Yaser

CPSC7018108.Yaser History

Hide minor edits - Show changes to output

Changed lines 8-11 from:
Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
to:
Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing.ppt | Privacy in ubiquitous & domestic computing]]
Added lines 11-12:

Handout: [[Attach:Privacy in Ubiquitous Computing.doc | Privacy in ubiquitous & domestic computing]]
Changed lines 8-9 from:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
Presentation: [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]
to:
Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
Changed line 9 from:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.pptx | Privacy in ubiquitous & domestic computing]]
to:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]
Changed lines 8-9 from:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
to:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
Presentation: [[Attach:Privacy in Ubiquitous Computing II.pptx
| Privacy in ubiquitous & domestic computing]]
Changed line 8 from:
Presentation: [[Attach:privacy.pptx | Privacy in ubiquitous & domestic computing]]
to:
Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]
Changed lines 6-8 from:
And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.
to:
And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

Presentation: [[Attach:privacy.pptx | Privacy in ubiquitous & domestic computing]]
Changed line 6 from:
And finally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.
to:
And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.
Changed lines 2-3 from:
Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
to:
Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.
Changed line 6 from:
And finally read this short paper explaining the video: [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]
to:
And finally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.
Changed lines 2-3 from:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., Privacy invasions in ubiquitous computing, Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
to:
Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
Changed lines 2-3 from:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing, Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
to:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., Privacy invasions in ubiquitous computing, Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
Changed lines 2-5 from:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on
Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),
Göteborg, Sweden Sept 29, 2002.]
to:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]
Changed line 2 from:
[[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on
to:
[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on
Changed lines 4-5 from:
Göteborg, Sweden Sept 29, 2002.]]
to:
Göteborg, Sweden Sept 29, 2002.]
Changed lines 1-2 from:
Please read this paper: [[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]
to:
Please read this paper:
[[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on
Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),
Göteborg, Sweden Sept 29, 2002.
]]
Added line 2:
Added line 4:
Changed lines 1-3 from:
[[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]
to:
Please read this paper: [[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]
Then, watch this video: http://grouplab.cpsc.ucalgary.ca/Publications/2003-HomeMediaSpaceVideo.Ubicom
And finally read this short paper explaining the video: [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video
]]
Changed line 1 from:
[[Attach:boundaries_for_privacy.pdf | Boundaries for privacy]]
to:
[[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]
Changed line 1 from:
[[Attach:example.pdf | Example PDF Document]]
to:
[[Attach:boundaries_for_privacy.pdf | Boundaries for privacy]]
Added line 1:
[[Attach:example.pdf | Example PDF Document]]