2004
DOI: 10.1023/b:bttj.0000047125.97546.4a
|View full text |Cite
|
Sign up to set email alerts
|

Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 21 publications
0
14
0
1
Order By: Relevance
“…Further, the initial cost of the sensor is small, its physical footprint is negligible and it can be easily secured. We do not expect significant 'sensor vandalism' [5] given the low cost of the sensors, the security of the university campus and the nonintrusive nature of the sensing [6]. However a planned future project will look at new ways to assure the trustworthiness of this infrastructure.…”
Section: B Benefitsmentioning
confidence: 99%
“…Further, the initial cost of the sensor is small, its physical footprint is negligible and it can be easily secured. We do not expect significant 'sensor vandalism' [5] given the low cost of the sensors, the security of the university campus and the nonintrusive nature of the sensing [6]. However a planned future project will look at new ways to assure the trustworthiness of this infrastructure.…”
Section: B Benefitsmentioning
confidence: 99%
“…many 'concerned' individuals share great amounts of personal information (Acquisti and Gross, 2006). Soppera and Burbridge (2006) raise a range of privacy concerns in relation to the emergence of pervasive computing technologies that are embedded in the fabric of everyday life. They first note that these devices will "disappear so effectively that end users will lose awareness of the devices' presence or purpose", and in this case, they point out that if "you cannot interact with the computer, how can you tell what data is collected, where the data is flowing to, and more importantly, what the consequences of your actions are?".…”
Section: Privacymentioning
confidence: 99%
“…In many cases shared technologies will capture personal and potentially sensitive data about individuals. For example monitoring appliances in the home can lead to personally--identifiable information being collected about the activities of members of a household (Soppera and Burbridge, 2006 ;Karotz, 2012). Research is required to understand how people interpret and react to these new kinds of data in order to inform design and identify the social consequences of introducing these technologies.…”
Section: Introductionmentioning
confidence: 99%
“…Because of the policy complexity, these P3P-based approaches are believed not to be the solution for pervasive computing environments [13]. Leonhardt and Magee use high level policies for access control and privacy protection in pervasive computing environments [7].…”
Section: Related Workmentioning
confidence: 99%
“…Confab's data model is used to represent context information including locations, activities, and services. Confab and other frameworks [1,13] do not provide sophisticated methods to help users make decisions. Our approach complements the frameworks and improves the usability by helping users to make rational decisions.…”
Section: Related Workmentioning
confidence: 99%