G. Abowd and D. , Classroom 2000: An experiment with the instrumentation of a living educational environment, IBM Systems Journal, vol.38, issue.4, pp.508-530, 1999.
DOI : 10.1147/sj.384.0508

G. Abowd, D. Mynatt, E. , and D. , Charting past, present, and future research in ubiquitous computing, ACM Transactions on Computer-Human Interaction, vol.7, issue.1, pp.29-58, 2000.
DOI : 10.1145/344949.344988

A. Adams, The implications of users_ privacy perception on communication and information privacy policies, Proceedings of Telecommunications Policy Research (TPRC), 1999.

A. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, vol.2, issue.1, pp.46-55, 2003.
DOI : 10.1109/MPRV.2003.1186725

A. Beresford and F. Stajano, Mix zones: user privacy in location-aware services, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, pp.127-131, 2004.
DOI : 10.1109/PERCOMW.2004.1276918

K. Boulos, M. , N. Maramba, I. Wheeler, and S. , Wikis, blogs and podcasts: a new generation of Web-based tools for virtual collaborative clinical practice and education, BMC Medical Education, vol.23, issue.1, p.41, 2006.
DOI : 10.1111/j.1471-1842.2006.00640.x

C. Chang, Y. Sheu, J. , and P. , Design and implementation of ad hoc classroom and eSchoolbag systems for ubiquitous learning, Proceedings. IEEE International Workshop on Wireless and Mobile Technologies in Education, pp.8-14, 2002.
DOI : 10.1109/WMTE.2002.1039215

S. Dritsas, D. Gritzalis, and C. Lambrinoudakis, Protecting privacy and anonymity in pervasive computing: trends and perspectives, Telematics and Informatics, vol.23, issue.3, pp.196-210, 2006.
DOI : 10.1016/j.tele.2005.07.005

G. Fitzmaurice, W. Ishii, H. Buxton, W. , A. et al., Bricks, Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '95, pp.442-449, 1995.
DOI : 10.1145/223904.223964

B. Harisson, L. Fishkin, K. , P. Gujar, A. Mochon et al., Squeeze me, hold me, tilt me! An exploration of manipulative user interfaces, Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '98, pp.18-23, 1998.
DOI : 10.1145/274644.274647

U. Jendricke, M. Kreutzer, and A. Zugenmaier, Pervasive privacy with identity management, Proceedings of the Workshop on Security in Ubiquitous Computing, 2002.

X. Jiang and J. Landay, Modeling privacy control in context-aware systems, IEEE Pervasive Computing, vol.1, issue.3, pp.59-63, 2002.
DOI : 10.1109/MPRV.2002.1037723

M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, Proceedings of UbiComp 2002, pp.2498-237, 2002.
DOI : 10.1007/3-540-45809-3_19

S. Lederer, A. Dey, and J. Mankoff, A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments, 2002.

L. Lessig, The architecture of privacy, Proceedings of the Taiwan NET _98 Conference, 1998.

J. Muhtadi, . Al, R. Campbell, A. Kapadia, M. Mickunas et al., Routing through the mist: privacy preserving communication in ubiquitous computing environments, Proceedings of the International Conference on Distributed Computing Systems, 2002.

D. Nguyen and E. Mynatt, Privacy mirrors: understanding and shaping sociotechnical ubiquitous computing systems, 2002.

Y. Shi, W. Xie, G. Xu, R. Shi, E. Chen et al., The smart classroom: merging technologies for seamless tele-education, pp.47-55, 2003.

V. Smothers, SCORM From Healthcare Specifications and Description Document, v0.6. MedBiquitous Consortium http://www.medbiq.org/working_groups/learning_objects/index, 2005.

V. Smothers, Healthcare Learning Object Metadata Specifications and Description Document,v0.9. MedBiquitous Consortium http://www.medbiq.org/working_groups/learning_objects/HealthcareLOMSpecification, 2007.

M. Weiser, The Computer for the 21st Century, Scientific American, vol.265, issue.3, pp.94-104, 1991.
DOI : 10.1038/scientificamerican0991-94