Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments

被引:1
|
作者
Sackmann, Stefan [1 ]
机构
[1] Inst Comp Sci & Social Studies, Dept Telemat, D-79098 Freiburg, Germany
关键词
D O I
10.1109/CEC-EEE.2007.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ubiquitous computing technologies (UC) open up new possibilities for stationary retail as well as for e-commerce to realize personalized services. Customer acceptance of such services is generally put at risk because the potential quantity and quality of data collected poses new threats to privacy. Based on economic agency theory, this paper discusses legally binding commitments of the retailer as a promising approach to actively oppose this privacy problem. The analysis indicates that an adoption of this strategy is only rational for "honest" retailers and thus provides an effective possibility to distinguish them from "dishonest" ones. The success of this approach is dependent on an effective provision of "privacy evidences" proving compliance as well as non-compliance. In regard to computer science, the provision of such evidences is discussed as a challenge to a new kind of privacy-enhancing technologies.
引用
收藏
页码:447 / 450
页数:4
相关论文
共 50 条
  • [41] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing
    Koenings, Bastian
    Schaub, Florian
    Weber, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
  • [42] Devices that tell on you: Privacy trends in consumer ubiquitous computing
    Saponas, T. Scott
    Lester, Jonathan
    Hartung, Carl
    Agarwal, Sarneer
    Kohno, Tadayoshi
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 55 - 70
  • [43] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [44] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
  • [45] Special issue: Security and privacy in WoT, ubiquitous and mobile computing
    Akshi Kumar
    Personal and Ubiquitous Computing, 2024, 28 (1) : 109 - 109
  • [46] A privacy-aware service protocol for ubiquitous computing environments
    Lee, Gunhee
    Chae, Song-hwa
    Hwang, Inwhan
    Hong, Manpyo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 619 - 628
  • [47] Keeping ubiquitous computing to yourself: A practical model for user control of privacy
    Price, BA
    Adam, K
    Nuseibeh, B
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 228 - 253
  • [48] Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"
    Liu, Peng
    Molva, Refik
    Jing, Jiwu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1522 - 1523
  • [49] Routing through the mist: Privacy preserving communication in ubiquitous computing environments
    Al-Muhtadi, J
    Campbell, R
    Kapadia, A
    Mickunas, MD
    Yi, S
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
  • [50] A flexible, privacy-preserving authentication framework for ubiquitous computing environments
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776