Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications

نویسندگان

  • Elena Vildjiounaite
  • Petteri Alahuhta
  • Pasi Ahonen
  • David Wright
  • Michael Friedewald
چکیده

Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy implications of RFID: an assessment of threats and opportunites

European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for safeguarding privacy. `Privacy by design ́ offers interesting opportunities to build in privacy gu...

متن کامل

Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications

Privacy is a complex social process that will persist in one form or another as a fundamental feature of the substrate into which ubiquitous computing (ubicomp) is threaded. Hospitals are natural candidates for the deployment of ubicomp technology while at the same time face significant privacy requirements. To better understand the privacy issues related to the use of ubicomp we place our effo...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

The Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

متن کامل

Systematic Design for Privacy in Ubicomp

In designing ubicomp systems the common practice is to select a framing of privacy from the range of definitions, and to use that to inform design. Yet this framing may not be the choice made by those who will interact with the design. We propose utilizing the design for values approach in order to leverage the complexity of privacy to improve designs. In design for values, also called value-se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006