Understanding identity exposure in pervasive computing environments

被引:21
|
作者
Zhu, Feng [1 ]
Carpenter, Sandra [2 ]
Kulkarni, Ajinkya [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Huntsville, AL 35899 USA
[2] Univ Alabama, Dept Psychol, Huntsville, AL 35899 USA
关键词
Identity management; Pervasive computing; Privacy; PRIVACY; TRUST;
D O I
10.1016/j.pmcj.2011.06.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various miniaturized computing devices that store our identity information are emerging rapidly and are likely to become ubiquitous in the future. They allow private information to be exposed and accessed easily via wireless networks. When identity and context information is gathered by pervasive computing devices, personal privacy might be sacrificed to a greater extent than ever before. People whose information is targeted may have different privacy protection skills, awareness, and privacy preferences. In this research, we studied the following issues and their relations: (a) identity information that people think is important to keep private; (b) actions that people claim to take to protect their identities and privacy; (c) privacy concerns; (d) how people expose their identity information in pervasive computing environments; and (e) how our RationalExposure model can help minimize unnecessary identity exposure. We conducted the research in three stages, a comprehensive survey and two in-lab experiments. We built a simulated pervasive computing shopping system, called InfoSource. It consisted of two applications and our RationalExposure model. Our data show that identity exposure decisions depended on participants' attitudes about maintaining privacy, but did not depend on participants' concerns or security actions that they claimed to have taken. Our RationalExposure model did help the participants reduce unnecessary disclosures. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:777 / 794
页数:18
相关论文
共 50 条
  • [21] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [22] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [23] Discreet verification of user identity in pervasive computing environments using a non-intrusive technique
    Al-Karkhi, Ameera
    Al-Yasiri, Adil
    Linge, Nigel
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 : 102 - 114
  • [24] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [25] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [26] Protecting Users' Anonymity in Pervasive Computing Environments
    Pareschi, Linda
    Riboni, Daniele
    Bettini, Claudio
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 11 - 19
  • [27] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    [J]. WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [28] Advances in security and multimodality for pervasive computing environments
    Park, Jong Hyuk
    Hsu, Ching-Hsien
    Chilamkurti, Naveen
    Denko, Mieso
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1341 - 1342
  • [29] A Hybrid CARV Architecture for Pervasive Computing Environments
    Kim, SoonGohn
    Ko, Eung Nam
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 380 - +
  • [30] On experiments with a transport protocol for pervasive computing environments
    Avancha, S
    Korolev, V
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. COMPUTER NETWORKS, 2002, 40 (04) : 515 - 535