Location spoofing

Richard Glassey

Research output: Contribution to conferencePaper

Abstract

The ability to blur and lie about our location does deserve consideration and should not be treated as entirely malevolent. It will be up to designers to allow the user to have full responsibility and freedom over the access control of their location information, rather than force adherence to uncomfortable regimes of dictated access control.

Conference

ConferenceProceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004
CityNottingham, England
Period7/09/0410/09/04

Fingerprint

Access control

Keywords

  • location awareness
  • access control
  • computer science

Cite this

Glassey, R. (2004). Location spoofing. Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, .
Glassey, Richard. / Location spoofing. Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, .1 p.
@conference{06e5a478612f4515abb0ae48cbf727bb,
title = "Location spoofing",
abstract = "The ability to blur and lie about our location does deserve consideration and should not be treated as entirely malevolent. It will be up to designers to allow the user to have full responsibility and freedom over the access control of their location information, rather than force adherence to uncomfortable regimes of dictated access control.",
keywords = "location awareness, access control, computer science",
author = "Richard Glassey",
year = "2004",
month = "9",
day = "7",
language = "English",
note = "Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004 ; Conference date: 07-09-2004 Through 10-09-2004",

}

Glassey, R 2004, 'Location spoofing' Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, 7/09/04 - 10/09/04, .

Location spoofing. / Glassey, Richard.

2004. Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, .

Research output: Contribution to conferencePaper

TY - CONF

T1 - Location spoofing

AU - Glassey, Richard

PY - 2004/9/7

Y1 - 2004/9/7

N2 - The ability to blur and lie about our location does deserve consideration and should not be treated as entirely malevolent. It will be up to designers to allow the user to have full responsibility and freedom over the access control of their location information, rather than force adherence to uncomfortable regimes of dictated access control.

AB - The ability to blur and lie about our location does deserve consideration and should not be treated as entirely malevolent. It will be up to designers to allow the user to have full responsibility and freedom over the access control of their location information, rather than force adherence to uncomfortable regimes of dictated access control.

KW - location awareness

KW - access control

KW - computer science

M3 - Paper

ER -

Glassey R. Location spoofing. 2004. Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, .