• DocumentCode
    570262
  • Title

    In search of user privacy protection in ubiquitous computing

  • Author

    Cleveland, Simon

  • Author_Institution
    Grad. Sch. of Comput. & Inf. Sci., Nova Southeastern Univ., Davie, FL, USA
  • fYear
    2012
  • fDate
    8-10 Aug. 2012
  • Firstpage
    694
  • Lastpage
    699
  • Abstract
    Participatory applications provide users with value-added and reusable information; however, collection of this information comes at the expense of the participants´ privacy. Preserving the mobile participants´ privacy is a key concern of mobile computing. This paper outlines current participatory application system model, privacy weaknesses, and existing privacy enhancing technologies. Next, it proposes a study to address mobile privacy protection by educating participants of exploitable privacy areas of their participatory applications. The contribution of the paper is two-fold: it provides a review of the existing privacy weaknesses of PS applications and demonstrates that participants´ wanting to know more about these weaknesses warrants further study.
  • Keywords
    data privacy; mobile computing; mobile computing; mobile privacy protection; participatory application; privacy enhancing technology; privacy weaknesses; reusable information; ubiquitous computing; user privacy protection; value-added information; Data privacy; Mobile communication; Mobile handsets; Privacy; Sensors; Servers; Ubiquitous computing; mobile privacy solutions; participatory sensing applications; privacy technologies; social computing; ubiquitous computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-4673-2282-9
  • Electronic_ISBN
    978-1-4673-2283-6
  • Type

    conf

  • DOI
    10.1109/IRI.2012.6303077
  • Filename
    6303077