94
JIANG, X.; LANDAY, J. A. Modeling privac y control in context-aware systems. IEEE
Pervasive Computing, IEEE Computer Society, Los Alamitos, CA, USA, v. 1, n. 3, p.
59–63, 2002. ISSN 1536-1268.
JIANG, X.; LANDAY, J. A. Modeling privac y control in context-aware systems. IEEE
Pervasive Computing, v. 1, n. 3, p. 59–63, July-September 2002.
KOBSA, A.; SCHRECK, J. Privacy through pseudonymity in user-adaptive systems.
ACM Transactions on Internet Technology, v. 3, n. 2, p. 149–183, 2003.
LANDAY, J. A.; DAVIS, R. C. Making sharing pervasive: Ubiquitous computing for
shared note taking. IBM Systems Journal, v. 38, n. 4, p. 531–550, 1999.
LANGHEINRICH, M. Privacy by design — principles of privacy-aware ubiquitous
systems. j-LECT-NOTES-COMP-SCI, v. 2201, p. 273–??, 2001. ISSN 0302-9743.
LANGHEINRICH, M. A privacy awareness system for ubiquitous computing
environments. In: Ubicomp, Lec ture Notes in Computer Science. [S.l.]: Springer-Verlag,
2002. v. 2498, p. 237–245.
LEDERER, S.; DEY, A. K.; MANKOFF, J. A Conceptual Model and a Metaphor of
Everyday Privacy in Ubiq uit ou s Computing Environments. [S.l.], June 2002. Dispon´ıvel
em: <http://www.eecs.berkeley.edu/Pubs/TechRpts/2002/5464.html>.
LESSIG, L. Code and Other Laws of Cybers pace. New York, NY: Basic Books, 1999. 31,
33, 34 p.
MICHAEL, J. Privacy and human rights: An international and comparative study,
with special reference to developments in information technology. Dartmouth Pub Co. /
UNESCO. 1994.
MYLES, G.; FRIDAY, A.; DAVIES, N. Preserving Privacy in Environments with
Location-Based Applications. IEEE Pervasive Computing, v. 2, n. 1, p. 56–64, 2003.
NUSSBAUMER, M. Location privacy. July 2007. Dispon´ıvel em: <www.sec.informatik.tu-
darmstadt.de/pages/lehre/SS07/sem
misc/papers/nussbaumer.pdf>.
ODLYZKO, A. Privacy, economics, and price discrimination on the internet. In:
ICEC’03: Proceedings of the 5th international conference on Electronic commerce. New
York, NY, USA: ACM Press, 2003. p. 355–366. ISBN 1-58113-788-5.
OECD. Recommendation of the council concerning guidelines governing the
protection of privacy and transborder flows of personal data. Organisation for
Economic Co-operation and Development (OECD). September 1980. Dispon´ıvel em:
<http://we bdomino1.oecd.org/horizontal/oecdacts.nsf/linkto/C(80)58>.
PFITZMANN, A.; K¨oHNTOPP, M. Anonymity, unobservability, and pseudonymity - a
proposal for terminology. In: Designing Privacy Enhancing Technologies. Springer-Verlag,
2001. p. 1–9. Dispon´ıvel em: <http://dx.doi.org/10.1007/3-540-44702-4 1>.
RAZAK, S.; ZHOU, M.; LANG, S. Networ k Intrusion Simulation Using OPNET. In:
OPNETWORK2002 conference. [S.l.: s.n.], 2002.
RIGHTS. Privacy & human rights. May 2008. Dispon´ıvel em:
<http://www.privacyinternational.org/survey/>.