Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments

Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments

Nicolas Liampotis, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, Nicholas Kenelm Taylor
ISBN13: 9781466687325|ISBN10: 1466687320|EISBN13: 9781466687332
DOI: 10.4018/978-1-4666-8732-5.ch016
Cite Chapter Cite Chapter

MLA

Liampotis, Nicolas, et al. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." Handbook of Research on Next Generation Mobile Communication Systems, edited by Athanasios D. Panagopoulos, IGI Global, 2016, pp. 410-439. https://doi.org/10.4018/978-1-4666-8732-5.ch016

APA

Liampotis, N., Papadopoulou, E., Kalatzis, N., Roussaki, I. G., Kosmides, P., Sykas, E. D., Bental, D., & Taylor, N. K. (2016). Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments. In A. Panagopoulos (Ed.), Handbook of Research on Next Generation Mobile Communication Systems (pp. 410-439). IGI Global. https://doi.org/10.4018/978-1-4666-8732-5.ch016

Chicago

Liampotis, Nicolas, et al. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Handbook of Research on Next Generation Mobile Communication Systems, edited by Athanasios D. Panagopoulos, 410-439. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8732-5.ch016

Export Reference

Mendeley
Favorite

Abstract

The more information users disclose to pervasive systems or social media, the better quality and enhanced experience they enjoy for a wider variety of personalised services. However, the privacy concerns of individuals that use such systems have dramatically risen the last years, especially after several events of massive security breaches in various computing or communication systems that have reached the news. This chapter presents the approach being employed by the SOCIETIES project to protect the privacy of sensitive user data and ensure the trustworthiness of delivered services via social and pervasive computing systems. This framework has already been designed, implemented and evaluated via real user trials engaging wide and heterogeneous user populations. In addition to the respective requirements, architecture and features discussed herewith, this chapter elaborates on the user trial that has been conducted in university settings to validate this system focusing on the privacy and trust evaluation results obtained.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.