2005
DOI: 10.1016/j.ijhcs.2005.04.008
|View full text |Cite
|
Sign up to set email alerts
|

Keeping ubiquitous computing to yourself: A practical model for user control of privacy

Abstract: As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(50 citation statements)
references
References 23 publications
0
50
0
Order By: Relevance
“…The term plausible deniability has been often used (e.g., see [3], [1]) to describe how users of communication systems may rely on ambiguity in order to have a plausible excuse for avoiding communication or interaction with a third party.…”
Section: Plausible Deniabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…The term plausible deniability has been often used (e.g., see [3], [1]) to describe how users of communication systems may rely on ambiguity in order to have a plausible excuse for avoiding communication or interaction with a third party.…”
Section: Plausible Deniabilitymentioning
confidence: 99%
“…Price et al [3] explore the social need for plausible deniability in ubicomp systems and in relation with one's location and identity. As they point out, many systems depart from social norms that are otherwise present in face-to-face interactions (where a person can easily see whether he/she is being observed by others).…”
Section: Plausible Deniabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Should a system ask for confirmation before it autonomously adapts? Several studies addressed these questions, finding that indeed the desire for user control limits the acceptance of autonomy [24][25][26], which means there is a delicate balance between automation/autonomous behavior and user control. We want to know how this intervenes with the interpretation and perception of adaptivity by our target group of aging adults.…”
Section: Introductionmentioning
confidence: 99%
“…As this emerging technology moves to multi-application, enterprise-wide deployments, RFID readers could become the most numerous and densely deployed network devices, with both positive and negative ramifications. Item-level traceability can reveal new information about shoppers' interests and behaviors and increase organizations' monitoring capabilities (Price et al 2005), extending the literature on ubiquitous computing and networked organizations. At the same time, ubiquitous RFID gives rise to privacy concerns (Shapiro and Baker 2001;Spiekermann and Ziekow 2006) and suggests investigating the counterintuitive, adverse behavioral effects (Scheepers et al 2006) more fully.…”
Section: Conceptual Trajectoriesmentioning
confidence: 90%