2007
DOI: 10.1016/j.tele.2005.12.005
|View full text |Cite
|
Sign up to set email alerts
|

Privacy, identity and security in ambient intelligence: A scenario analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(51 citation statements)
references
References 16 publications
0
43
0
1
Order By: Relevance
“…The presentation of results therefore focuses on the authors' analysis and interpretation of the literature. Fellbaum, 2008;Friedewald, Vildjiounaite, Punie & Wright, 2007;Gammon, Christiansen & Wynn, 2009;Kosta, Pitkänen, Niemelä & Kaasinen, 2010;Kovach, Aubrecht, Dew, Myers & Dabbs, 2011;Lauriks, Reinersmann, Van der Roest, Meiland, Davies, Moelaert et al 2007;Melander-Wikman, Jansson, Hallberg, Mörtberg & Gard, 2007;Monahan & Wall, 2007;A. Nordgren, 2012;Anders Nordgren, 2013;Palm, Nordgren, Verweij & Collste, 2012;Pentland, 2009;Rigby, 2007;Robinson, Hutchings, Corner, Finch, Hughes, Brittain & Bond, 2007;Ziefle & Röcker, 2010, 2010 Environmental Monitors (n = 45) Devices and sensors embedded in an environment, such as a home, vehicle, or workplace, or a stationary medical appliance.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The presentation of results therefore focuses on the authors' analysis and interpretation of the literature. Fellbaum, 2008;Friedewald, Vildjiounaite, Punie & Wright, 2007;Gammon, Christiansen & Wynn, 2009;Kosta, Pitkänen, Niemelä & Kaasinen, 2010;Kovach, Aubrecht, Dew, Myers & Dabbs, 2011;Lauriks, Reinersmann, Van der Roest, Meiland, Davies, Moelaert et al 2007;Melander-Wikman, Jansson, Hallberg, Mörtberg & Gard, 2007;Monahan & Wall, 2007;A. Nordgren, 2012;Anders Nordgren, 2013;Palm, Nordgren, Verweij & Collste, 2012;Pentland, 2009;Rigby, 2007;Robinson, Hutchings, Corner, Finch, Hughes, Brittain & Bond, 2007;Ziefle & Röcker, 2010, 2010 Environmental Monitors (n = 45) Devices and sensors embedded in an environment, such as a home, vehicle, or workplace, or a stationary medical appliance.…”
Section: Resultsmentioning
confidence: 99%
“…Nordgren, 2012;Anders Nordgren, 2013;Palm, Nordgren, Verweij & Collste, 2012;Pentland, 2009;Rigby, 2007;Robinson, Hutchings, Corner, Finch, Hughes, Brittain & Bond, 2007;Ziefle & Röcker, 2010, 2010 Environmental Monitors (n = 45) Devices and sensors embedded in an environment, such as a home, vehicle, or workplace, or a stationary medical appliance. Agree, Freedman, Cornman, Wolf & Marcotte, 2005;Bowes, Dawson & Bell, 2012;Brey, 2005;Courtney, Demiris & Hensel, 2007;Courtney, 2008;Courtney, Demiris, Rantz & Skubic, 2008;Demiris, 2009;Demiris, Oliver, Dickey, Skubic & Rantz, 2008;Ding, Cooper, Pasquina & Fici-Pasquina, 2011;Dorsten, Sifford, Bharucha, Mecca & Wactlar, 2009;Essén, 2008;Fellbaum, 2008;Friedewald, Vildjiounaite, Punie & Wright, 2007;Fugger, Prazak, Hanke & Wassertheurer, 2007;Gentry, 2009;Kenner, 2008;Lauriks, Reinersmann, Van der Roest, Meiland, Davies, Moelaert et al 2007;Lyon, 2001;Mahoney, Purtilo, Webbe, Alwan, Bharucha, Adlam et al, 2007;Martin, Cunningham & Nugent, 2007;McLean, 2011;Niemeijer, Frederiks, Riphagen, Legemaate, Eefsting & Hertogh, 2010, 2010A. Nordgren, 2012;Anders Nordgren, 2013;Palm, Nordgren, Verweij & Collste, 2012;Palm, 2011;Remmers, 2010;Rigby, 2007;…”
Section: Resultsmentioning
confidence: 99%
“…Information enables regulation, behavioural control, and profiling by those with greater access [36]. Thus, informational privacy acts as a check on the power of organisations and data controllers [37,38].…”
Section: Respect Individual Privacymentioning
confidence: 99%
“…Unauthorised sharing can impede a user's autonomy and sense of identity, and expose her to additional risks of identity theft, physical and virtual intrusion, and discrimination, among others. By controlling the dissemination of personal data, a person may be spared future disturbance from friends, family, caregivers, service providers, and others [37]. Caregivers can, for instance, use H-IoT to monitor whether the user is following prescribed medical care or engaging in risky behaviours that suggest frailty; both can disrespect the user's autonomy and ability to manage the identity presented to others.…”
Section: Give Users Control Over Data Collection and Transmissionmentioning
confidence: 99%
See 1 more Smart Citation