2003
DOI: 10.1109/mprv.2003.1251171
|View full text |Cite
|
Sign up to set email alerts
|

A framework for comparing perspectives on privacy and pervasive technologies

Abstract: Legal challenges to pervasive computing systems have largely centered on the question of whether using certain systems constitutes a search according to the Fourth Amendment to the US Constitution. The sidebar "Relevant US Supreme Court Decisions" summarizes several key cases relating to privacy and technology, including Katz v. United States (1967), Kyllo v. United States (2001), Silverman v. United States (1961), and United States v. Karo (1984). When a government agency uses a sensing system to collect data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 3 publications
(2 reference statements)
0
8
0
Order By: Relevance
“…To address some of these concerns, Langheinrich describes the concept of "privacy borders" and argues that designers of ubicomp systems should prevent unintended personal border crossings [21]. Jacobs and Abowd offer a legal perspective on these issues [16]; they introduce an analytic framework consisting of two dimensions-1) the size of the intended audience and 2) the motivation of the reasoning process. They demonstrate how this framework can be used to analyze a case where a family has a location service installed in the home, and the system collects data from multiple stakeholders (residents and guests).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address some of these concerns, Langheinrich describes the concept of "privacy borders" and argues that designers of ubicomp systems should prevent unintended personal border crossings [21]. Jacobs and Abowd offer a legal perspective on these issues [16]; they introduce an analytic framework consisting of two dimensions-1) the size of the intended audience and 2) the motivation of the reasoning process. They demonstrate how this framework can be used to analyze a case where a family has a location service installed in the home, and the system collects data from multiple stakeholders (residents and guests).…”
Section: Related Workmentioning
confidence: 99%
“…They demonstrate how this framework can be used to analyze a case where a family has a location service installed in the home, and the system collects data from multiple stakeholders (residents and guests). These [16,20,21] and other theoretical work [13,28] can help assess privacy aspects of ubicomp systems and explore their socio-technical implications. They also attempt to increase public awareness of privacy issues in ubicomp environments and provide general guidelines to inform design.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, the communitarian view emphasizes the common interest, and espouses an utilitarian view of privacy where individual rights may be circumscribed to benefit the society at large [93]. For an example of how this dichotomy has been translated into a framework for assessing the privacy concerns brought about by ubiquitous computing technologies, see work by Terrel, Jacobs, and Abowd [159,278].…”
Section: Principled Views and Common Interestsmentioning
confidence: 99%
“…From a multilateral security perspective, a standard security threat analysis can yield good results, although quantifying threats might prove difficult. In some instances, it might be possible to calculate the benefits and burdens through risk analysis, as done by Hong et al [18], assuming that the designer's goal is that of minimizing global risk at the social level, which might not always be the case [20].…”
Section: From Principle To Methodsmentioning
confidence: 99%