Mobile ICT in public spaces and its impact on privacy

  • Karsten Weber
  • Ricarda Drüeke
  • Axel Schulz
Part of the The GeoJournal Library book series (GEJL, volume 88)


Global Position System Mobile Phone Public Space Public Sphere Universal Mobile Telecommunication System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Ahas, R. and Mark, Ü. (2005), Location based services—new challenges for planning and public administration? Futures, 37, 547–561.CrossRefGoogle Scholar
  2. Allen, A. (1998), Privacy, in A Companion to Feminist Philosophy (ed. A.M. Jaggar and I. Young), Blackwell, Malden.Google Scholar
  3. Barrera, M.H. and Okai, J.M. (1999), Digital Correspondence: Recreating Privacy Paradigms. International Journal of Communications Law and Policy, 3, ijclp_webdoc_4_3_1999.html, last visited 03-15-2005.Google Scholar
  4. Beigl, M., Gellersen, H.-W. and Schmidt, A. (2001), Mediacups: experience with design and use of computer-augmented everyday artefacts. Computer Networks, 35 (4), 401–9.CrossRefGoogle Scholar
  5. Bennett, C. J. (2001), Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web. Ethics and Information Technology, 3 (3), 197–210.CrossRefGoogle Scholar
  6. Beresford, A.R. (2005), Location privacy in ubiquitous computing. Technical Report, No. 612, Cambridge, online available at UCAM-CL-TR-612.pdf, last visited 08-15-2005.Google Scholar
  7. Brown, K. (2000), The Internet Privacy Debate. International Journal of Communications Law and Policy, 6,, last visited 03-15-2005.Google Scholar
  8. Cooke, M. (1999), A space of one’s own: autonomy, privacy, liberty. Philosophy & Social Criticism, 25 (1), 23–53.CrossRefGoogle Scholar
  9. Fraser, N. (1989), Unruly Practices: Power, Discourse, and Gender in Contemporary Social Theory, Polity, Oxford.Google Scholar
  10. Funk, J.L. (2005), The future of the mobile phone Internet: an analysis of technological trajectories and lead users in the Japanese market. Technology in Society, 27, 69–83.CrossRefGoogle Scholar
  11. Ghribi, B. and Logrippo, L. (2000), Understanding GPRS: the GSM packet radio service. Computer Networks, 34, 763–779.CrossRefGoogle Scholar
  12. Goodrum, P.M., McLaren, M.A. and Durfee, A. (2005), The application of active radio frequency identification technology for tool tracking on construction job sites. Automation in Construction, (in press).Google Scholar
  13. Hoymann, C. (2005), Analysis and performance evaluation of the OFDM-based metropolitan area network IEEE 802.16. Computer Networks (in press).Google Scholar
  14. Hunter, P. (2005), London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy. Computer Fraud & Security, 7, 4–5.CrossRefGoogle Scholar
  15. Kaya, N. and Weber, M. J. (2003), Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students. Journal of Environmental Psychology, 23 (3), 301–9.CrossRefGoogle Scholar
  16. Lehr, W. and McKnight, L. W. (2003), Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27, 351–370.CrossRefGoogle Scholar
  17. Leonhardt, U. and Magee, J. (1998), Security Considerations for a Distributed Location Service. Journal of Network and Systems Management, 6 (1), 51–70.CrossRefGoogle Scholar
  18. Marx, G. T. (2001), Murky conceptual waters: The public and the private. Ethics and Information Technology, 3 (3), 157–69.CrossRefGoogle Scholar
  19. Michelfelder, D. P. (2001), The moral value of informational privacy in cyberspace. Ethics and Information Technology, 3 (2), 129–35.CrossRefGoogle Scholar
  20. Miceli, A. (2003) Wireless Technician’s Handbook. Artech House, Boston, second edition.Google Scholar
  21. Newell, P. B. (1998), A Cross-Cultural Comparison of Privacy Definitions and Functions: A Systems Approach. Journal of Environmental Psychology, 18 (4), 357–71.CrossRefGoogle Scholar
  22. Olinger, H. N., Britz, J. J. and Olivier, M. S. (2005), Western privacy and ubuntu: influence in the forthcoming data privacy bill, in Ethics of New Information Technology, Proceedings of CEPE 2005 (ed. P. Brey, F. Grodzinsky, L. Introna), CTIT, Enschede/The Netherlands.Google Scholar
  23. Pateman, C. (1992), Feminist Critiques of the Public/Private Dichotomy, in Justice in Political Philosophy, Volume II (ed. W. Kymlicka), Edward Elgar Publishing, Aldershot, first published 1981.Google Scholar
  24. Pedersen, D. M. (1997), Psychological Functions of Privacy. Journal of Environmental Psychology, 17 (2), 147–56.CrossRefGoogle Scholar
  25. Pedersen, D. M. (1999), Model for Types of Privacy by Privacy Functions. Journal of Environmental Psychology, 19 (4), 397–405.CrossRefGoogle Scholar
  26. Reiman, J. (2004), Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Information Technology of the Future, in Privacies. Philosophical Evaluations (ed. B. Rössler),Stanford University Press, Stanford.Google Scholar
  27. Spinello, R.A. (2003), Cyberethics. Morality and Law in Cyberspace. Jones and Bartlett Publishers, Sudbury.Google Scholar
  28. Tunick, M. (2001), Does Privacy Undermine Community? The Journal of Value Inquiry, 35 (4), 517–34.CrossRefGoogle Scholar
  29. Weinreb, L. L. (2000), The Right to Privacy. Social Philosophy and Policy, 17 (2), 25–44.Google Scholar
  30. Weiser, M. (1991), The Computer for the Twenty-First Century. Scientific American, 265 (3), 94–104.CrossRefGoogle Scholar
  31. Whitaker, R. (1999), The End of Privacy. The New Press, New York.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • Karsten Weber
    • 1
  • Ricarda Drüeke
    • 1
  • Axel Schulz
    • 1
  1. 1.European University ViadrinaFrankfurt (oder)Germany

Personalised recommendations