Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2009
DOI: 10.4108/icst.mobiquitous2009.6853
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments

Abstract: Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed and accessed via wireless networks. When identity information is associated with our personal and context information that is gathered by ubiquitous computing devices, personal privacy might be unprecedentedly sacrificed. People, however, have different privacy protection skills, awareness, and privacy preferences. Individuals can be uniquely identified on the basis of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(15 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…We used InfoSource V3.0 in the experiments, which provided more interactive and a smoother user experience than InfoSource V1.0 that we used in another study [8]. An animated recommendation agent, Alice, introduced herself and greeted the user as shown in Figure 1 (a).…”
Section: The Infosource Softwarementioning
confidence: 99%
See 3 more Smart Citations
“…We used InfoSource V3.0 in the experiments, which provided more interactive and a smoother user experience than InfoSource V1.0 that we used in another study [8]. An animated recommendation agent, Alice, introduced herself and greeted the user as shown in Figure 1 (a).…”
Section: The Infosource Softwarementioning
confidence: 99%
“…Our earlier work focused on identity exposure in mobile and pervasive computing environments [8]. Specifically, we conducted an extensive survey and experiments on five aspects of identity exposure: (a) identity elements that people think are important to keep private (their attitudes); (b) their privacy concerns; (c) actions people claim to take to protect their identities and privacy; (d) people's identity exposure behavior in mobile and pervasive computing environments; and (e) whether rational suggestions can help people avoid unnecessary identity exposure by using our RationalExposure model [24].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The trend is mediated by technologies such as smartphones, social networking, and smart-meters (Manyika et al, 2015). Previous work has highlighted that personal privacy is more vulnerable to erosions when contextual and personal information is gathered by pervasive computing systems (Beresford, 2005, Zhu et al, 2009. Although personal data is recognized as a key issue requiring innovative cybersecurity measures within the digital economy, there are comparatively few studies exploring individuals' attitudes towards it.…”
Section: Introductionmentioning
confidence: 99%