Skip to main content

Mobile ICT in public spaces and its impact on privacy

  • Chapter
Societies and Cities in the Age of Instant Access

Part of the book series: The GeoJournal Library ((GEJL,volume 88))

  • 867 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ahas, R. and Mark, Ü. (2005), Location based services—new challenges for planning and public administration? Futures, 37, 547–561.

    Article  Google Scholar 

  • Allen, A. (1998), Privacy, in A Companion to Feminist Philosophy (ed. A.M. Jaggar and I. Young), Blackwell, Malden.

    Google Scholar 

  • Barrera, M.H. and Okai, J.M. (1999), Digital Correspondence: Recreating Privacy Paradigms. International Journal of Communications Law and Policy, 3, http://www.ijclp.org/3_1999/ ijclp_webdoc_4_3_1999.html, last visited 03-15-2005.

    Google Scholar 

  • Beigl, M., Gellersen, H.-W. and Schmidt, A. (2001), Mediacups: experience with design and use of computer-augmented everyday artefacts. Computer Networks, 35 (4), 401–9.

    Article  Google Scholar 

  • Bennett, C. J. (2001), Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web. Ethics and Information Technology, 3 (3), 197–210.

    Article  Google Scholar 

  • Beresford, A.R. (2005), Location privacy in ubiquitous computing. Technical Report, No. 612, Cambridge, online available at http://www.cl.cam.ac.uk/Research/DTG/lce-pub/public/arb33/ UCAM-CL-TR-612.pdf, last visited 08-15-2005.

    Google Scholar 

  • Brown, K. (2000), The Internet Privacy Debate. International Journal of Communications Law and Policy, 6, http://www.ijclp.org/6_2001/ijclp_webdoc_11_6_2001.html, last visited 03-15-2005.

    Google Scholar 

  • Cooke, M. (1999), A space of one’s own: autonomy, privacy, liberty. Philosophy & Social Criticism, 25 (1), 23–53.

    Article  Google Scholar 

  • Fraser, N. (1989), Unruly Practices: Power, Discourse, and Gender in Contemporary Social Theory, Polity, Oxford.

    Google Scholar 

  • Funk, J.L. (2005), The future of the mobile phone Internet: an analysis of technological trajectories and lead users in the Japanese market. Technology in Society, 27, 69–83.

    Article  Google Scholar 

  • Ghribi, B. and Logrippo, L. (2000), Understanding GPRS: the GSM packet radio service. Computer Networks, 34, 763–779.

    Article  Google Scholar 

  • Goodrum, P.M., McLaren, M.A. and Durfee, A. (2005), The application of active radio frequency identification technology for tool tracking on construction job sites. Automation in Construction, (in press).

    Google Scholar 

  • Hoymann, C. (2005), Analysis and performance evaluation of the OFDM-based metropolitan area network IEEE 802.16. Computer Networks (in press).

    Google Scholar 

  • Hunter, P. (2005), London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy. Computer Fraud & Security, 7, 4–5.

    Article  Google Scholar 

  • Kaya, N. and Weber, M. J. (2003), Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students. Journal of Environmental Psychology, 23 (3), 301–9.

    Article  Google Scholar 

  • Lehr, W. and McKnight, L. W. (2003), Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27, 351–370.

    Article  Google Scholar 

  • Leonhardt, U. and Magee, J. (1998), Security Considerations for a Distributed Location Service. Journal of Network and Systems Management, 6 (1), 51–70.

    Article  Google Scholar 

  • Marx, G. T. (2001), Murky conceptual waters: The public and the private. Ethics and Information Technology, 3 (3), 157–69.

    Article  Google Scholar 

  • Michelfelder, D. P. (2001), The moral value of informational privacy in cyberspace. Ethics and Information Technology, 3 (2), 129–35.

    Article  Google Scholar 

  • Miceli, A. (2003) Wireless Technician’s Handbook. Artech House, Boston, second edition.

    Google Scholar 

  • Newell, P. B. (1998), A Cross-Cultural Comparison of Privacy Definitions and Functions: A Systems Approach. Journal of Environmental Psychology, 18 (4), 357–71.

    Article  Google Scholar 

  • Olinger, H. N., Britz, J. J. and Olivier, M. S. (2005), Western privacy and ubuntu: influence in the forthcoming data privacy bill, in Ethics of New Information Technology, Proceedings of CEPE 2005 (ed. P. Brey, F. Grodzinsky, L. Introna), CTIT, Enschede/The Netherlands.

    Google Scholar 

  • Pateman, C. (1992), Feminist Critiques of the Public/Private Dichotomy, in Justice in Political Philosophy, Volume II (ed. W. Kymlicka), Edward Elgar Publishing, Aldershot, first published 1981.

    Google Scholar 

  • Pedersen, D. M. (1997), Psychological Functions of Privacy. Journal of Environmental Psychology, 17 (2), 147–56.

    Article  Google Scholar 

  • Pedersen, D. M. (1999), Model for Types of Privacy by Privacy Functions. Journal of Environmental Psychology, 19 (4), 397–405.

    Article  Google Scholar 

  • Reiman, J. (2004), Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Information Technology of the Future, in Privacies. Philosophical Evaluations (ed. B. Rössler),Stanford University Press, Stanford.

    Google Scholar 

  • Spinello, R.A. (2003), Cyberethics. Morality and Law in Cyberspace. Jones and Bartlett Publishers, Sudbury.

    Google Scholar 

  • Tunick, M. (2001), Does Privacy Undermine Community? The Journal of Value Inquiry, 35 (4), 517–34.

    Article  Google Scholar 

  • Weinreb, L. L. (2000), The Right to Privacy. Social Philosophy and Policy, 17 (2), 25–44.

    Google Scholar 

  • Weiser, M. (1991), The Computer for the Twenty-First Century. Scientific American, 265 (3), 94–104.

    Article  Google Scholar 

  • Whitaker, R. (1999), The End of Privacy. The New Press, New York.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this chapter

Cite this chapter

Weber, K., Drüeke, R., Schulz, A. (2007). Mobile ICT in public spaces and its impact on privacy. In: Miller, H.J. (eds) Societies and Cities in the Age of Instant Access. The GeoJournal Library, vol 88. Springer, Dordrecht. https://doi.org/10.1007/1-4020-5427-0_13

Download citation

Publish with us

Policies and ethics