Sciweavers

806 search results - page 70 / 162
» Privacy Policy Referencing
Sort
View
CCS
2010
ACM
13 years 9 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CHI
2005
ACM
14 years 10 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ACSAC
2003
IEEE
14 years 3 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
AGENTS
1998
Springer
14 years 2 months ago
Liability for Autonomous Agent Design
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Carey Heckman, Jacob O. Wobbrock
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
14 years 3 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch