Privacy Factors for Successful Ubiquitous Computing
نویسندگان
چکیده
Certain privacy principles have been established by industry, (e.g. USCAM, 2006). Over the past two years, we have been trying to understand whether such principles reflect the concerns of the ordinary citizen. We have developed a method of enquiry which displays a rich context to the user in order to elicit more detailed information about those privacy factors that underpin our acceptance of ubiquitous computing. To investigate use and acceptance Videotaped Activity Scenarios specifically related to the exchange of health, financial, shopping and e-voting information and a large scale survey were used. We present a detailed analysis of user concerns firstly in terms of a set of constructs that might reflect user-generated privacy principles; secondly those factors likely to play a key role in an individuals cost-benefit analysis and thirdly, longer-term concerns of the citizen in terms of the impact of new technologies on social engagement and human values. [Article copies are available for purchase from InfoSci-on-Demand.com]
منابع مشابه
Towards a Deconstruction of the Privacy Space
When designing for or discussing privacy, it is critical to identify the conditions that create a system’s or phenomenon’s privacy implications. We present a set of interdependent dimensions that, when applied to the analysis of a privacy-related system or phenomenon, can expose the factors that determine the role of privacy therein. This can help focus the scope of discourse and the design of ...
متن کاملA Conceptual Model and Metaphor of Everyday Privacy in Ubiquitous Computing
We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest e...
متن کاملA Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments
We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest e...
متن کاملEveryday Privacy in Ubiquitous Computing Environments
We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the enduser’s ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and con...
متن کاملA Privacy-Aware Service Protocol for Ubiquitous Computing Environments
In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJEBR
دوره 5 شماره
صفحات -
تاریخ انتشار 2009