Method for Privacy Requirements Elicitation in Ubiquitous Computing

被引:1
|
作者
da Silva Junior, Deogenes P. [1 ]
de Souza, Patricia Cristiane [1 ]
Maciel, Cristiano [1 ]
机构
[1] Inst Comp, Cuiaba, Mato Grosso, Brazil
关键词
Privacy; Ubiquitous Computing; Method;
D O I
10.1145/3266237.3266239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 50 条
  • [41] A privacy agent in context-aware ubiquitous computing environments
    Zhang, Ni
    Todd, Chris
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
  • [42] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments
    Weber, Stefan G.
    Heinemann, Andreas
    Muehlhaeuser, Max
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
  • [43] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
  • [44] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing
    Koenings, Bastian
    Schaub, Florian
    Weber, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
  • [45] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
    Canedo, Edna Dias
    Bandeira, Ian Nery
    Seidel Calazans, Angelica Toffano
    Teixeira Costa, Pedro Henrique
    Rodrigues Cancado, Emille Catarine
    Bonifacio, Rodrigo
    REQUIREMENTS ENGINEERING, 2023, 28 (02) : 177 - 194
  • [46] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
    Edna Dias Canedo
    Ian Nery Bandeira
    Angelica Toffano Seidel Calazans
    Pedro Henrique Teixeira Costa
    Emille Catarine Rodrigues Cançado
    Rodrigo Bonifácio
    Requirements Engineering, 2023, 28 : 177 - 194
  • [47] Devices that tell on you: Privacy trends in consumer ubiquitous computing
    Saponas, T. Scott
    Lester, Jonathan
    Hartung, Carl
    Agarwal, Sarneer
    Kohno, Tadayoshi
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 55 - 70
  • [48] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [49] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
  • [50] Special issue: Security and privacy in WoT, ubiquitous and mobile computing
    Akshi Kumar
    Personal and Ubiquitous Computing, 2024, 28 (1) : 109 - 109