Location spoofing

Richard Glassey

Research output: Contribution to conferencePaper

8 Downloads (Pure)

Abstract

The ability to blur and lie about our location does deserve consideration and should not be treated as entirely malevolent. It will be up to designers to allow the user to have full responsibility and freedom over the access control of their location information, rather than force adherence to uncomfortable regimes of dictated access control.
Original languageEnglish
Number of pages1
Publication statusPublished - 7 Sep 2004
EventProceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004 - Nottingham, England
Duration: 7 Sep 200410 Sep 2004

Conference

ConferenceProceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004
CityNottingham, England
Period7/09/0410/09/04

Keywords

  • location awareness
  • access control
  • computer science

Fingerprint Dive into the research topics of 'Location spoofing'. Together they form a unique fingerprint.

  • Cite this

    Glassey, R. (2004). Location spoofing. Paper presented at Proceedings of the 2nd Workshop on Location-aware Computing, UbiComp 2004, Nottingham, England, .