skip to main content
research-article
Free Access

Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection

Published:01 November 2009Publication History
Skip Abstract Section

Abstract

Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?

References

  1. Cáceres, R., Cox, L., Lim, H., Shakimov, A., Varshavsky, A. Virtual individual servers as privacy-preserving proxies for mobile devices. In Proceedings of First ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (Barcelona, Spain, 2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cuff, D., Hansen, M., Kang, J. Urban sensing: Out of the woods. Commun. ACM 51, 3 (Mar. 2008), 24--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Eagle, N. Behavioral inference across cultures: Using telephones as a cultural lens. IEEE Intelligent Systems 23 (2008), 62--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Eisenman, S.B., Lane, N.D., Miluzzo, E., Peterson, R.A., Ahn, G.S., Campbell, A.T. MetroSense Project: People-centric sensing at scale. Proceedings of the ACM Sensys World Sensor Web Workshop (Boulder, CO, 2006).Google ScholarGoogle Scholar
  5. Google Health; https://www.google.com/health.Google ScholarGoogle Scholar
  6. Iachello, G., Hong, J. 2007. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction 1 (2007), 1--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kang, J. Privacy in cyberspace transactions. Stanford Law Review 50 (1998), 1193--1294.Google ScholarGoogle ScholarCross RefCross Ref
  8. Lam, M. Building a social networking future without Big Brother; http://suif.stanford.edu/%7Elam/lampomi-ws09.pdf.Google ScholarGoogle Scholar
  9. Microsoft HealthVault; http://www.healthvault.com/.Google ScholarGoogle Scholar
  10. Nissenbaum, H. Privacy as contextual integrity. Washington Law Review 79 (2004), 119--158.Google ScholarGoogle Scholar
  11. Palen, L., Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of 2003 SIGCHI Conference (Ft. Lauderdale, FL), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Personal Privacy in an Information Society: The Report of The Privacy Protection Study Commission. 1977; http://epic.org/privacy/ppsc1977report/.Google ScholarGoogle Scholar
  13. U.S. Department of Health, Education, and Welfare. Records, Computers, and the Rights of Citizens. MIT Press, Cambridge, MA, 1973.Google ScholarGoogle Scholar
  14. Waldo, J., Lin, H. S., Millett, L. I. Engaging Privacy and Information Technology in a Digital Age. The National Academies Press, Washington, D.C., 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zittrain, J. The Future of the Internet---And How to Stop It. Yale University Press, New Haven and London, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 52, Issue 11
          Scratch Programming for All
          November 2009
          135 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/1592761
          Issue’s Table of Contents

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format