Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13–17 September 1993, Milan, Italy ECSCW ’9 1993
DOI: 10.1007/978-94-011-2094-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Design for Privacy in Ubiquitous Computing Environments

Abstract: Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues about the preservation of privacy. In this paper we examine why these issues are particularly important in the introduction of ubiquitous computing technology into the working environment. Certain problems with privacy are closely related to the ways in which the technology attenuates natural mechanisms of feedback and control over information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
308
0
4

Year Published

1999
1999
2011
2011

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 335 publications
(314 citation statements)
references
References 5 publications
2
308
0
4
Order By: Relevance
“…Accidental violations are known to happen from time to time. Inadvertent privacy infractions (5.b.i) are believed to occur because media space designs fit poorly with individual human and social factors thereby causing breakdowns in normal social practice (Bellotti, 1998). Specifically, privacy regulation is situated action (4.e.i) (Suchman, 1987).…”
Section: Privacy Violationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Accidental violations are known to happen from time to time. Inadvertent privacy infractions (5.b.i) are believed to occur because media space designs fit poorly with individual human and social factors thereby causing breakdowns in normal social practice (Bellotti, 1998). Specifically, privacy regulation is situated action (4.e.i) (Suchman, 1987).…”
Section: Privacy Violationsmentioning
confidence: 99%
“…This awareness permits fine-grained coordination of frequent, light-weight casual interactions. While video media spaces are a promising way to increase group interaction, they are perceived by users and non-users alike to be privacy invasive and privacy insensitive, e.g., Gaver et al (1992), Bellotti & Sellen (1993), Lee et al (1997). They permit privacy violations that range from subtle to obvious and from inconsequential to intolerable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Location based authorization. The assurance of privacy is of major concern in Ubicomp [5,20]. Actual proposals suggest a feedback mechanism [5] so that the user knows when he is watched allowing him to move to a non-watched room, or suggest the possibility to switch off the system [15].…”
Section: Contextmentioning
confidence: 99%
“…Theories of human social behavior have been utilized in mobile and ubiquitous computing environments to investigate privacy concerns [1,4,9,16] and they typically take into account not only individual needs, but also recurrent patterns of social roles and relationships. An important aspect of the problem concerns the identification of the parameters to consider when designing for privacy in the mobile context.…”
Section: Mobile Privacy Managementmentioning
confidence: 99%