Skip to Main Content
Keywords: Privacy
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Pervasive Computing and Communications (2023) 19 (5): 799–817.
Published: 02 January 2023
...Deepak Choudhary Purpose As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very...
Journal Articles
International Journal of Pervasive Computing and Communications (2015) 11 (4): 436–453.
Published: 02 November 2015
... by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity...
Journal Articles
International Journal of Pervasive Computing and Communications (2012) 8 (3): 225–249.
Published: 31 August 2012
... that is intrinsic to pervasive computing systems. Design/methodology/approach The paper presents the principles that characterize the context‐aware architecture: the acceptability‐driven design, where privacy and acceptability are favored; the awareness of the gap between the reality of human activity...
Journal Articles
International Journal of Pervasive Computing and Communications (2012) 8 (1): 53–78.
Published: 30 March 2012
... in terms of privacy. If a spatial messaging platform could collect the location traces of all its users, detailed profiling would be possible – and, considering commercial value of such profiles, likely. The purpose of this paper is to present Air‐Writing, an approach to spatial messaging that fully...
Journal Articles
International Journal of Pervasive Computing and Communications (2008) 4 (1): 110–123.
Published: 04 April 2008
...Sherali Zeadally; Lu Yan; Miyuki Imada; Masakatsu Ohta; Masayasu Yamaguchi; Sun Yong Kim Purpose The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing environments. Design...

or Create an Account

Close Modal
Close Modal