proc. of the 4th Intl. Conference on Ubiquitous Computing
, pp. 237-245
-
-
Langheinrich, M.1
-
10
-
-
34147215372
-
Murky conceptual waters: The public and the private
-
Marx, G. T. 2001. Murky conceptual waters: The public and the private. Ethics and Information Technology 3(3): 157-169.
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.3
, pp. 157-169
-
-
Marx, G.T.1
-
12
-
-
2942642938
-
Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives
-
Stanton, J. M., and Stam, K. R. 2003. Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveillance & Society 1(2):152-190.
-
(2003)
Surveillance & Society
, vol.1
, Issue.2
, pp. 152-190
-
-
Stanton, J.M.1
Stam, K.R.2
-
14
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
Weiser, M. 1993. Some computer science issues in ubiquitous computing. Communications of the ACM 36(7):75-84.
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
|