{"title":"滑动门:随机移动遭遇战","authors":"John P. T. Moore, Sujan Shrestha","doi":"10.1109/I-SOCIETY18435.2011.5978499","DOIUrl":null,"url":null,"abstract":"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Sliding doors: Random mobile encounters\",\"authors\":\"John P. T. Moore, Sujan Shrestha\",\"doi\":\"10.1109/I-SOCIETY18435.2011.5978499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.\",\"PeriodicalId\":158246,\"journal\":{\"name\":\"International Conference on Information Society (i-Society 2011)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Society (i-Society 2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Society (i-Society 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.