Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing

被引:0
|
作者
Koenings, Bastian [1 ]
Schaub, Florian [1 ]
Weber, Michael [1 ]
机构
[1] Univ Ulm, Inst Media Informat, D-89069 Ulm, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
引用
收藏
页码:364 / 367
页数:4
相关论文
共 50 条
  • [21] In Search of User Privacy Protection in Ubiquitous Computing
    Cleveland, Simon
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 694 - 699
  • [22] An effective method for location privacy in ubiquitous computing
    Lee, G
    Kim, W
    Kim, DK
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1006 - 1015
  • [23] Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy
    Ma, Tinghuai
    Yan, Sen
    Wang, Jin
    Lee, Sungyoung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1185 - 1206
  • [24] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153
  • [25] Privacy Preserving in Ubiquitous Computing: Challenges & Issues
    Ma, Tinghuai
    Kim, Shin-Dug
    Wang, Jun
    Zhao, Yawei
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 297 - +
  • [26] Method for Privacy Requirements Elicitation in Ubiquitous Computing
    da Silva Junior, Deogenes P.
    de Souza, Patricia Cristiane
    Maciel, Cristiano
    SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2018, : 178 - 183
  • [27] Context-Awareness in Wearable and Ubiquitous Computing
    Abowd D.
    Dey A.K.
    Orr R.
    Brotherton J.
    Virtual Reality, 1998, 3 (3) : 200 - 211
  • [28] The Who, What, Why, and How of High Performance Computing in the Cloud
    Gupta, Abhishek
    Kale, Laxmikant V.
    Gioachin, Filippo
    March, Verdi
    Suen, Chun Hui
    Lee, Bu-Sung
    Faraboschi, Paolo
    Kaufmann, Richard
    Milojicic, Dejan
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 306 - 314
  • [29] From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS Identity in Ubiquitous Computing
    Phillips, David
    SOCIAL TEXT, 2005, 23 (02) : 95 - 108
  • [30] Situation, activity and goal awareness in ubiquitous computing
    Chen, Liming
    Rashidi, Parisa
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2012, 8 (03) : 216 - +