Ubicomp 2001: Ubiquitous Computing

N/ACitations
Citations of this article
110Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical pro- tection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers.We introduce a privacy awareness system targeted at ubiquitous com- puting environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.

Cite

CITATION STYLE

APA

Abowd, G. D., Brumitt, B., & Shafer, S. (Eds.). (2001). Ubicomp 2001: Ubiquitous Computing (Vol. 2201, pp. 273–291). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45427-6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free