Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding

Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding

Elena Vildjiounaite (VTT Technical Research Centre of Finland, Finland), Tapani Rantakokko (Finwe LTD, Finland), Petteri Alahuhta (VTT Technical Research Centre of Finland, Finland), Pasi Ahonen (VTT Technical Research Centre of Finland, Finland), David Wright (Trilateral Research and Consulting, UK) and Michael Friedwwald (Fraunhofer Institute Systems and Innovation Research, Germany)
Copyright: © 2008 |Pages: 32
DOI: 10.4018/978-1-59904-840-6.ch012
OnDemand PDF Download:
$37.50

Abstract

Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning based on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications are often proposed without considering privacy issues, whereas existing privacyenhancing technologies mainly have been developed for networked applications and, thus, are not always applicable to emerging applications for smart spaces and personal devices, especially because the users and their data are not spatially separated in such applications. A partial solution to the problem of users’ privacy protection could be to allow users to control how their personal data can be used. The authors’ experience with mobile phone data collection, nevertheless, suggests that when users give their consent for the data collection, they don’t fully understand the possible privacy implications. Thus, application developers should pay attention to privacy protection; otherwise, such problems could result in users not accepting Ubicomp applications. This chapter suggests guidelines for estimating threats to privacy, depending on real world application settings and the choice of technology; and guidelines for the choice and development of technological safeguards against privacy threats.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Anupam Joshi
Preface
Soraya Kouadri Mostefaoui, Zakaria Maamar, George M. Giaglis
Acknowledgment
Soraya Kouadri Mostefaoui, Zakaria Maamar, George M. Giaglis
Chapter 1
Marco Avvenuti, Alessio Vecchio
The growing ubiquity and usability of smart mobile phones can be exploited to develop popular and realistic pervasive computing applications. Adding... Sample PDF
Mobile Phone and Visual Tags: Linking the Physical World to the Digital Domain
$37.50
Chapter 2
Rachid Benlamri, Jawad Berri, Yacine Atif
This chapter focuses on the theoretical and technological aspects of designing mobile learning (m-learning) services that deliver context-aware... Sample PDF
Context-Aware Mobile Learning on the Semantic Web
$37.50
Chapter 3
Jose Eduardo Fernandes, Ricardo J. Machado, Joao Alvaro Carvalho
This chapter focuses on design methodologies for pervasive information systems (PIS). It aims to contribute to the efficiency and effectiveness of... Sample PDF
Model-Driven Development for Pervasive Information Systems
$37.50
Chapter 4
Rui Huang, Gergely V. Záruba, Sajal Das
In this chapter, we will study the localization problem in ubiquitous computing environments. In general, localization refers to the problem of... Sample PDF
Device Localization in Ubiquitous Computing Environments
$37.50
Chapter 5
Christine Julien, Sanem Kabadayi
Emerging pervasive computing scenarios involve client applications that dynamically collect information directly from the local environment. The... Sample PDF
Enabling Programmable Ubiquitous Computing Environments: A Middleware Perspective
$37.50
Chapter 6
Dimitrios C. Karaiskos, Panayiotis E. Kourouthanassis
RFID ticketing systems constitute a particular type of pervasive information systems providing spectators of sports events with a transparent... Sample PDF
Determinants of User Acceptance for RFID Ticketing Systems
$37.50
Chapter 7
Stephen Kimani, Silvia Gabrielli, Tiziana Catarci, Alan Dix
The traditional desktop computing paradigm has had major successes. It also should be noted that we are in a day and age where many good computer... Sample PDF
Designing for Tasks in Ubiquitous Computing: Challenges and Considerations
$37.50
Chapter 8
Vincenzo Pallotta, Pascal Bruegger, Béat Hirsbrunner
This chapter presents a conceptual framework for an emerging type of user interfaces for mobile ubiquitous computing systems, and focuses in... Sample PDF
Kinetic User Interfaces: Physical Embodied Interaction with Mobile Ubiquitous Computing Systems
$37.50
Chapter 9
Teresa Romão, Luís Rato, Antão Almada, A. Eduardo Dias
Traffic information is crucial in metropolitan areas, where a high concentration of moving vehicles causes traffic congestion and blockage.... Sample PDF
M-Traffic: Mobile Traffic Information and Monitoring System
$37.50
Chapter 10
Christian Schmitt, Detlef Schoder, Kai Fischbach, Steffen Muhle
Ubiquitous computing enables the development of new innovative applications and services. Particularly influential on future business services will... Sample PDF
Towards Ambient Business: Enabling Open Innovation in a World of Ubiquitous Computing
$37.50
Chapter 11
João Pedro Sousa, Bradley Schmerl, Peter Steenkiste, David Garlan
This chapter introduces a new way of thinking about software systems for supporting the activities of end-users. In this approach, models of user... Sample PDF
Activity-Oriented Computing
$37.50
Chapter 12
Elena Vildjiounaite, Tapani Rantakokko, Petteri Alahuhta, Pasi Ahonen, David Wright, Michael Friedwwald
Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by... Sample PDF
Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding
$37.50
About the Contributors