{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:36:33Z","timestamp":1774190193145,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1007\/s00779-009-0229-4","type":"journal-article","created":{"date-parts":[[2009,4,16]],"date-time":"2009-04-16T05:40:34Z","timestamp":1239860434000},"page":"53-72","source":"Crossref","is-referenced-by-count":11,"title":["Information privacy in institutional and end-user tracking and recording technologies"],"prefix":"10.1007","volume":"14","author":[{"given":"David H.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Gillian R.","family":"Hayes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,17]]},"reference":[{"issue":"1","key":"229_CR1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/344949.344988","volume":"7","author":"GD Abowd","year":"2000","unstructured":"Abowd GD, Mynatt ED (2000) Charting past, present, and future research in ubiquitous computing. ACM Trans Comp Hum Interact 7(1):29\u201358","journal-title":"ACM Trans Comp Hum Interact"},{"key":"229_CR2","doi-asserted-by":"crossref","unstructured":"Beckmann C, Consolvo S, LaMarca A (2004) Some assembly required: supporting end-user sensor installation in domestic ubiquitous computing environments. Paper presented at UbiComp 2004: ubiquitous computing","DOI":"10.1007\/978-3-540-30119-6_7"},{"key":"229_CR3","doi-asserted-by":"crossref","unstructured":"Beckwith R (2003) Designing for ubiquity: the perception of privacy IEEE Pervasive Comput 2:40\u201346","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"229_CR4","doi-asserted-by":"crossref","unstructured":"Beckwith R, Mainwaring S (2005) Privacy: personal information, threats, and technologies. Paper presented at the 2005 international symposium on technology and society. ISTAS 2005. Weapons and wires: prevention and safety in a time of fear","DOI":"10.1109\/ISTAS.2005.1452707"},{"key":"229_CR5","unstructured":"Berger PL, Luckmann T (1967) The social construction of reality: a treatise in the sociology of knowledge. Anchor Publishing, New York"},{"key":"229_CR6","unstructured":"Boslau M, Lietke BC (2006) RFID is in the eye of the consumer\u2014survey results and implications. Marketing from the trenches: perspectives on the road ahead, pp 1\u201319"},{"issue":"2","key":"229_CR7","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1005361.1005362","volume":"11","author":"JA Brotherton","year":"2004","unstructured":"Brotherton JA, Abowd GD (2004) Lessons learned from eClass: assessing automated capture and access in the classroom. ACM Trans Comp Hum Interact 11(2):121\u2013155","journal-title":"ACM Trans Comp Hum Interact"},{"key":"229_CR8","doi-asserted-by":"crossref","unstructured":"Brown B, Taylor A, Izadi S, Sellen A, Kaye J, Eardley R (2007) Locating family values: a field trial of the whereabouts clock. Paper presented at the UbiComp 2007: ubiquitous computing","DOI":"10.1007\/978-3-540-74853-3_21"},{"key":"229_CR9","unstructured":"Capgemini (2004) RFID and consumers: understanding their mindset"},{"key":"229_CR10","unstructured":"Consolvo S, Rode JA, McDonald D, Riley C (2005) Developing privacy personas: handling inconsistencies in attitudes & behaviors: Intel Research Seattle Tech Report"},{"key":"229_CR11","unstructured":"Crovitz LG (2008) Privacy? We got over it. Wall St J. http:\/\/online.wsj.com\/article\/SB121962391804567765.html"},{"key":"229_CR12","unstructured":"Goffman E (1959) The presentation of self in everyday life. Anchor Books, New York"},{"key":"229_CR13","unstructured":"Goffman E (1967) On face-work: an analysis of ritual elements in social interaction interaction ritual\u2014essays on face-to-face behavior. Pantheon, New York"},{"key":"229_CR14","doi-asserted-by":"crossref","unstructured":"Hayes GR (2007) Documenting and understanding everyday activities through the selective archiving of live experiences. Doctoral thesis, Georgia Institute of Technology, Atlanta","DOI":"10.1145\/1125451.1125782"},{"key":"229_CR15","doi-asserted-by":"crossref","unstructured":"Hayes GR, Gardere LM, Abowd GD, Truong KN (2008) CareLog: a selective archiving tool for behavior management in schools. Paper presented at the sigchi conference on human factors in computing systems (CHI 2008)","DOI":"10.1145\/1357054.1357164"},{"key":"229_CR16","doi-asserted-by":"crossref","unstructured":"Hayes GR, Kientz JA, Truong KN, White DR, Abowd GD, Pering T (2004) Designing capture applications to support the education of children with autism. Paper presented at the UbiComp 2004: ubiquitous computing","DOI":"10.1007\/978-3-540-30119-6_10"},{"key":"229_CR17","doi-asserted-by":"crossref","unstructured":"Hayes GR, Patel SN, Truong KN, Iachello G, Kientz JA, Farmer R et al (2004) The personal audio loop: designing a ubiquitous audio-based memory aid. Paper presented at the mobile human-computer interaction\u2014MobileHCI 2004","DOI":"10.1007\/978-3-540-28637-0_15"},{"issue":"4","key":"229_CR18","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MPRV.2007.82","volume":"6","author":"GR Hayes","year":"2007","unstructured":"Hayes GR, Poole ES, Iachello G, Patel SN, Grimes A, Abowd GD et al (2007) Physical, social, and experiential knowledge in pervasive computing environments. IEEE Pervasive Comput 6(4):56\u201363","journal-title":"IEEE Pervasive Comput"},{"key":"229_CR19","doi-asserted-by":"crossref","unstructured":"Hayes GR, Truong KN (2009) Selective archiving: a model for privacy sensitive capture and access technologies. Andrew Senior (ed) Protecting Privacy in Video Surveillance (to appear) (forthcoming)","DOI":"10.1007\/978-1-84882-301-3_10"},{"key":"229_CR20","unstructured":"Honess T, Charman E (1992) Closed circuit television in public places. Police research group crime prevention series paper 35, HMSO"},{"key":"229_CR21","unstructured":"Iachello G (2006) Privacy and proportionality.Doctoral thesis, Georgia Institute of Technology, Atlanta"},{"key":"229_CR22","doi-asserted-by":"crossref","unstructured":"Jancke G, Venolia GD, Grudin J, Cadiz JJ, Gupta A (2001) Linking public spaces: technical and social issues. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems (CHI 2001)","DOI":"10.1145\/365024.365352"},{"issue":"1\u20132","key":"229_CR23","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C Jensen","year":"2005","unstructured":"Jensen C, Potts C, Jensen C (2005) Privacy practices of Internet users: self-reports versus observed behavior. Int J Hum Comp Stud 63(1\u20132):203\u2013227","journal-title":"Int J Hum Comp Stud"},{"key":"229_CR24","first-page":"29","volume":"7","author":"S Karas","year":"2002","unstructured":"Karas S (2002) Enhancing the privacy discourse: consumer information gathering as surveillance. J Technol Law Policy 7:29. Available at SSRN: http:\/\/ssrn.com\/abstract=301904","journal-title":"J Technol Law Policy"},{"issue":"7","key":"229_CR25","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSPEC.2004.1309801","volume":"41","author":"J Kumagai","year":"2004","unstructured":"Kumagai J, Cherry S (2004) Sensors and sensibility. IEEE Spectr 41(7):22\u201328. doi: 10.1109\/MSPEC.2004.1309801","journal-title":"IEEE Spectr"},{"key":"229_CR26","unstructured":"Levine M (2000) SIDE and closed circuit television (CCTV): exploring surveillance in public space. In: Postmes T, Spears R, Lea M, Reicher S (eds): SIDE issues centre-stage: recent developments in studies of deindividuation in groups. Royal Netherlands Academy of Arts and Sciences, Amsterdam"},{"key":"229_CR27","doi-asserted-by":"crossref","unstructured":"Lucky RW (2008) Zero privacy. IEEE Spectr 45(7)","DOI":"10.1109\/MSPEC.2008.4547499"},{"key":"229_CR28","unstructured":"Lyon D (2001) Surveillance society: monitoring everyday life: Open University Press, Buckingham"},{"key":"229_CR29","doi-asserted-by":"crossref","unstructured":"McCarthy JF, Anagnost TD (1998) MusicFX: an arbiter of group preferences for computer supported collaborative workouts. Paper presented at the ACM conference on computer supported cooperative work","DOI":"10.1145\/289444.289511"},{"key":"229_CR30","unstructured":"McCullagh D (2004) Database nation: the upside of \u201czero privacy\u201d. Reason"},{"key":"229_CR31","doi-asserted-by":"crossref","unstructured":"Mynatt ED, Rowan J, Craighill S, Jacobs A (2001) Digital family portraits: supporting peace of mind for extended family members. Paper presented at the SIGCHI conference on human factors in computing systems (CHI 2001)","DOI":"10.1145\/365024.365126"},{"key":"229_CR32","unstructured":"Newswire I (2004) Grocery store loyalty card use is strong despite privacy concerns"},{"key":"229_CR33","doi-asserted-by":"crossref","unstructured":"Palen L, Dourish P (2003) Unpacking \u201cprivacy\u201d for a networked world. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems (CHI 2003)","DOI":"10.1145\/642611.642635"},{"key":"229_CR34","doi-asserted-by":"crossref","unstructured":"Patil S, Kobsa A (2005) Uncovering privacy attitudes and practices in instant messaging. Paper presented at the GROUP, ACM conference on supporting group work","DOI":"10.1145\/1099203.1099220"},{"key":"229_CR35","doi-asserted-by":"crossref","unstructured":"Patterson DJ, Ding X, Noack N (2006) Nomatic: location by, for and of crowds. Paper presented at the location- and context-awareness","DOI":"10.1007\/11752967_13"},{"key":"229_CR36","doi-asserted-by":"crossref","unstructured":"Pedersen ER, McCall K, Moran TP, Halasz FG (1993) Tivoli: an electronic whiteboard for informal workgroup meetings. Paper presented at the INTERACT '93 and CHI '93 conference on human factors in computing systems","DOI":"10.1145\/169059.169309"},{"key":"229_CR37","doi-asserted-by":"crossref","unstructured":"Salazar C (2001) Building boundaries and negotiating work at home. Paper presented at the 2001 international ACM SIGGROUP conference on supporting group work","DOI":"10.1145\/500286.500311"},{"key":"229_CR38","doi-asserted-by":"crossref","unstructured":"Schilit B, Adams N, Want R (1994) Context-aware computing applications. Paper presented at the IEEE workshop on mobile computing systems and applications","DOI":"10.1109\/WMCSA.1994.16"},{"issue":"2","key":"229_CR39","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly 20(2):167\u2013196","journal-title":"MIS Quarterly"},{"key":"229_CR40","unstructured":"Solove DJ (2007) \u2018I\u2019ve got nothing to hide\u2019 and other misunderstandings of privacy. San Diego law review, 44"},{"key":"229_CR41","unstructured":"Spiekermann S (2007) Privacy enhancing technologies for RFID in retail\u2014an empirical investigation. Paper presented at the UbiComp 2007: ubiquitous computing"},{"key":"229_CR42","unstructured":"Strauss AL, Corbin JM (1998) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage Publications, Thousand Oaks"},{"key":"229_CR43","unstructured":"Sudman S, Bradburn NM (1982) Asking questions: a practical guide to questionnaire design. Jossey-Bass, San Francisco"},{"key":"229_CR44","doi-asserted-by":"crossref","unstructured":"Truong K, Abowd G, Brotherton J (2001) Who, what, when, where, how: design issues of capture & access applications. Paper presented at the Ubicomp 2001: ubiquitous computing","DOI":"10.1007\/3-540-45427-6_17"},{"issue":"1","key":"229_CR45","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1177\/0894439307307682","volume":"26","author":"E Garde-Perik van de","year":"2008","unstructured":"van de Garde-Perik E, Markopoulos P, de Ruyter B, Eggen B, Ijsselsteijn W (2008) Investigating privacy attitudes and behavior in relation to personalization. Social Sci Comp Rev 26(1):20\u201343","journal-title":"Social Sci Comp Rev"},{"issue":"1","key":"229_CR46","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R Want","year":"1992","unstructured":"Want R, Hopper A, Falc V, Gibbons J (1992) The active badge location system. ACM Trans Inform Syst 10(1):91\u2013102","journal-title":"ACM Trans Inform Syst"},{"issue":"1","key":"229_CR47","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/scientificamerican0104-56","volume":"290","author":"R Want","year":"2004","unstructured":"Want R (2004) RFID: a key to automating everything. Sci Am 290(1):56\u201365","journal-title":"Sci Am"},{"key":"229_CR48","doi-asserted-by":"crossref","unstructured":"Weiser M (1991) The computer for the 21st century. Sci Am","DOI":"10.1038\/scientificamerican0991-94"},{"key":"229_CR49","doi-asserted-by":"crossref","unstructured":"Zureik E, Harling-Stalker L, Smith E, Lyon D, Chan YE (2009) Privacy, surveillance and the globalization of personal information: international comparisons. McGill-Queen\u2019s University Press, Kingston (forthcoming)","DOI":"10.1515\/9780773591042"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-009-0229-4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:57:50Z","timestamp":1710262670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-009-0229-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,17]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["229"],"URL":"https:\/\/doi.org\/10.1007\/s00779-009-0229-4","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,17]]}}}