Data Privacy Ontology for Ubiquitous Computing
نویسندگان
چکیده
منابع مشابه
Data Privacy Ontology for Ubiquitous Computing
Privacy is an ability to understand, choose, and regulate what personal data one shares, with whom, for how long and under what context. Data owners must not lose the rights of ownership, once the data is shared. Privacy decisions have many components that include identity, access granularity, time and context. We propose an ontology based model for data privacy configuration in terms of produc...
متن کاملPrivacy in Ubiquitous Computing
The advent of Ubiquitous Computing (UbiComp) has brought a set of new challenges along with numerous advantages. The notion of UbiComp was envisioned in 1991 by Marc Weiser in his seminal paper [1] and has become a hot topic ever since. Despite a lot of research conducted in the area, there are still a lot of issues to elaborate on. In this position paper, we describe our concerns about designi...
متن کاملLocation privacy in ubiquitous computing
The field of ubiquitous computing envisages an era when the average consumer owns hundreds or thousands of mobile and embedded computing devices. These devices will perform actions based on the context of their users, and therefore ubiquitous systems will gather, collate and distribute much more personal information about individuals than computers do today. Much of this personal information wi...
متن کاملPrivacy Factors for Successful Ubiquitous Computing
Certain privacy principles have been established by industry, (e.g. USCAM, 2006). Over the past two years, we have been trying to understand whether such principles reflect the concerns of the ordinary citizen. We have developed a method of enquiry which displays a rich context to the user in order to elicit more detailed information about those privacy factors that underpin our acceptance of u...
متن کاملPrivacy Invasions in Ubiquitous Computing
While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2017
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2017.080120