Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding

Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding
View Sample PDF
Author(s): Elena Vildjiounaite (VTT Technical Research Centre of Finland, Finland), Tapani Rantakokko (Finwe LTD, Finland), Petteri Alahuhta (VTT Technical Research Centre of Finland, Finland), Pasi Ahonen (VTT Technical Research Centre of Finland, Finland), David Wright (Trilateral Research and Consulting, UK)and Michael Friedewald (Fraunhofer Institute Systems and Innovation Research, Germany)
Copyright: 2010
Pages: 25
Source title: Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Judith Symonds (AUT University, New Zealand)
DOI: 10.4018/978-1-60566-960-1.ch089


View Privacy Threats in Emerging Ubicomp Applications: Analysis and Safeguarding on the publisher's website for pricing and purchasing information.


Realization of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning based on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications are often proposed without considering privacy issues, whereas existing privacy-enhancing technologies mainly have been developed for networked applications and, thus, are not always applicable to emerging applications for smart spaces and personal devices, especially because the users and their data are not spatially separated in such applications. A partial solution to the problem of users’ privacy protection could be to allow users to control how their personal data can be used. The authors’ experience with mobile phone data collection, nevertheless, suggests that when users give their consent for the data collection, they don’t fully understand the possible privacy implications. Thus, application developers should pay attention to privacy protection; otherwise, such problems could result in users not accepting Ubicomp applications. This chapter suggests guidelines for estimating threats to privacy, depending on real world application settings and the choice of technology; and guidelines for the choice and development of technological safeguards against privacy threats.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom