Hong, Jason; Ng, Jennifer D.; Lederer, Scott; Landay, … - 2004
privacy risk model in the design of two ubiquitous computing applications. … into concrete issues for specific applications and prioritizing those issues. In this paper, we introduce a privacy risk … model we have developed specifically for ubiquitous computing, and outline two case studies describing our use of this …