Safeguards in a world of ambient intelligence (SWAMI)
暂无分享,去创建一个
Michael Friedewald | Sabine Delaitre | David Wright | Wim Schreurs | Serge Gutwirth | Yves Punie | Petteri Alahuhta | Elena Vildjiounaite | Ralf Lindner | Ioannis Maghiros | Anna Moscibroda | P.J.A. de Hert | P. Hert | S. Gutwirth | M. Friedewald | David Wright | P. Alahuhta | R. Lindner | Y. Punie | Elena Vildjiounaite | I. Maghiros | Sabine Delaître | Wim Schreurs | Anna Moscibroda | Petteri Alahuhta
[1] Carla Simone,et al. Cooperative systems design:scenario-based design of collaborative systems. Proceedings of the COOP2004 Conference , 2004 .
[2] David Bolt,et al. Digital Divide: Computers and Our Children's Future , 2000 .
[3] N. Luhmann. Vertrauen : ein Mechanismus der Reduktion sozialer Komplexität , 1973 .
[4] Katherine Albrecht,et al. Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .
[5] Johan Lundin,et al. Mobile Scenarios: Supporting Collaborative Learning among Mobile People , 2001 .
[6] European Group on Ethics in Science and New Techno,et al. Ethical Aspects of ICT Implants in the Human Body , 2005 .
[7] Jianhua Ma,et al. Towards a smart world and ubiquitous intelligence: A walkthrough from smart things to smart hyperspaces and UbicKids , 2005, Int. J. Pervasive Comput. Commun..
[8] Michael Friedewald. Safeguards in a World of Ambient Intelligence: Outline of a research agenda on the European Level , 2005 .
[9] J. Michael,et al. Privacy and human rights , 1994 .
[10] John Seely Brown,et al. The coming age of calm technolgy , 1997 .
[11] Claus Offe,et al. How Can We Trust Our Fellow Citizens , 1999 .
[12] J. Krikke. T-Engine: Japan's ubiquitous computing architecture is ready for prime time , 2005, IEEE Pervasive Computing.
[13] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[14] Nalini Kotamraju. Smart Mobs: The Next Social Revolution: Transforming Cultures and Communities in the Age of Instant Access (review) , 2005 .
[15] Mark Weiser. The computer for the 21st century , 1991 .
[16] Lorenz M. Hilty,et al. The Precautionary Principle in the Information Society Effects of Pervasive Computing on Health and Environment , 2005 .
[17] Aaron Marcus,et al. Toward an Information Society for All , 2000 .
[18] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[19] Luca Simoncini. AMSD: a dependability roadmap for the information society in europe , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[20] Pamela Samuelson,et al. Privacy as intellectual property , 2000 .
[21] F. Schneider. Trust in Cyberspace , 1998 .
[22] Mayur S. Desai,et al. Information Technology Litigation and Software Failure , 2002, J. Inf. Law Technol..
[23] Chris Toumazou,et al. Medical Healthcare Monitoring with Wearable and Implantable Sensors , 2004 .
[24] M.B.M. Loos,et al. Liability for defective products and services: the Netherlands , 2002 .
[25] Constantine Stephanidis,et al. Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities , 2005, IBM Syst. J..
[26] Christian Payne,et al. On the security of open source software , 2002, Inf. Syst. J..
[27] M. Rader,et al. FTA assumptions: Methods and approaches in the context of achieving outcomes , 2006 .
[28] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[29] Serge Gutwirth,et al. Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.
[30] Tafazolli,et al. The Book of Visions 2001 Visions of the Wireless World , 2001 .
[31] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[32] John F. Roddick,et al. Detecting Privacy and Ethical Sensitivity in Data Mining Results , 2004, ACSC.
[33] Albrecht Schmidt,et al. Applying wearable sensors to avalanche rescue , 2003, Comput. Graph..
[34] Tatsuo Nakajima,et al. Privacy-concern for context-aware environments , 2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings..
[35] Harald Tveit Alvestrand. The role of the standards process in shaping the Internet , 2004, Proceedings of the IEEE.
[36] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.
[37] Anind K. Dey,et al. Designing mediation for context-aware applications , 2005, TCHI.
[38] J.E.J. Prins. The Propertization of Personal Data and Identities , 2004 .
[39] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[40] Norbert A. Streitz,et al. i-LAND: an interactive landscape for creativity and innovation , 1999, CHI '99.
[41] Christine L. Lisetti,et al. Emotion Recognition from Physiological Signals for User Modeling of Affect , 2003 .
[42] Lawrence Lessig. The Law of the Horse: What Cyberlaw Might Teach , 1999 .
[43] Paul Resnick,et al. Reputation Systems: Facilitating Trust in Internet Interactions , 2000 .
[44] Carman Neustaedter,et al. The Design of a Context-Aware Home Media Space: The Video , 2003 .
[45] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[46] K. Alheit,et al. The applicability of the EU product liability directive to software , 2001 .
[47] Ralf Lindner,et al. Datenschutz, Privatsphäre und Identität in intelligenten Umgebungen: Eine Szenarioanalyse , 2007 .
[48] Trevor T. Moores,et al. Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.
[49] A. Giddens,et al. Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order , 1994 .
[50] Wim Schreurs,et al. Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector , 2008, Profiling the European Citizen.
[51] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[52] Serge Gutwirth. De polyfonie van de democratische rechtsstaat’ [The polyphony of the democratic constitutional state] , 1998 .
[53] Jerry den Hartog,et al. Privacy in an Ambient World , 2006 .
[54] D. Ihde. Technology and the lifeworld : from garden to earth , 1991 .
[55] J. Rubenfeld. The Right of Privacy , 1989 .
[56] Philipp Bohn. Content Providers ’ Guide to Digital Rights Management , 2006 .
[57] Petteri Alahuhta,et al. Context Awareness of Everyday Objects in a Household , 2003, EUSAI.
[58] Bryan Niblett. Legal protection of computer programs , 1980 .
[59] N. Winters. Personal Privacy and Popular Ubiquitous Technology , 2004 .
[60] A Dependability Roadmap for the Information Society in Europe Part 3 Towards a Dependability Roadmap , .
[61] J. Camenisch,et al. Title: First Annual Research Report the Prime Project Receives Research Funding from the Community's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Privacy and Identity Management for Europe Prime Privacy and Identity Management for Europe , 2005 .
[62] Yvonne Rogers,et al. Let's get physical: The learning benefits of interacting in digitally augmented physical spaces , 2004, Comput. Educ..
[63] Johannes Peltola,et al. Soft biometrics - combining body weight and fat measurements with fingerprint biometrics , 2006, Pattern Recognit. Lett..
[64] Frank Stajano. One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA , 2004, Security Protocols Workshop.
[65] Elizabeth D. Mynatt,et al. Increasing the opportunities for aging in place , 2000, CUU '00.
[66] Sang Hyun Park,et al. Gate reminder: a design case of a smart reminder , 2004, DIS '04.
[67] David W. Kravitz,et al. Secure Open Systems for Protecting Privacy and Digital Services , 2001, Digital Rights Management Workshop.
[68] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[69] Marit Hansen,et al. The Open Source approach opportunities and limitations with respect to security and privacy , 2002, Comput. Secur..
[70] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[71] Beat Signer,et al. Only touching the surface: creating affinities between digital content and paper , 2004, CSCW.
[72] C. Casal,et al. The role of Ambient Intelligence in the Social Integration of the Elderly , 2004 .
[73] Lorna E Gillies. Jurisdiction for Consumer Contracts: European Union: Modified Rules of Jurisdiction for Electronic Consumer Contracts , 2001, Comput. Law Secur. Rev..
[74] Johannes Peltola,et al. Personal video retrieval and browsing for mobile users , 2005, IS&T/SPIE Electronic Imaging.
[75] Andrew Gettelman,et al. The information divide in the climate sciences , 2003 .
[76] Roger Brownsword,et al. Code, control, and choice: why East is East and West is West , 2005, Legal Studies.
[77] Jr. John B. Griffin,et al. Loss of Control , 1990 .
[78] Aaron Marcus,et al. Toward an Information Society for All: HCI Challenges and R&D Recommendations , 1999, Int. J. Hum. Comput. Interact..
[79] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[80] Tara Matthews,et al. Augmenting Collections of Everyday Objects: A Case Study of Clothes Hangers As an Information Display , 2004, Pervasive.
[81] Michael Friedewald,et al. Safeguards in a world of ambient intelligence , 2008 .
[82] D. Hoffman,et al. Bridging the Racial Divide on the Internet , 1998, Science.
[83] Cédric Tabin,et al. Liberty Alliance Project , 2007 .
[84] Jan van Dijk,et al. The Digital Divide as a Complex and Dynamic Phenomenon , 2000, Inf. Soc..
[85] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[86] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[87] Richard Beckwith,et al. Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..
[88] Bob Stepno. NRJ Books: Smart Mobs: The Next Social Revolution Transforming Cultures and Communities in the Age of Instant Access , 2003 .
[89] Joseph L. Jones,et al. Mobile robots , 1993 .
[90] Mark S. Nixon,et al. New Advances in Automatic Gait Recognition , 2002, Inf. Secur. Tech. Rep..
[91] Amma Darko,et al. Beyond the Horizon , 1995 .
[92] Teruyasu MURAKAMI. Establishing the Ubiquitous Network Environment in Japan — , 2003 .
[93] Perri,et al. Divided by Information?: The 'digital Divide' and the Implications of the New Meritocracy , 2001 .
[94] E. Masini,et al. Scenarios as Seen from a Human and Social Perspective , 2000 .
[95] Bruce Schneier,et al. Risks of Relying on Cryptography. , 1999 .
[96] W. V. Heuvel,et al. Trust in electronic commerce , 2001 .
[97] Bruce Schneier,et al. Customers, Passwords, and Web Sites , 2004, IEEE Secur. Priv..
[98] R. Alonso García. The General Provisions of the Charter of Fundamental Rights of the European Union , 2002 .
[99] George Roussos,et al. Consumer perceptions of privacy, security and trust in ubiquitous commerce , 2004, Personal and Ubiquitous Computing.
[100] Henrik Jernstrom. SiSSy - Smart-its child Surveillance System , 2002 .
[101] Francesco Vatalaro,et al. Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction , 2005 .
[102] Giuseppe Riva,et al. Ambient Intelligence in Health Care , 2003, Cyberpsychology Behav. Soc. Netw..
[103] Avenue Louise,et al. Study on the conditions of claims for damages in case of infringement of EC competition rules , 2004 .
[104] Mireille Hildebrandt. Profiles and correlatable humans , 2008 .
[105] W. J. H. Sprott. Über die Präventivwirkung des Nichtwissens: Dunkelziffer, Norm und Strafe , 1969 .
[106] W. Lazarus,et al. Online Content for Low-Income and Underserved Americans: The Digital Divide's New Frontier. A Strategic Audit of Activities and Opportunities. , 2000 .
[107] Johann Cas,et al. Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.
[108] M. Sarrafzadeh,et al. Reconfigurable Fabric Vest for Fatal Heart Disease Prevention , 2004 .
[109] Norbert A. Streitz,et al. The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.
[110] Mohammad Ilyas,et al. Smart Dust , 2006 .
[111] Comments on the Communication of the Commission on interoperability of European databases , 2006 .
[112] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[113] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[114] Robert Grimm,et al. System support for pervasive applications , 2004, TOCS.
[115] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[116] Irene Mavrommati,et al. Extrovert gadgets , 2005, CACM.
[117] Frank Stajano,et al. The butt of the iceberg: hidden security problems of ubiquitous systems , 2003 .
[118] Serge Gutwirth,et al. Privacy and the Criminal Law , 2006 .
[119] M. H. M. Schellekens,et al. Fighting untrustworthy Internet content: In search of regulatory scenarios , 2005, Inf. Polity.
[120] Robert A. Gehring. Software Development, Intellectual Property, and IT Security , 2003, Journal of Information, Law and Technology.
[121] Frank Stajano,et al. The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.
[122] Michel Godet,et al. The Art of Scenarios and Strategic Planning - Tools and Pitfalls , 2000 .
[123] Steve Peers,et al. The European Union Charter of Fundamental Rights , 2004 .
[124] Yoshito Tobe,et al. WISER: Cooperative Sensing Using Mobile Robots , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[125] Marc Langheinrich,et al. Privacy and trust issues with invisible computers , 2005, CACM.
[126] Ronald Leenes,et al. ‘Code’: Privacy's death or saviour? , 2005 .
[127] Nobuhiko Nishio,et al. Smart furniture: improvising ubiquitous hot-spot environment , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[128] P. David Marshall,et al. Web Theory: An Introduction , 2002 .
[129] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[130] Sabine Delaitre,et al. Biometrics at the Frontiers: Assessing the Impact on Society , 2005 .
[131] Brian Subirana,et al. Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond , 2004 .
[132] A. Fleming Seay,et al. A System for Finding Frequently Lost Objects in the Home , 1999 .
[133] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[134] Lorna E. Gillies. A Review of the New Jurisdiction Rules for Electronic Consumer Contracts Within the European Union , 2001, Journal of Information, Law and Technology.
[135] Viswanath Venkatesh,et al. A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..
[136] Yoshihiro Kawahara,et al. Challenges and lessons learned in building a practical smart space , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[137] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[138] Mikko Lindholm,et al. Identifying people from gait pattern with accelerometers , 2005, SPIE Defense + Commercial Sensing.
[139] Rosa Julià-Barceló,et al. Intermediary Liability: Intermediary Liability in the E-Commerce Directive: So far so good, but it's now enough , 2000, Comput. Law Secur. Rev..
[140] Lorrie Faith Cranor,et al. P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..
[141] A. Ghiroldi,et al. Ambient Intelligence-from vision to reality , 2003 .
[142] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[143] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[144] J. Nouwt,et al. Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and Workplace Privacy , 2005 .
[145] Philip Brey,et al. Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.
[146] Datong Chen,et al. Infrastructure for Machine Understanding of Video Observations in Skilled Care Facilities – Implications of Early Results from CareMedia Case Studies , 2004 .
[147] J. Stewart. No place to hide , 1996, Nature.
[148] Raymond N. J. Veldhuis,et al. Transparent Face Recognition in the Home Environment , 2004 .
[149] K. Ducatel,et al. Scenarios for Ambient Intelligence in 2010 Final Report , 2001 .
[150] Dennis H. Rouvray,et al. Beyond calculation: The next fifty years of computing , 1997 .
[151] Emile H. L. Aarts,et al. The New Everyday: Views on Ambient Intelligence , 2003 .
[152] Punie Yves,et al. Science and Technology Roadmapping: from Industry to Public Policy. , 2003 .
[153] Martien Y. Schaub,et al. European Legal Aspects of E-commerce , 2004 .
[154] Peter Schaar. Working document on data protection issues related to RFID technology , 2005 .
[155] Tom Rodden,et al. Configuring the Ubiquitous Home , 2004, COOP.
[156] Steve Benford,et al. Finding a Place for UbiComp in the Home , 2003, UbiComp.
[157] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[158] Hanan Lutfiyya,et al. Herecast:an open infrastructure for locationbased services using WiFi , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[159] Florian Michahelles,et al. Proactive Instructions for Furniture Assembly , 2002, UbiComp.
[160] Michael Friedewald,et al. The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues , 2006, SPC.
[161] Peter Steenkiste,et al. Implementing access control to people location information , 2004, SACMAT '04.
[162] Alan Poulter,et al. The Distance Selling Directive: Points for Future Revision , 2002 .
[163] S. Wyatt,et al. SHAPING CYBERSPACE : INTERPRETING AND TRANSFORMING THE INTERNET , 1999 .
[164] A. Mathewson,et al. Innovative packaging techniques for wearable applications using flexible silicon fibres , 2004, 2004 Proceedings. 54th Electronic Components and Technology Conference (IEEE Cat. No.04CH37546).
[165] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[166] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[167] John Erik Fossum,et al. The Chartering of Europe: The European Charter of Fundamental Rights and its Constitutional Implications , 2003 .
[168] E. J. Koops,et al. Glazen woning, transparant lichaam : Een toekomstblik op huisrecht en lichamelijke integriteit , 2005 .
[169] Ewald A. Kaluscha,et al. Empirical research in on-line trust: a review and critical assessment , 2003, Int. J. Hum. Comput. Stud..
[170] Pasi Ahonen,et al. Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications , 2006, IWUC.
[171] Ewoud Hondius,et al. Unfair Terms in Consumer Contracts , 1987 .
[172] P. Norris. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide , 2001 .
[173] Frank Pallas,et al. Technology paternalism – wider implications of ubiquitous computing , 2005, Poiesis Prax..
[174] K. C. White,et al. IDs—Not that Easy: Questions About Nationwide Identity Systems , 2002 .
[175] Aunya Singsangob. Computer Software and Information Licensing in Emerging Markets: the Need for a Viable Legal Framework , 2003 .
[176] Michael Friedewald,et al. Science and Technology Roadmapping: Ambient Intelligence in Everyday Life (AmI@Life) , 2003 .
[177] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[178] J. Pitkin,et al. Chairman's Report , 2003, The journal of the British Menopause Society.
[179] Daniel Fitton,et al. Supporting interaction with office door displays , 2004 .
[180] Kai Rannenberg. Multilateral security a concept and examples for balanced security , 2001, NSPW '00.
[181] Richard Hackworth,et al. OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.
[182] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[183] Varun Grover,et al. The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..
[184] Gavin Sutter. 'Don't Shoot the Messenger?' The UK and Online Intermediary Liability , 2003 .
[185] Staffan Björk. Designing Mobile Ad Hoc Collaborative Applications : Scenario experiences with Smart-Its , 2002 .
[186] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[187] Joseph Turow,et al. The Internet and the Family, 2000: The View from Parents, the View from Kids. Report Series No. 33. , 2000 .
[188] Yves Punie,et al. The Future of Ambient Intelligence in Europe: the Need for more Everyday Life , 2005 .
[189] Benito Müller,et al. Equity in climate change : the great divide , 2002 .
[190] David E. Sorkin. Technical and Legal Approaches to Unsolicited Electronic Mail , 2001 .
[191] Jennifer M. Fujawa. Privacy made public: will national security be the end of individualism? , 2005, CSOC.
[192] Arun Vishwanath,et al. Manifestations of interpersonal trust in online interaction , 2004, New Media Soc..
[193] Kimberly D. Simon,et al. The value of open standards and open-source software in government environments , 2005, IBM Syst. J..
[194] B.H.M. Custers,et al. 'The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology , 2004 .
[195] S. Gutwirth,et al. Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power , 2022, Direito Público.
[196] A. Giddens. The consequences of modernity , 1990 .
[197] Jens Riegelsberger,et al. The mechanics of trust: A framework for research and design , 2005, Int. J. Hum. Comput. Stud..
[198] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[199] Michael Friedewald,et al. Privacy, identity and security in ambient intelligence: A scenario analysis , 2007, Telematics Informatics.
[200] Göran Finnveden,et al. Towards a user's guide to scenarios : A report on scenario types and scenario techniques , 2005 .
[201] T. Nakajima,et al. Privacy-concern for context-aware environments , 2004 .