메뉴 건너뛰기




Volumn , Issue , 2011, Pages 11-20

Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment

Author keywords

Information disclosure; Mobile health; Privacy; User study; Wearable sensors

Indexed keywords

BEHAVIORAL RESEARCH; HEALTH RISKS; MHEALTH;

EID: 79958120360     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1978942.1978945     Document Type: Conference Paper
Times cited : (133)

References (36)
  • 4
    • 2342484676 scopus 로고    scopus 로고
    • Location-based services for mobile telephony: A study of users' privacy concerns
    • L. Barkhuus and A. Dey. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. In Proc. Interact, 2003.
    • (2003) Proc. Interact
    • Barkhuus, L.1    Dey, A.2
  • 5
    • 78650014112 scopus 로고    scopus 로고
    • Exploring end user preferences for location obfuscation, location-based services, and the value of location
    • A. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In ACM UbiComp, pages 95-104, 2010.
    • (2010) ACM UbiComp , pp. 95-104
    • Brush, A.1    Krumm, J.2    Scott, J.3
  • 6
    • 78650021719 scopus 로고    scopus 로고
    • The wi-fi privacy ticker: Improving awareness & control of personal information exposure on wi-fi
    • S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis, and D. Avrahami. The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi. In ACM UbiComp, pages 321-330, 2010.
    • (2010) ACM UbiComp , pp. 321-330
    • Consolvo, S.1    Jung, J.2    Greenstein, B.3    Powledge, P.4    Maganis, G.5    Avrahami, D.6
  • 9
    • 0003461406 scopus 로고    scopus 로고
    • Towards a better understanding of context and context-awareness
    • A. Dey and G. Abowd. Towards a Better Understanding of Context and Context-Awareness. In ACM SIGCHI workshop, 2000.
    • (2000) ACM SIGCHI Workshop
    • Dey, A.1    Abowd, G.2
  • 11
    • 84866489655 scopus 로고    scopus 로고
    • PoolView: Stream privacy for grassroots participatory sensing
    • R. Ganti, N. Pham, Y. Tsai, and T. Abdelzaher. PoolView: Stream Privacy for Grassroots Participatory Sensing. In ACM SenSys, 2008.
    • (2008) ACM SenSys
    • Ganti, R.1    Pham, N.2    Tsai, Y.3    Abdelzaher, T.4
  • 12
  • 14
    • 84861294968 scopus 로고    scopus 로고
    • Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing
    • CHI 2005: Technology, Safety, Community: Conference Proceedings - Conference on Human Factors in Computing Systems
    • G. Iachello and G. Abowd. Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In ACM SIGCHI, pages 91-100, 2005. (Pubitemid 41809046)
    • (2005) Conference on Human Factors in Computing Systems - Proceedings , pp. 91-100
    • Iachello, G.1    Abowd, G.D.2
  • 16
    • 46949103941 scopus 로고    scopus 로고
    • Privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring, the
    • W. Karim. Privacy Implications of Personal Locators: Why You Should Think Twice before Voluntarily Availing Yourself to GPS Monitoring, The. Wash. UJL & Pol'y, 14, 2004.
    • Wash. UJL & Pol'y , vol.14 , pp. 2004
    • Karim, W.1
  • 19
    • 59249083345 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • J. Krumm. Inference Attacks on Location Tracks. Pervasive Computing, 2007.
    • (2007) Pervasive Computing
    • Krumm, J.1
  • 21
    • 35448965488 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE ICDE, 2007.
    • (2007) IEEE ICDE
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 29
  • 30
    • 10844259286 scopus 로고    scopus 로고
    • Unpacking privacy for a networked world
    • L. Palen and P. Dourish. Unpacking Privacy for a Networked World. In ACM SIGCHI, 2003.
    • (2003) ACM SIGCHI
    • Palen, L.1    Dourish, P.2
  • 31
    • 79953085999 scopus 로고    scopus 로고
    • Who gets to know what when: Configuring privacy permissions in an awareness application
    • S. Patil and J. Lai. Who gets to know what when: configuring privacy permissions in an awareness application. In ACM SIGCHI, 2005.
    • (2005) ACM SIGCHI
    • Patil, S.1    Lai, J.2
  • 34
    • 77953097167 scopus 로고    scopus 로고
    • Generating default privacy policies for online social networks
    • E. Toch, N. Sadeh, and J. Hong. Generating default privacy policies for online social networks. In ACM SIGCHI extended abstracts, pages 4243-4248, 2010.
    • (2010) ACM SIGCHI Extended Abstracts , pp. 4243-4248
    • Toch, E.1    Sadeh, N.2    Hong, J.3
  • 35
    • 79958134111 scopus 로고    scopus 로고
    • Who's viewed you?: The impact of feedback in a mobile location-sharing application
    • J. Tsai, P. Kelley, P. Drielsma, L. Cranor, J. Hong, and N. Sadeh. Who's viewed you?: the impact of feedback in a mobile location-sharing application. In ACM SIGCHI, 2009.
    • (2009) ACM SIGCHI
    • Tsai, J.1    Kelley, P.2    Drielsma, P.3    Cranor, L.4    Hong, J.5    Sadeh, N.6
  • 36
    • 79958086482 scopus 로고    scopus 로고
    • Zephyr Technology. BioHarness BT. http://www.zephyr-technology.com/ bioharness-bt.html.
    • BioHarness BT


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.