Understanding and Capturing People’s Privacy Policies in a People Finder Application

s of CHI 2003, ACM Conference on Human Factors in Computing Systems. Fort Lauderdale, FL. pp. 724-725 2003. 20. Palen, L. and P. Dourish, Unpacking "Privacy" for a Networked World. CHI Letters (Human Factors in Computing Systems: CHI 2003), 2003. 5(1): p. 129-136. 21. Patil, S. and J. Lai. Who gets to know what when: configuring privacy permissions in an awareness application. In Proceedings of The SIGCHI Conference on Human Factors in Computing Systems (CHI 2005). pp. 101-110 2005. 22. Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proceedings of MobiCom 2000: The Sixth Annual International Conference on Mobile Computing and Networking. Boston, Massachusetts: ACM Press. pp. 32-43 2000. 23. Rastogi, V., E. Walbourne, N. Khoussainova, R. Kriplean, M. Balazinska, G. Borriello, T. Kohno, and D. Suciu. Expressing Privacy Policies Using Authorization Views. In Proceedings of 9th International Conference on Ubiquitous Computing (Workshop on Privacy). Innsbruck, Austria, May 13-16, 2007 2007. 24. Sadeh, N., F. Gandon, and O.B. Kwon, Ambient Intelligence: The MyCampus Experience, in Ambient Intelligence and Pervasive Computing, T.V.a.W. Pedrycz, Editor. ArTech House, 2006. 25. Sohn, T., A. Varshavsky, A. LaMarca, M.Y. Chen, T. Choudhury, I. Smith, S. Consolvo, and W. Griswold. Mobility Detection Using Everyday GSM Traces. In Proceedings of 9th International Conference on Ubiquitous Computing (Ubicomp 2007). Irvine, CA 2006. 26. Tang, K.P., P. Keyani, J. Fogarty, and J.I. Hong. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of Conference on Human Factors in Computing Systems. Montreal, Quebec, Canada: ACM Press, New York, NY. pp. 93-102 2006. http://doi.acm.org/10.1145/1124772.1124788 27. Want, R., A. Hopper, V. Falcao, and J. Gibbons, The Active Badge Location System. ACM Transactions on Information Systems 1992. 10(1): p. 91-102. 28. Wireless, S. http://www.skyhookwireless.com

[1]  Ashraf Khalil,et al.  Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.

[2]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[3]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[4]  Louise Barkhuus Privacy in Location-Based Services , Concern vs . Coolness , 2004 .

[5]  Yitao Duan,et al.  Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments , 2004, Privacy Enhancing Technologies.

[6]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[7]  William G. Griswold,et al.  Mobility Detection Using Everyday GSM Traces , 2006, UbiComp.

[8]  James Fogarty,et al.  Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.

[9]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[10]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[11]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[12]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[13]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[14]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[15]  Lujo Bauer,et al.  User-Controllable Security and Privacy for Pervasive Computing , 2007 .

[16]  Fabien L. Gandon,et al.  Ambient Intelligence: The MyCampus Experience , 2005 .

[17]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[18]  Dan Suciu,et al.  Expressing Privacy Policies Using Authorization Views , 2007 .

[19]  Jonathan Grudin Presenting choices in context: approaches to information sharing , 2003 .

[20]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[21]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[22]  Marco Gruteser,et al.  USENIX Association , 1992 .

[23]  R. Harper Why people do and don't wear active badges: a case study , 1995 .

[24]  Jason I. Hong,et al.  Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.

[25]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.