The goal of this research was to address seven issues related to identity exposure attitudes, concerns, claimed actions, and actual exposure behaviors.
The goal of this research was to address seven issues related to identity exposure attitudes, concerns, claimed actions, and actual exposure behaviors.
Publication Type, Journal Article ; Year of Publication, 2011 ; Authors, Zhu, F, Carpenter, S, Kulkarni, A ; Journal, Pervasive and Mobile Computing Journal.
When identity and context information is gathered by pervasive computing devices, personal privacy might be sacrificed to a greater extent than ever before.
Title, Understanding Identity Exposure and Reciprocity Attacks in Pervasive Computing Environment. Publication Type, Presentation. Year of Publication, 2010.
Optimize Identity Exposure in Pervasive Computing Environments," presented at IEEE Annual Conference on Pervasive Computing and. Communications (Percom 2009) ...
Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed and accessed ...
Missing: pervasive | Show results with:pervasive
People also ask
What are the four phases of pervasive computing from vision inspired to societal challenged?
What are the expected environmental impacts of pervasive computing?
Our studies show that identity exposure decisions depended on participants' attitudes about maintaining privacy, but did not depend on participants' concerns.
Understanding and minimizing identity exposure in ubiquitous computing ...
ieeexplore.ieee.org › iel5
Abstract- Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed ...
Missing: pervasive | Show results with:pervasive
Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed and accessed ...