Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments

被引:1
|
作者
Sackmann, Stefan [1 ]
机构
[1] Inst Comp Sci & Social Studies, Dept Telemat, D-79098 Freiburg, Germany
关键词
D O I
10.1109/CEC-EEE.2007.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ubiquitous computing technologies (UC) open up new possibilities for stationary retail as well as for e-commerce to realize personalized services. Customer acceptance of such services is generally put at risk because the potential quantity and quality of data collected poses new threats to privacy. Based on economic agency theory, this paper discusses legally binding commitments of the retailer as a promising approach to actively oppose this privacy problem. The analysis indicates that an adoption of this strategy is only rational for "honest" retailers and thus provides an effective possibility to distinguish them from "dishonest" ones. The success of this approach is dependent on an effective provision of "privacy evidences" proving compliance as well as non-compliance. In regard to computer science, the provision of such evidences is discussed as a challenge to a new kind of privacy-enhancing technologies.
引用
收藏
页码:447 / 450
页数:4
相关论文
共 50 条
  • [31] PERCEPTIONS OF PRIVACY IN HOME-BASED UBIQUITOUS COMPUTING
    Lorenzen-Huber, L.
    Boutain, M.
    GERONTOLOGIST, 2008, 48 : 25 - 25
  • [32] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [33] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [34] Entropy Based Personal Privacy Measurement in Ubiquitous Computing
    Ma, Tinghuai
    Cao, Jie
    Otgonbayar, Ankhbayar
    2014 7TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UMEDIA), 2014, : 33 - 36
  • [35] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [36] Genetic privacy: Resolving the conflict between the donor and the child
    Basu, S
    CURRENT SCIENCE, 2004, 86 (10): : 1363 - 1365
  • [37] Enhancing recommendation acceptance: Resolving the personalization-privacy paradox in recommender systems: A privacy calculus perspective
    Wang, Yedi
    Zhu, Jiaji
    Liu, Renhuai
    Jiang, Yushi
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2024, 76
  • [38] A privacy agent in context-aware ubiquitous computing environments
    Zhang, Ni
    Todd, Chris
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
  • [39] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments
    Weber, Stefan G.
    Heinemann, Andreas
    Muehlhaeuser, Max
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
  • [40] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936