Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing
نویسندگان
چکیده
INTRODUCTION With the increasing popularity of ubiquitous computing and context-aware services, the privacy challenges posed by such technologies remain one of the biggest concerns. Several research efforts have been aimed at better understanding the privacy concerns, preferences, and management systems in the context of ubiquitous computing [1-4]. Most research on privacy in general and on ubiquitous computing in particular depends, however, on surveys and polls as the main tools of data collection [5, 6]. Context-aware services are very intertwined in our daily lives, they have access to sensitive and private information, and they are in most cases proactive services, (i.e. they can function without explicit and full awareness of the user). These unique characteristics of context-aware services and ubiquitous computing in general only highlight the privacy issues and introduce many challenges that make it difficult for surveys and polls to capture the full picture of user privacy concerns and preferences.
منابع مشابه
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concerns of sharing context information: a paper based survey and in-situ questionnaires. Results from the two techniques differ significantly, suggesting that surveys are not reliable in predicting privacy concerns regarding context-...
متن کاملPrivacy Invasions in Ubiquitous Computing
While recent surveys often cite people who have experienced some form of privacy invasion, the exact nature of such invasions remains elusive. Yet in order to build ubiquitous computing systems that will respect the privacy of the individual, it is crucial to understand when it is exactly that people feel their privacy has been invaded. This paper motivates why privacy is necessary, describes a...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملTop Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study
Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the infor...
متن کامل