Personal and Ubiquitous Computing Chris SchmandtMark Ackerman Editorial 23 October 2004 Pages: 389 - 390
Security in the wild: user strategies for managing security as an everyday, practical problem Paul DourishRebecca E. GrinterMelissa Joseph Original Article 22 September 2004 Pages: 391 - 401
Little brother: could and should wearable computing technologies be applied to reducing older people’s fear of crime? Mark A. BlythePeter C. WrightAndrew F. Monk Original Article 06 October 2004 Pages: 402 - 415
Consumer perceptions of privacy, security and trust in ubiquitous commerce George RoussosTheano Moussouri Original Article 16 September 2004 Pages: 416 - 429
Privacy in pervasive environments: next generation labeling protocols Mark S. Ackerman Original Article 22 September 2004 Pages: 430 - 439
Personal privacy through understanding and action: five pitfalls for designers Scott LedererJason I. HongJames A. Landay Original Article 16 September 2004 Pages: 440 - 454