Privacy, trust, and identity issues for ubiquitous computing

被引:1
作者
Little, Linda [1 ]
机构
[1] Northumbria Univ, Div Psychol, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
关键词
D O I
10.1177/0894439307307679
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
引用
收藏
页码:3 / 5
页数:3
相关论文
共 50 条
[41]   Consumer perceptions of privacy, security and trust in ubiquitous commerce [J].
George Roussos ;
Theano Moussouri .
Personal and Ubiquitous Computing, 2004, 8 :416-429
[42]   To Trust or Not-Trust: Privacy Issues With Voice Assistants [J].
Pal, Debajyoti ;
Arpnikanondt, Chonlameth ;
Razzaque, Mohammad Abdur ;
Funilkul, Suree .
IT PROFESSIONAL, 2020, 22 (05) :46-53
[43]   Data Privacy and Trust in Cloud Computing [J].
Cheng, Kai .
ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2022, 74 (04) :745-746
[44]   Privacy protection in ubiquitous computing based on privacy label and information flow [J].
Hwang, SO ;
Yoon, KS .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2, 2004, 3044 :46-54
[45]   Introduction: Privacy, trust, and identity management [J].
Crane, Stephen ;
Pearson, Siani ;
Sommer, Dieter .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6545 :141-149
[46]   Privacy and trust issues with invisible computers [J].
Lahlou, S ;
Langheinrich, M ;
Röcker, C .
COMMUNICATIONS OF THE ACM, 2005, 48 (03) :59-60
[47]   Experience of ubiquitous computing technology driven mobile commerce in Africa: Impact of usability, privacy, trust and reputation concern [J].
Olaleye S.A. ;
Oyelere S.S. ;
Sanusi I.T. ;
Joseph A.F. .
International Journal of Interactive Mobile Technologies, 2018, 12 (03) :4-20
[48]   HyCPK: Securing Identity Authentication in ubiquitous computing [J].
Xu, Guangquan ;
Ren, Yan ;
Zhang, Gaoxu ;
Liu, Bin ;
Li, Xiaohong ;
Feng, Zhiyong .
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, :239-246
[49]   Issues with RFID usage in ubiquitous computing applications [J].
Floerkemeier, C ;
Lampe, M .
PERVASIVE COMPUTING, PROCEEDINGS, 2004, 3001 :188-193
[50]   PERCEPTIONS OF PRIVACY IN HOME-BASED UBIQUITOUS COMPUTING [J].
Lorenzen-Huber, L. ;
Boutain, M. .
GERONTOLOGIST, 2008, 48 :25-25