How to Understand AI's Privacy Threats in Ubiquitous Computing

被引:4
|
作者
Toch, Eran [1 ]
Birman, Yoni [1 ]
机构
[1] Tel Aviv Univ, IL-6997801 Tel Aviv, Israel
来源
PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT) | 2018年
关键词
Privacy; Artificial Intelligence; Machine Learning;
D O I
10.1145/3267305.3274155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Human behavior is increasingly sensed and recorded and used to create models that accurately predict the behavior of consumers, employees, and citizens. While behavioral models are important in many domains, the ability to predict individuals' behavior is in the focus of growing privacy concerns. The legal and technological measures for privacy do not adequately recognize and address the ability to infer behavior and traits. In this position paper, we first analyze the shortcoming of existing privacy theories in addressing AI's inferential abilities. We then point to legal and theoretical frameworks that can adequately describe the potential of AI to negatively affect people's privacy. We then present a technical privacy measure that can help bridge the divide between legal and technical thinking with respect to AI and privacy.
引用
收藏
页码:931 / 936
页数:6
相关论文
共 50 条
  • [1] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing
    Koenings, Bastian
    Schaub, Florian
    Weber, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
  • [2] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [3] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [4] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
  • [5] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [6] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [7] Ubiquitous computing: Shall we understand it?
    Milner, Robin
    COMPUTER JOURNAL, 2006, 49 (04): : 383 - 389
  • [8] Ubiquitous computing: Shall we understand it?
    Milner, Robin
    Computer Journal, 2006, 49 (04): : 383 - 389
  • [9] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [10] Privacy Factors for Successful Ubiquitous Computing
    Little, Linda
    Briggs, Pam
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2009, 5 (02) : 1 - 20