Author_Institution :
Sch. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA
Abstract :
In the Internet´s early days, few people foresaw the emergence of spam, phishing schemes, and malware such as viruses, worms, Trojan horses, spyware, and key loggers that plague users today. It´s safe to assume that ubicomp technologies will suffer from the same sorts of unforeseen vulnerabilities that have plagued the Internet. We can´t account for every possible security and privacy risk in ubiquitous computing systems. We can, however, design such systems to reduce the burden on users as well as develop better security models and interaction techniques to prevent and minimize foreseeable threats.
Keywords :
data privacy; human computer interaction; risk management; security of data; ubiquitous computing; Internet; Trojan horses; computer viruses; interaction technique; key logger; malware; phishing scheme; privacy risk; security risk minimization; spam emergence; spyware; ubicomp system; ubiquitous computing system; worms; Biometrics; Data security; Fingerprint recognition; Intelligent networks; Personal digital assistants; Pervasive computing; Portable computers; Privacy; User interfaces; Wireless networks; Invisible computing; Mobile devices; Security; Wireless networks;