UPEM : user-centered privacy evaluation model in pervasive computing systems.
The fact that pervasive systems are typically embedded and invisible, making it difficult for users to know when these devices are collecting data. Consequently privacy appears as a major issue for pervasive computer applications and several privacy models proposed for pervasive environments. The ra...
| Main Authors: | Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura, Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
UBICC
2009
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/17529/ http://psasir.upm.edu.my/id/eprint/17529/1/UPEM%20.user-centered%20privacy%20evaluation%20model%20in%20pervasive%20computing%20systems..pdf |
Similar Items
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008)
by: Dehghantanha, Ali
Published: (2008)
Measuring interaction proxemics with wearable light tags
by: Montanari, Alessandro, et al.
Published: (2018)
by: Montanari, Alessandro, et al.
Published: (2018)
Computer games for user engagement in attention deficit hyperactivity disorder (ADHD) monitoring and therapy
by: Craven, Michael P., et al.
Published: (2015)
by: Craven, Michael P., et al.
Published: (2015)
Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
by: Wietrzyk, Bartosz, et al.
Published: (2007)
by: Wietrzyk, Bartosz, et al.
Published: (2007)
A work service model of the ubiquitous environment for collaboration
by: Lee, J., et al.
Published: (2012)
by: Lee, J., et al.
Published: (2012)
Living with the user: design drama for dementia care through responsive scripted experiences in the home
by: Coughlan, Tim, et al.
Published: (2014)
by: Coughlan, Tim, et al.
Published: (2014)
The Timestreams platform: artist mediated participatory sensing for environmental discourse
by: Blum, Jesse, et al.
Published: (2013)
by: Blum, Jesse, et al.
Published: (2013)
The spatial character of sensor technology
by: Reeves, Stuart, et al.
Published: (2006)
by: Reeves, Stuart, et al.
Published: (2006)
Factors influencing utilisation of ubiquitous technology among undergraduates in Malaysian Technical Universities
by: Sedek, Muliati
Published: (2014)
by: Sedek, Muliati
Published: (2014)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
FPGA Implementation of Musical Notes Recognition for Automatic Transcription System
by: Sugiarto, Susanne, et al.
Published: (2006)
by: Sugiarto, Susanne, et al.
Published: (2006)
Managing obesity through mobile phone applications: a state-of-the-art review from a user-centred design perspective
by: Hermawati, Setia, et al.
Published: (2014)
by: Hermawati, Setia, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
Text-to-Braille Translator in a Chip
by: Zhang, Xuan, et al.
Published: (2006)
by: Zhang, Xuan, et al.
Published: (2006)
Text-to-Braille Translator in a Chip
by: Zhang, Xuan, et al.
Published: (2006)
by: Zhang, Xuan, et al.
Published: (2006)
Micro Neural-Controller for Optical Character Recognition
by: Lim, Ker-chin, et al.
Published: (2006)
by: Lim, Ker-chin, et al.
Published: (2006)
Conceptual framework for ubiquitous cyber-physical assembly systems in airframe assembly
by: Sanderson, David, et al.
Published: (2018)
by: Sanderson, David, et al.
Published: (2018)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Reconfigurable FIR Filter in FPGA
by: Dzukleski, Igor, et al.
Published: (2006)
by: Dzukleski, Igor, et al.
Published: (2006)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
IMB3-Miner: Mining induced/embedded subtrees by constraining the level of embedding
by: Tan, H., et al.
Published: (2006)
by: Tan, H., et al.
Published: (2006)
Unsupervised labelling of sequential data for
location identification in indoor environments
by: Pérez López, Iker, et al.
Published: (2016)
by: Pérez López, Iker, et al.
Published: (2016)
Optimal control of three-phase embedded power grids
by: Formentini, Andrea, et al.
Published: (2016)
by: Formentini, Andrea, et al.
Published: (2016)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Quality estimation and optimization of adaptive stereo matching algorithms for smart vehicles
by: Chen, Fupeng, et al.
Published: (2020)
by: Chen, Fupeng, et al.
Published: (2020)
Unpacking the sociotechnical challenges of IoT design work in practice
by: Castle-Green, Teresa
Published: (2023)
by: Castle-Green, Teresa
Published: (2023)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
The Design of Flexible Pervasive Electronic Health Record (PEHR)
by: Abd Ghani, M. K., et al.
Published: (2011)
by: Abd Ghani, M. K., et al.
Published: (2011)
Declarative modelling for Bayesian inference by shallow embedding
by: Nilsson, Henrik, et al.
Published: (2014)
by: Nilsson, Henrik, et al.
Published: (2014)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A research framework for user centered web development
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures.
by: Al-Radaei, Taha Ahmed, et al.
Published: (2009)
by: Al-Radaei, Taha Ahmed, et al.
Published: (2009)
Pervasive car pooling system using push strategy
by: K.H., Yew, et al.
Published: (2008)
by: K.H., Yew, et al.
Published: (2008)
Similar Items
-
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009) -
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009) -
Xml-Based Privacy Model in Pervasive Computing
by: Dehghantanha, Ali
Published: (2008) -
Measuring interaction proxemics with wearable light tags
by: Montanari, Alessandro, et al.
Published: (2018) -
Computer games for user engagement in attention deficit hyperactivity disorder (ADHD) monitoring and therapy
by: Craven, Michael P., et al.
Published: (2015)