{"id":"https://openalex.org/W2124872396","doi":"https://doi.org/10.1109/icdim.2008.4746842","title":"Privacy in context: Privacy issues in Ubiquitous Computing applications","display_name":"Privacy in context: Privacy issues in Ubiquitous Computing applications","publication_year":2008,"publication_date":"2008-11-01","ids":{"openalex":"https://openalex.org/W2124872396","doi":"https://doi.org/10.1109/icdim.2008.4746842","mag":"2124872396"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2008.4746842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031980248","display_name":"Ciaran O\u2019Driscoll","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ciaran O'Driscoll","raw_affiliation_strings":["Dublin Institute of Technology, School of Electronic and Communications Engineering","Sch. of Electron. & Commun. Eng., Dublin Inst. of Technol., Dublin"],"affiliations":[{"raw_affiliation_string":"Dublin Institute of Technology, School of Electronic and Communications Engineering","institution_ids":[]},{"raw_affiliation_string":"Sch. of Electron. & Commun. Eng., Dublin Inst. of Technol., Dublin","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031980248"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.6635,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.90064047,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"21","issue":null,"first_page":"827","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7374367117881775},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6552948951721191},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6460671424865723},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.6443345546722412},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6258819103240967},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6187455654144287},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5674291849136353},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5660499334335327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.450417697429657},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.25955575704574585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7374367117881775},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6552948951721191},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6460671424865723},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.6443345546722412},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6258819103240967},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6187455654144287},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5674291849136353},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5660499334335327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.450417697429657},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.25955575704574585},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2008.4746842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2008.4746842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 Third International Conference on Digital Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1480201135","https://openalex.org/W1525732771","https://openalex.org/W1801701326","https://openalex.org/W1858537446","https://openalex.org/W1916569560","https://openalex.org/W1966986089","https://openalex.org/W1987797091","https://openalex.org/W2032836483","https://openalex.org/W2034973436","https://openalex.org/W2045051325","https://openalex.org/W2052213327","https://openalex.org/W2056201098","https://openalex.org/W2086238782","https://openalex.org/W2097254487","https://openalex.org/W2113738519","https://openalex.org/W2128026023","https://openalex.org/W2129835639","https://openalex.org/W2137636032","https://openalex.org/W2138523382","https://openalex.org/W2154099926","https://openalex.org/W2157539922","https://openalex.org/W2159269282","https://openalex.org/W2509008288","https://openalex.org/W3184218770","https://openalex.org/W4246157826","https://openalex.org/W6639911726","https://openalex.org/W6677009306"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2127814706","https://openalex.org/W2994243660","https://openalex.org/W2118333568","https://openalex.org/W2675231964","https://openalex.org/W2549995367","https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W2747442008","https://openalex.org/W2132024542"],"abstract_inverted_index":{"This":[0,115],"paper":[1,116],"presents":[2],"a":[3,42,71,109,120],"review":[4],"of":[5,53,56,67,93,108],"privacy":[6,28],"issues":[7],"and":[8,12,32,59,75,95,101,124],"guidelines":[9,97],"for":[10,70,80,86,122],"developing":[11,123],"assessing":[13,125],"privacy-sensitive":[14,68,126],"ubiquitous":[15],"computing":[16],"applications.":[17,127],"Privacy":[18],"is":[19,63,78],"discussed":[20],"to":[21,50,82,88,118],"determine":[22],"factors":[23],"that":[24,77],"affect":[25],"peoples":[26],"own":[27],"preferences":[29],"in":[30,105],"public":[31],"private":[33],"environments.":[34],"Ubiquitous":[35],"environments":[36],"based":[37],"on":[38],"invisible":[39],"computers":[40],"provide":[41,119],"particular":[43],"challenge":[44],"where":[45],"limited":[46],"user":[47],"interfaces":[48],"exist":[49],"inform":[51],"users":[52],"the":[54,106],"level":[55],"data":[57],"collection":[58],"its":[60],"usage.":[61],"There":[62],"acceptance":[64],"by":[65],"designers":[66],"applications":[69],"balance":[72],"between":[73],"control":[74],"feedback":[76],"essential":[79],"systems":[81],"meet":[83],"legal":[84],"requirements":[85],"deployment":[87],"be":[89],"successful.":[90],"A":[91],"survey":[92],"principles":[94],"design":[96],"has":[98],"been":[99],"completed":[100],"these":[102],"are":[103],"used":[104],"assessment":[107],"context":[110],"aware":[111],"smart":[112],"classroom":[113],"environment.":[114],"aims":[117],"foundation":[121]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
