Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments

被引:1
|
作者
Sackmann, Stefan [1 ]
机构
[1] Inst Comp Sci & Social Studies, Dept Telemat, D-79098 Freiburg, Germany
关键词
D O I
10.1109/CEC-EEE.2007.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ubiquitous computing technologies (UC) open up new possibilities for stationary retail as well as for e-commerce to realize personalized services. Customer acceptance of such services is generally put at risk because the potential quantity and quality of data collected poses new threats to privacy. Based on economic agency theory, this paper discusses legally binding commitments of the retailer as a promising approach to actively oppose this privacy problem. The analysis indicates that an adoption of this strategy is only rational for "honest" retailers and thus provides an effective possibility to distinguish them from "dishonest" ones. The success of this approach is dependent on an effective provision of "privacy evidences" proving compliance as well as non-compliance. In regard to computer science, the provision of such evidences is discussed as a challenge to a new kind of privacy-enhancing technologies.
引用
收藏
页码:447 / 450
页数:4
相关论文
共 50 条
  • [1] Legally binding anonymous multiparty commitments on a blockchain
    Chawdhuri, Debasish Ray
    2020 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2020), 2020, : 43 - 55
  • [2] Theme issue on adaptation and personalization for ubiquitous computing
    Yu, Zhiwen
    Cheng, Doreen
    Khalil, Ismail
    Kay, Judy
    Heckmann, Dominikus
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (05) : 467 - 468
  • [3] Theme issue on adaptation and personalization for ubiquitous computing
    Zhiwen Yu
    Doreen Cheng
    Ismail Khalil
    Judy Kay
    Dominikus Heckmann
    Personal and Ubiquitous Computing, 2012, 16 : 467 - 468
  • [4] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [5] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [6] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
  • [7] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [8] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [9] A situation aware personalization in ubiquitous mobile computing environments
    Chae, Heeseo
    Kim, Do-Hoon
    Jeong, Dongwon
    In, Hoh Peter
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 213 - 223
  • [10] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857