Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahas, R. and Mark, Ü. (2005), Location based services—new challenges for planning and public administration? Futures, 37, 547–561.
Allen, A. (1998), Privacy, in A Companion to Feminist Philosophy (ed. A.M. Jaggar and I. Young), Blackwell, Malden.
Barrera, M.H. and Okai, J.M. (1999), Digital Correspondence: Recreating Privacy Paradigms. International Journal of Communications Law and Policy, 3, http://www.ijclp.org/3_1999/ ijclp_webdoc_4_3_1999.html, last visited 03-15-2005.
Beigl, M., Gellersen, H.-W. and Schmidt, A. (2001), Mediacups: experience with design and use of computer-augmented everyday artefacts. Computer Networks, 35 (4), 401–9.
Bennett, C. J. (2001), Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web. Ethics and Information Technology, 3 (3), 197–210.
Beresford, A.R. (2005), Location privacy in ubiquitous computing. Technical Report, No. 612, Cambridge, online available at http://www.cl.cam.ac.uk/Research/DTG/lce-pub/public/arb33/ UCAM-CL-TR-612.pdf, last visited 08-15-2005.
Brown, K. (2000), The Internet Privacy Debate. International Journal of Communications Law and Policy, 6, http://www.ijclp.org/6_2001/ijclp_webdoc_11_6_2001.html, last visited 03-15-2005.
Cooke, M. (1999), A space of one’s own: autonomy, privacy, liberty. Philosophy & Social Criticism, 25 (1), 23–53.
Fraser, N. (1989), Unruly Practices: Power, Discourse, and Gender in Contemporary Social Theory, Polity, Oxford.
Funk, J.L. (2005), The future of the mobile phone Internet: an analysis of technological trajectories and lead users in the Japanese market. Technology in Society, 27, 69–83.
Ghribi, B. and Logrippo, L. (2000), Understanding GPRS: the GSM packet radio service. Computer Networks, 34, 763–779.
Goodrum, P.M., McLaren, M.A. and Durfee, A. (2005), The application of active radio frequency identification technology for tool tracking on construction job sites. Automation in Construction, (in press).
Hoymann, C. (2005), Analysis and performance evaluation of the OFDM-based metropolitan area network IEEE 802.16. Computer Networks (in press).
Hunter, P. (2005), London terrorist attacks heat up identity card debate and highlight uncertainties over their efficacy. Computer Fraud & Security, 7, 4–5.
Kaya, N. and Weber, M. J. (2003), Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students. Journal of Environmental Psychology, 23 (3), 301–9.
Lehr, W. and McKnight, L. W. (2003), Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27, 351–370.
Leonhardt, U. and Magee, J. (1998), Security Considerations for a Distributed Location Service. Journal of Network and Systems Management, 6 (1), 51–70.
Marx, G. T. (2001), Murky conceptual waters: The public and the private. Ethics and Information Technology, 3 (3), 157–69.
Michelfelder, D. P. (2001), The moral value of informational privacy in cyberspace. Ethics and Information Technology, 3 (2), 129–35.
Miceli, A. (2003) Wireless Technician’s Handbook. Artech House, Boston, second edition.
Newell, P. B. (1998), A Cross-Cultural Comparison of Privacy Definitions and Functions: A Systems Approach. Journal of Environmental Psychology, 18 (4), 357–71.
Olinger, H. N., Britz, J. J. and Olivier, M. S. (2005), Western privacy and ubuntu: influence in the forthcoming data privacy bill, in Ethics of New Information Technology, Proceedings of CEPE 2005 (ed. P. Brey, F. Grodzinsky, L. Introna), CTIT, Enschede/The Netherlands.
Pateman, C. (1992), Feminist Critiques of the Public/Private Dichotomy, in Justice in Political Philosophy, Volume II (ed. W. Kymlicka), Edward Elgar Publishing, Aldershot, first published 1981.
Pedersen, D. M. (1997), Psychological Functions of Privacy. Journal of Environmental Psychology, 17 (2), 147–56.
Pedersen, D. M. (1999), Model for Types of Privacy by Privacy Functions. Journal of Environmental Psychology, 19 (4), 397–405.
Reiman, J. (2004), Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Information Technology of the Future, in Privacies. Philosophical Evaluations (ed. B. Rössler),Stanford University Press, Stanford.
Spinello, R.A. (2003), Cyberethics. Morality and Law in Cyberspace. Jones and Bartlett Publishers, Sudbury.
Tunick, M. (2001), Does Privacy Undermine Community? The Journal of Value Inquiry, 35 (4), 517–34.
Weinreb, L. L. (2000), The Right to Privacy. Social Philosophy and Policy, 17 (2), 25–44.
Weiser, M. (1991), The Computer for the Twenty-First Century. Scientific American, 265 (3), 94–104.
Whitaker, R. (1999), The End of Privacy. The New Press, New York.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this chapter
Cite this chapter
Weber, K., Drüeke, R., Schulz, A. (2007). Mobile ICT in public spaces and its impact on privacy. In: Miller, H.J. (eds) Societies and Cities in the Age of Instant Access. The GeoJournal Library, vol 88. Springer, Dordrecht. https://doi.org/10.1007/1-4020-5427-0_13
Download citation
DOI: https://doi.org/10.1007/1-4020-5427-0_13
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-5426-6
Online ISBN: 978-1-4020-5427-3
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)