[PDF][PDF] Everyday privacy in ubiquitous computing environments

S Lederer, AK Dey, J Mankoff - … on Socially-informed Design of Privacy …, 2002 - cs.cmu.edu
We present a conceptual model of everyday privacy in ubiquitous computing environments,
based on the works of Lessig and Adams. By everyday privacy, we mean the enduser's …

A conceptual model and a metaphor of everyday privacy in ubiquitous

S Lederer, AK Dey, J Mankoff - 2002 - dl.acm.org
We present a unified model of everyday privacy in ubiquitous computing environments,
designed to aid system designers and administrators in conceptualizing the end-user …

[图书][B] A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments

S Lederer, AK Dey, J Mankoff - 2002 - cs.cmu.edu
We present a unified model of everyday privacy in ubiquitous computing environments,
designed to aid system designers and administrators in conceptualizing the end-user …

[PDF][PDF] Towards everyday privacy for ubiquitous computing

S Lederer, JI Hong, X Jiang, AK Dey… - University of California …, 2003 - academia.edu
The goal of everyday privacy is to make it easy for endusers to share information with the
right people at the right level of detail in ubiquitous computing environments. In this paper …

Personal privacy through understanding and action: five pitfalls for designers

S Lederer, JI Hong, AK Dey, JA Landay - Personal and ubiquitous …, 2004 - Springer
To participate in meaningful privacy practice in the context of technical systems, people
require opportunities to understand the extent of the systems' alignment with relevant …

[PDF][PDF] Privacy invasions in ubiquitous computing

M Langheinrich - Workshop on Socially-informed Design of Privacy …, 2002 - uc.inf.usi.ch
While recent surveys often cite people who have experienced some form of privacy invasion,
the exact nature of such invasions remains elusive. Yet in order to build ubiquitous …

Privacy by design—principles of privacy-aware ubiquitous systems

M Langheinrich - International conference on ubiquitous computing, 2001 - Springer
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous
computing. It develops six principles for guiding system design, based on a set of fair …

Keeping ubiquitous computing to yourself: A practical model for user control of privacy

BA Price, K Adam, B Nuseibeh - International Journal of Human-Computer …, 2005 - Elsevier
As with all the major advances in information and communication technology, ubiquitous
computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy …

Privacy by design [From the editor in chief]

N Davies, M Langheinrich - IEEE Pervasive Computing, 2013 - ieeexplore.ieee.org
Privacy By Design [From the Editor in Chief] Page 1 2 PERVASIVE computing Published by
the IEEE CS ■ 1536-1268/13/$31.00 © 2013 IEEE MISSION STATEMENT: IEEE Pervasive …

Privacy: The achilles heel of pervasive computing?

M Satyanarayanan - IEEE Pervasive Computing, 2003 - computer.org
At the heart of the ubiquitous computing vision lies an inherent contradiction. On the one
hand, a computing environment must be highly knowledgeable about a user to conform to …