{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:16:02Z","timestamp":1769048162251,"version":"3.49.0"},"reference-count":29,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2009,4,3]],"date-time":"2009-04-03T00:00:00Z","timestamp":1238716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4,3]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>This paper identifies key research issues and provides directions for future research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This study contributes by identifying major challenges that should be addressed, so that a set of \u201cfair information principles\u201d can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240910952346","type":"journal-article","created":{"date-parts":[[2009,4,27]],"date-time":"2009-04-27T05:48:08Z","timestamp":1240811288000},"page":"194-208","source":"Crossref","is-referenced-by-count":27,"title":["Privacy and fair information practices in ubiquitous environments"],"prefix":"10.1108","volume":"19","author":[{"given":"Maria","family":"Karyda","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Hyuk Park","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720251543200_b1","unstructured":"Aarts, E. and Roovers, R. (2003), \u201cIC design challenges for ambient intelligence\u201d, in Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'03), IEEE."},{"key":"key2022020720251543200_b2","doi-asserted-by":"crossref","unstructured":"Beckwith, R. (2003), \u201cDesigning for ubiquity: the perception of privacy\u201d, IEEE Pervasive Computing, Vol. 3 No. 2, pp. 40\u20106.","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"key2022020720251543200_b3","doi-asserted-by":"crossref","unstructured":"Bonner, W. and Chiasson, M. (2005), \u201cIf fair information principles are the answer, what was the question? An actor\u2010network theory investigation of the modern constitution of privacy\u201d, Information and Organization, Vol. 15 No. 4, pp. 267\u201093.","DOI":"10.1016\/j.infoandorg.2005.03.001"},{"key":"key2022020720251543200_b4","doi-asserted-by":"crossref","unstructured":"Brey, P. (2005), \u201cFreedom and privacy in ambient intelligence\u201d, Ethics and Information Technology, Vol. 7 No. 3, pp. 157\u201066.","DOI":"10.1007\/s10676-006-0005-3"},{"key":"key2022020720251543200_b5","doi-asserted-by":"crossref","unstructured":"\u010cas, J. (2005), \u201cPrivacy in pervasive computing environments: a contradiction in terms?\u201d, IEEE Technology and Society Magazine, Vol. 24 No. 1, pp. 24\u201033.","DOI":"10.1109\/MTAS.2005.1407744"},{"key":"key2022020720251543200_b6","unstructured":"Cate, F.H. (2006), \u201cThe failure of fair information practice principles\u201d, in Winn, J.K. (Ed.), Consumer Protection in the Age of the Information Economy, Ashgate, Aldershot."},{"key":"key2022020720251543200_b7","unstructured":"Center for Democracy and Technology (2000), \u201cFair information practices\u201d, available at: www.cdt.org\/privacy\/guide\/basic\/fips.html (accessed 13 August 2008)."},{"key":"key2022020720251543200_b8","doi-asserted-by":"crossref","unstructured":"Crowley, J.L., Coutaz, J., Rey, G. and Reignier, P. (2002), \u201cPerceptual components for context aware computing\u201d, Proceedings of Ubicomp, LNCS, Springer, New York, NY.","DOI":"10.1007\/3-540-45809-3_9"},{"key":"key2022020720251543200_b9","unstructured":"Dumortier, J. and Goemans, C. (2002), \u201cRoadmap for European legal research in privacy and identity management\u201d, Interdisciplinary Centre for Law and ICT (ICRI), K.U. Leuven, December, available at: www.law.kuleuven.be\/icri\/publications\/421rapid.pdf (accessed 13 August 2008)."},{"key":"key2022020720251543200_b10","unstructured":"European Parliament (1995), \u201cDirective 95\/46\/EC of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data\u201d, Official Journal of the European Communities, L281\/31, 23 November."},{"key":"key2022020720251543200_b11","unstructured":"Eymann, T. and Morito, H. (2004), \u201cPrivacy issues of combining ubiquitous computing and software agent technology in a life\u2010critical environment\u201d, Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics, IEEE Press, Piscataway, NJ."},{"key":"key2022020720251543200_b12","unstructured":"FTD (1998), \u201cPrivacy online: a report to congress\u201d, Federal Trade Commission, available at: www.ftc.gov\/reports\/privacy3\/priv\u201023a.pdf (accessed 13 August 2008)."},{"key":"key2022020720251543200_b13","doi-asserted-by":"crossref","unstructured":"Gritzalis, S. (2004), \u201cEnhancing web privacy and anonymity in the digital era\u201d, Information Management and Computer Security, Vol. 12 No. 3, pp. 255\u201088.","DOI":"10.1108\/09685220410542615"},{"key":"key2022020720251543200_b14","unstructured":"Hann, I., Hui, K., Lee, T. and Png, I. (2002), \u201cOnline information privacy: measuring the cost\u2010benefit trade\u2010off\u201d, Proceedings of the 23rd International Conference on Information Systems, ACM Press, New York, NY."},{"key":"key2022020720251543200_b15","unstructured":"ISTAG (2001), \u201cScenarios for ambient intelligence in 2010\u201d, European Commission Community Research, IST Advisory Group, available at: www.cordis.lu\/ist\/istag.htm (accessed 13 August 2008)."},{"key":"key2022020720251543200_b16","doi-asserted-by":"crossref","unstructured":"Jiang, X., Hong, J.I. and Landay, J.A. (2002), \u201cApproximate information flows: socially based modeling of privacy in ubiquitous computing\u201d, Proceedings of the 4th International Conference on Ubiquitous Computing, LNCS 2498, Springer, New York, NY, pp. 176\u201093.","DOI":"10.1007\/3-540-45809-3_14"},{"key":"key2022020720251543200_b17","doi-asserted-by":"crossref","unstructured":"Kobsa, A. and Schreck, J. (2003), \u201cPrivacy through pseudonymity in user\u2010adaptive systems\u201d, ACM Transactions on Internet Technology, Vol. 3 No. 2, pp. 149\u201083.","DOI":"10.1145\/767193.767196"},{"key":"key2022020720251543200_b18","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2001), \u201cPrivacy by design: principles of privacy\u2010aware ubiquitous systems\u201d, in Abowd, G., Brumitt, B. and Shafer, S. (Eds), Proceedings of Ubicomp 2001, LNCS 2201, Springer, New York, NY, pp. 273\u201091.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"key2022020720251543200_b19","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. (2002), \u201cA privacy awareness system for ubiquitous computing environments\u201d, Proceedings of Ubicomp, LNCS 2498, Springer, pp. 237\u201045.","DOI":"10.1007\/3-540-45809-3_19"},{"key":"key2022020720251543200_b20","unstructured":"Lasprogata, G., King, N. and Pillay, S. (2004), \u201cRegulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada\u201d, Stanford Technology Law Review, Vol. 4."},{"key":"key2022020720251543200_b21","doi-asserted-by":"crossref","unstructured":"Myles, G., Friday, A. and Davies, N. (2003), \u201cPreserving privacy in environments with location\u2010based applications\u201d, IEEE Pervasive Computing, Vol. 2 No. 1, pp. 56\u201064.","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"key2022020720251543200_b22","unstructured":"Persson, P. (2001), \u201cSocial ubiquitous computing\u201d, Proceedings of the Workshop on Building the Ubiquitous Computing User Experience, ACM\/SIGCHI, Seattle."},{"key":"key2022020720251543200_b23","unstructured":"Rodota, S. (2004), \u201cPrivacy, freedom and dignity\u201d, closing remarks at the 26th International Conference on Privacy and Personal Data Protection, Wroclaw; available at: https:\/\/linproxy.fan.workers.dev:443\/http\/26konferencja.giodo.gov.pl\/data\/resources\/RodotaS.pdf (accessed 13 August 2008)."},{"key":"key2022020720251543200_b24","doi-asserted-by":"crossref","unstructured":"Sadeh, N., Gandon, F. and Kwon, O. (2006), \u201cAmbient intelligence: the MyCampus experience\u201d, in Vasilakos, T. and Pedrycz, W. (Eds), Ambient Intelligence and Pervasive Computing, Artech House, Norwood, MA.","DOI":"10.21236\/ADA481799"},{"key":"key2022020720251543200_b25","unstructured":"Solove, D. (2004), The Digital Person: Technology and Privacy in the Information Age, NYU Press, New York, NY."},{"key":"key2022020720251543200_b26","doi-asserted-by":"crossref","unstructured":"Solove, D. (2006), \u201cA taxonomy of privacy\u201d, University of Pennsylvania Law Review, Vol. 154 No. 3, pp. 477\u2010564.","DOI":"10.2307\/40041279"},{"key":"key2022020720251543200_b27","unstructured":"W3C (2001), \u201cThe platform for privacy preferences 1.0 (P3P1.0) specification\u201d, World Wide Web Consortium, available at: www.w3.org\/P3P\/ (accessed 13 August 2008)."},{"key":"key2022020720251543200_b28","doi-asserted-by":"crossref","unstructured":"Weiser, M. (1991), \u201cThe computer for the twenty\u2010first century\u201d, Scientific American, Vol. 165 No. 3, pp. 94\u2010104.","DOI":"10.1038\/scientificamerican0991-94"},{"key":"key2022020720251543200_b29","unstructured":"Zugenmaier, A. (2002), Anonymity for Users of Mobile Devices through Location Addressing, Rhombos Verlag, Berlin."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240910952346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240910952346\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240910952346\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:21Z","timestamp":1753400421000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.emerald.com\/intr\/article\/19\/2\/194-208\/182393"}},"subtitle":["Research challenges and future directions"],"editor":[{"given":"Jong","family":"Hyuk Park","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2009,4,3]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4,3]]}},"alternative-id":["10.1108\/10662240910952346"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1108\/10662240910952346","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2009,4,3]]}}}