Privacy, Security and Trust

Read “Privacy and Trust Issues with Invisible Computers” Lahlou, S. and Röcker, C. Communications of the ACM 48(3): 59-60 (March 2005). What are the five characteristics that make “invisible” computer systems different from more traditional ways of collecting and...