Method for Privacy Requirements Elicitation in Ubiquitous Computing

被引:1
|
作者
da Silva Junior, Deogenes P. [1 ]
de Souza, Patricia Cristiane [1 ]
Maciel, Cristiano [1 ]
机构
[1] Inst Comp, Cuiaba, Mato Grosso, Brazil
关键词
Privacy; Ubiquitous Computing; Method;
D O I
10.1145/3266237.3266239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 50 条
  • [31] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [32] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [33] Entropy Based Personal Privacy Measurement in Ubiquitous Computing
    Ma, Tinghuai
    Cao, Jie
    Otgonbayar, Ankhbayar
    2014 7TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UMEDIA), 2014, : 33 - 36
  • [34] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [35] Design Thinking Empathy Phase as a Facilitator in Privacy Requirements Elicitation
    Canedo, Edna Dias
    Seidel Calazans, Angelica Toffano
    Cerqueira, Anderson Jefferson
    Teixeira Costa, Pedro Henrique
    Seidel Masson, Eloisa Toffano
    AMCIS 2020 PROCEEDINGS, 2020,
  • [36] A method for requirements elicitation and formal specification
    Heisel, M
    Souquières, J
    CONCEPTUAL MODELING - ER'99, 1999, 1728 : 309 - 324
  • [37] On safety and security requirements in emerging ubiquitous computing models
    Simpson, Andrew (Andrew.Simpson@cs.ox.ac.uk), 1600, Oxford University Press (59):
  • [38] Design requirements for ubiquitous computing environments for healthcare professionals
    Bång, M
    Larsson, A
    Eriksson, H
    MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 1416 - 1420
  • [39] On Safety and Security Requirements in Emerging Ubiquitous Computing Models
    Osborn, Emma
    Simpson, Andrew
    COMPUTER JOURNAL, 2016, 59 (04): : 570 - 591
  • [40] An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example
    Beckers, Kristian
    Fassbender, Stephan
    Schmidt, Holger
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 463 - 472