Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing

被引:0
|
作者
Koenings, Bastian [1 ]
Schaub, Florian [1 ]
Weber, Michael [1 ]
机构
[1] Univ Ulm, Inst Media Informat, D-89069 Ulm, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
引用
收藏
页码:364 / 367
页数:4
相关论文
共 50 条
  • [1] AWARENESS COMPUTING: WHAT, WHY, AND HOW?
    Zhao, Qiangfu
    ECTA 2011/FCTA 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION THEORY AND APPLICATIONS AND INTERNATIONAL CONFERENCE ON FUZZY COMPUTATION THEORY AND APPLICATIONS, 2011,
  • [2] AWARENESS COMPUTING: WHAT, WHY, AND HOW?
    Zhao, Qiangfu
    NCTA 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NEURAL COMPUTATION THEORY AND APPLICATIONS, 2011, : IS5 - IS10
  • [3] Awareness computing: What, why, and how?
    University of Aizu, Aizu-Wakamatsu, Fukushima, Japan
    ECTA FCTA - Proc. Int. Conf. Evol. Comput. Theory Appl. Int. Conf. Fuzzy Comput. Theory Appl., (IS5-IS10):
  • [4] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
  • [5] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [6] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [7] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
  • [8] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [9] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [10] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857