DocumentCode :
504022
Title :
Understanding and minimizing identity exposure in ubiquitous computing environments
Author :
Zhu, Feng ; Carpenter, Sandra ; Kulkarni, Ajinkya ; Chidambaram, Chockalingam ; Pathak, Shruti
Author_Institution :
Dept. of Comput. Sci., Univ. of Alabama in Huntsville, Huntsville, AL, USA
fYear :
2009
fDate :
13-16 July 2009
Firstpage :
1
Lastpage :
10
Abstract :
Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed and accessed via wireless networks. When identity information is associated with our personal and context information that is gathered by ubiquitous computing devices, personal privacy might be unprecedentedly sacrificed. People, however, have different privacy protection skills, awareness, and privacy preferences. Individuals can be uniquely identified on the basis of only a few identity elements used in combination. To the best of our knowledge, this is the first study to understand the following issues and their relations: a) what identity elements people think are important; b) what actions people claim to take to protect their identities and privacy; c) privacy concerns; d) how people expose their identities in ubiquitous computing environments; and e) how our rational identity exposure model can help to minimize identity exposure. We build a simulated ubiquitous computing shopping system, called InfoSource. It consists of two applications and our rational identity exposure model. We present our experiments and statistical analysis results. Our data show that exposure decisions depend on participants´ attitudes about maintaining privacy, but they do not depend on participants´ concerns and claimed actions related to identity exposure. Our RationalExposure model helped participants to minimize unnecessary exposures.
Keywords :
data privacy; statistical analysis; ubiquitous computing; InfoSource; RationalExposure model; identity exposure; personal privacy protection; statistical analysis; ubiquitous computing; Computational modeling; Data privacy; Game theory; Identity management systems; Internet; Pervasive computing; Protection; Statistical analysis; Ubiquitous computing; Wireless networks; game theory; identity management; privacy; ubiqitous computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, 2009. MobiQuitous '09. 6th Annual International
Conference_Location :
Toronto, ON
Print_ISBN :
978-963-9799-59-2
Type :
conf
DOI :
10.4108/ICST.MOBIQUITOUS2009.6853
Filename :
5326389
Link To Document :
بازگشت