Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 2017
DOI: 10.1145/3025453.3025907
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Mechanisms for Drones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Some researchers design non-technical systems to solve privacy problems. Considering personal drones, Yao et al propose the design of a legal registration system as well as the technical design of the drone to provide privacy and enforcement [124]. In design to solve a privacy problem, privacy is a problem that has already been well-defined outside of the design process.…”
Section: Purpose: How Privacy Is Addressed By Designmentioning
confidence: 99%
“…Some researchers design non-technical systems to solve privacy problems. Considering personal drones, Yao et al propose the design of a legal registration system as well as the technical design of the drone to provide privacy and enforcement [124]. In design to solve a privacy problem, privacy is a problem that has already been well-defined outside of the design process.…”
Section: Purpose: How Privacy Is Addressed By Designmentioning
confidence: 99%
“…This includes research on collaborative access control models (see for instance [48] for a recent literature review), as well as the extensive literature on multiuser and interdependent privacy (see for instance [24,59] for recent literature reviews on the topic). In all cases, there is a recognition that, in modern online and mobile systems, the privacy and security of one user is no longer an individual matter [4,15,24,32,38,59,61,68,70,71]. That is, the privacy and security of one user does not only depend on what that user does with her data, but it also depends on what other users do with that data.…”
Section: Multiuser Privacy and Security Conflictsmentioning
confidence: 99%
“…As detailed in Section 2.2, multiuser privacy and security conflicts occur in other domains too, such as social media, smart homes, mobile phones, autonomous systems, shared accounts, etc. [4,15,24,32,38,59,68,70,71]. In particular, the majority of the work on how and why MCs occur has so far focused on social media, with extensive empirical research to study the phenomemon in that domain [6,10,18,27,32,55,60,68].…”
Section: What Are the Differences And Similarities Between Cloud Mcs ...mentioning
confidence: 99%
“…• Social acceptability of technology usage has been inverstigated for various contexts and situations [13] or by particular user groups, e.g., for accessability [20,25] or in medical use cases [4,27]. • Ethical and social implications of particular classes of technologies, were looked at e.g., for wearables [11], smart glasses [5], drones [26,14], lifelogging cameras [12] and CCTV [17], as well as discussed for ubiquitous computing in general [2]. • A further string of research e.g., by the University of Twente 1 (Netherlands), covers intelligent personal assistants and human-robot-interaction.…”
Section: Existing Workmentioning
confidence: 99%