Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing

被引:0
|
作者
Koenings, Bastian [1 ]
Schaub, Florian [1 ]
Weber, Michael [1 ]
机构
[1] Univ Ulm, Inst Media Informat, D-89069 Ulm, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
引用
收藏
页码:364 / 367
页数:4
相关论文
共 50 条
  • [31] An Architectural Model for Situation Awareness in Ubiquitous Computing
    Lopes, J. L.
    Souza, R. S.
    Gadotti, G. I.
    Pernas, A. M.
    Yamin, A. C.
    Geyer, C. F.
    IEEE LATIN AMERICA TRANSACTIONS, 2014, 12 (06) : 1113 - 1119
  • [32] Towards context-awareness in ubiquitous computing
    Wei, Edwin J. Y.
    Chan, Alvin T. S.
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 706 - 717
  • [33] Context-awareness in wearable and ubiquitous computing
    Abowd, GD
    Dey, AK
    Orr, R
    Brotherton, J
    FIRST INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS - DIGEST OF PAPERS, 1997, : 179 - 180
  • [34] Design of context-awareness simulation toolkit for ubiquitous computing Design of context-awareness simulation toolkit for ubiquitous computing
    Kim, InSu
    Park, HeeMan
    Lee, YoungLok
    Lee, HyungHyo
    Noh, BongNam
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-7, 2006, : 3222 - +
  • [35] Privacy protection in ubiquitous computing based on privacy label and information flow
    Hwang, SO
    Yoon, KS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2, 2004, 3044 : 46 - 54
  • [36] A Holistic Framework for Enhancing Privacy Awareness
    Alshehri, A.
    Clarke, N. L.
    Li, F.
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [37] WHO INVADES PRIVACY AND WHY
    KOSA, J
    ZEITSCHRIFT FUR ANGEWANDTE PHYSIK, 1968, 24 (03): : 138 - &
  • [38] PERCEPTIONS OF PRIVACY IN HOME-BASED UBIQUITOUS COMPUTING
    Lorenzen-Huber, L.
    Boutain, M.
    GERONTOLOGIST, 2008, 48 : 25 - 25
  • [39] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [40] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90