Affiliation:
1. Harvard Law School, 1563 Massachusetts AvenueCambridge, MA 02138, USA
Abstract
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen whenpeopleare so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.
Subject
General Physics and Astronomy,General Engineering,General Mathematics
Reference32 articles.
1. Anderson B. 1991 The ethics of research into invasive technologies. Technical Report EPC-1991-107. Rank Xerox Research Center.
2. Arena K. & Cratty C. 2008 FBI wants palm prints eye scans tattoo mapping. CNN.com. See http://edition.cnn.com/2008/TECH/02/04/fbi.biometrics/index.html.
3. Bellotti V. & Sellen A. 1993 Design for privacy in ubiquitous computing environments. In Proc. Third European Conf. on Computer-Supported Cooperative Work Milan Italy 13–17 September 1993 (eds G. de Michelis C. Simone & K. Schmidt) pp. 77–92. Norwell MA: Kluwer Academic Publishers.
4. Foucault in cyberspace: surveillance, sovereignty, and hard-wired censors;Boyle J;Univ. Cincinnati Law Rev,1997
5. British Broadcasting Corporation 2007 PC stripper helps spam to spread. BBCNews.com. See http://news.bbc.co.uk/2/hi/technology/7067962.stm.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献