Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing

نویسندگان

  • Ashraf Khalil
  • Kay Connelly
چکیده

INTRODUCTION With the increasing popularity of ubiquitous computing and context-aware services, the privacy challenges posed by such technologies remain one of the biggest concerns. Several research efforts have been aimed at better understanding the privacy concerns, preferences, and management systems in the context of ubiquitous computing [1-4]. Most research on privacy in general and on ubiquitous computing in particular depends, however, on surveys and polls as the main tools of data collection [5, 6]. Context-aware services are very intertwined in our daily lives, they have access to sensitive and private information, and they are in most cases proactive services, (i.e. they can function without explicit and full awareness of the user). These unique characteristics of context-aware services and ubiquitous computing in general only highlight the privacy issues and introduce many challenges that make it difficult for surveys and polls to capture the full picture of user privacy concerns and preferences.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Do I Do What I Say?: Observed Versus Stated Privacy Preferences

This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concerns of sharing context information: a paper based survey and in-situ questionnaires. Results from the two techniques differ significantly, suggesting that surveys are not reliable in predicting privacy concerns regarding context-...

متن کامل

Privacy Invasions in Ubiquitous Computing

While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Top Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study

Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008