# Yaser

## CPSC7018108.Yaser History

Hide minor edits - Show changes to output

Changed lines 8-11 from:

Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing~~ II~~.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing~~ II~~.ppt | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing

to:

Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing.ppt | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing.ppt | Privacy in ubiquitous & domestic computing]]

Added lines 11-12:

Handout: [[Attach:Privacy in Ubiquitous Computing.doc | Privacy in ubiquitous & domestic computing]]

Changed lines 8-9 from:

Presentation~~: [[Attach:Privacy in Ubiquitous Computing~~ II.~~ppt~~ | Privacy in ubiquitous & domestic computing]]

Presentation~~: [[Attach:Privacy in Ubiquitous Computing~~ II.~~zip~~ | Privacy in ubiquitous & domestic computing]]

Presentation

to:

Presentation (PowerPoint 2007): [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]

Presentation (PowerPoint 2003): [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]

Changed line 9 from:

Presentation: [[Attach:Privacy in Ubiquitous Computing II.~~pptx~~ | Privacy in ubiquitous & domestic computing]]

to:

Presentation: [[Attach:Privacy in Ubiquitous Computing II.zip | Privacy in ubiquitous & domestic computing]]

Changed lines 8-9 from:

Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]

to:

Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]

Presentation: [[Attach:Privacy in Ubiquitous Computing II.pptx | Privacy in ubiquitous & domestic computing]]

Presentation: [[Attach:Privacy in Ubiquitous Computing II.pptx | Privacy in ubiquitous & domestic computing]]

Changed line 8 from:

Presentation: [[Attach:~~privacy.pptx~~ | Privacy in ubiquitous & domestic computing]]

to:

Presentation: [[Attach:Privacy in Ubiquitous Computing II.ppt | Privacy in ubiquitous & domestic computing]]

Changed lines 6-8 from:

And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

to:

And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

Presentation: [[Attach:privacy.pptx | Privacy in ubiquitous & domestic computing]]

Presentation: [[Attach:privacy.pptx | Privacy in ubiquitous & domestic computing]]

Changed line 6 from:

And ~~finally~~ read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

to:

And optionally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

Changed lines 2-3 from:

Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.~~]~~

to:

Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.

Changed line 6 from:

And finally read this short paper explaining the video: ~~[[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space~~: The Video]]

to:

And finally read this short paper explaining the video: Neustaedter, C. and Greenberg, S. (2003) [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]. In Video Proceedings of the Fifth International Conference on Ubiquitous Computing - UBICOMP'03.

Changed lines 2-3 from:

to:

Langheinrich, M., [[Attach:boundaries_for_privacy.pdf | Privacy invasions in ubiquitous computing]], Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]

Changed lines 2-3 from:

[Attach:boundaries_for_privacy.pdf | Langheinrich, M., ~~“Privacy~~ invasions in ubiquitous computing,~~”~~ Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]

to:

[Attach:boundaries_for_privacy.pdf | Langheinrich, M., Privacy invasions in ubiquitous computing, Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]

Changed lines 2-5 from:

[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on

Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),

Göteborg, Sweden Sept 29, 2002.]

Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),

Göteborg, Sweden Sept 29, 2002.]

to:

[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),Göteborg, Sweden Sept 29, 2002.]

Changed line 2 from:

to:

[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on

Changed lines 4-5 from:

Göteborg, Sweden Sept 29, 2002.~~]~~]

to:

Göteborg, Sweden Sept 29, 2002.]

Changed lines 1-2 from:

Please read this paper: [[Attach:boundaries_for_privacy.pdf | ~~Privacy Invasions in Ubiquitous Computing~~]]

to:

Please read this paper:

[[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on

Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),

Göteborg, Sweden Sept 29, 2002.]]

[[Attach:boundaries_for_privacy.pdf | Langheinrich, M., “Privacy invasions in ubiquitous computing,” Workshop on

Socially-informed Design of Privacy-enhancing Solutions (Ubicomp 2002),

Göteborg, Sweden Sept 29, 2002.]]

Changed lines 1-3 from:

to:

Please read this paper: [[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]

Then, watch this video: http://grouplab.cpsc.ucalgary.ca/Publications/2003-HomeMediaSpaceVideo.Ubicom

And finally read this short paper explaining the video: [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]

Then, watch this video: http://grouplab.cpsc.ucalgary.ca/Publications/2003-HomeMediaSpaceVideo.Ubicom

And finally read this short paper explaining the video: [[Attach:context_aware_video.pdf | The Design of a Context-Aware Home Media Space: The Video]]

Changed line 1 from:

[[Attach:boundaries_for_privacy.pdf | ~~Boundaries for privacy~~]]

to:

[[Attach:boundaries_for_privacy.pdf | Privacy Invasions in Ubiquitous Computing]]

Changed line 1 from:

[[Attach:~~example~~.pdf | ~~Example PDF Document~~]]

to:

[[Attach:boundaries_for_privacy.pdf | Boundaries for privacy]]