Research and Advances
Architecture and Hardware The disappearing computer

Privacy and Trust Issues with Invisible Computers

Posted
article

Privacy and trust issues with invisible computers

  • Publisher Site
  • Abstract

    A set of designer guidelines from the European Union offers the first step in building privacy-aware systems.

    References

    1. Lahlou, S. and Jegou, F. European Disappearing Computer Privacy Design Guidelines V1.0. Ambient Agoras Report D15.4. Disappearing Computer Initiative (Oct. 2003).Google Scholar Google Scholar
    2. Langheinrich, M. Privacy by design—Principles of privacy-aware ubiquitous systems In Proceedings of Ubicomp 2001 (Atlanta, GA, Oct. 2, 2001). Google Scholar Google Scholar Digital Library Digital Library
    3. Langheinrich, M. and Lahlou, S.A Troubadour Approach to Privacy. Ambient Agoras report 15.3.1. Disappearing Computer Initiative (Nov. 2003).Google Scholar Google Scholar
    4. Organization for Economic Co-operation and Development (OECD). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. (1980); www.junkbusters.com/fip.html for excerpt.Google Scholar Google Scholar
    5. Robbin, A. The loss of personal privacy and its consequences for social research. J. Government Information 28 (2001), 493–527.Google Scholar Google Scholar Cross Ref Cross Ref
    6. Vogel, J. When cards come collecting—How Safeway’s new discount cards can be used against you. Seattle Weekly (Sept. 24–30, 1998).Google Scholar Google Scholar

    Index Terms

    1. Privacy and trust issues with invisible computers

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access