Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments

被引:1
|
作者
Sackmann, Stefan [1 ]
机构
[1] Inst Comp Sci & Social Studies, Dept Telemat, D-79098 Freiburg, Germany
关键词
D O I
10.1109/CEC-EEE.2007.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ubiquitous computing technologies (UC) open up new possibilities for stationary retail as well as for e-commerce to realize personalized services. Customer acceptance of such services is generally put at risk because the potential quantity and quality of data collected poses new threats to privacy. Based on economic agency theory, this paper discusses legally binding commitments of the retailer as a promising approach to actively oppose this privacy problem. The analysis indicates that an adoption of this strategy is only rational for "honest" retailers and thus provides an effective possibility to distinguish them from "dishonest" ones. The success of this approach is dependent on an effective provision of "privacy evidences" proving compliance as well as non-compliance. In regard to computer science, the provision of such evidences is discussed as a challenge to a new kind of privacy-enhancing technologies.
引用
收藏
页码:447 / 450
页数:4
相关论文
共 50 条
  • [21] Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy
    Ma, Tinghuai
    Yan, Sen
    Wang, Jin
    Lee, Sungyoung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1185 - 1206
  • [22] Privacy Preserving in Ubiquitous Computing: Challenges & Issues
    Ma, Tinghuai
    Kim, Shin-Dug
    Wang, Jun
    Zhao, Yawei
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 297 - +
  • [23] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153
  • [24] An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns
    Sheng, Hong
    Nah, Fiona Fui-Hoon
    Siau, Keng
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2008, 9 (06): : 344 - 377
  • [25] Method for Privacy Requirements Elicitation in Ubiquitous Computing
    da Silva Junior, Deogenes P.
    de Souza, Patricia Cristiane
    Maciel, Cristiano
    SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2018, : 178 - 183
  • [26] From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS Identity in Ubiquitous Computing
    Phillips, David
    SOCIAL TEXT, 2005, 23 (02) : 95 - 108
  • [27] Privacy protection in ubiquitous computing based on privacy label and information flow
    Hwang, SO
    Yoon, KS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2, 2004, 3044 : 46 - 54
  • [28] Some Global Policies for Antibiotic Resistance Depend on Legally Binding and Enforceable Commitments
    Behdinan, Asha
    Hoffman, Steven J.
    Pearcey, Mark
    JOURNAL OF LAW MEDICINE & ETHICS, 2015, 43 : 68 - 73
  • [29] Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies
    Freiberger, Vincent
    Buchmann, Erik
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2024, 2024, : 15 - 22
  • [30] Model-based Solution for Personalization of the User Interaction in Ubiquitous Computing
    Madeira, Rui Neves
    Santos, Pedro Albuquerque
    Vieira, Andre
    Correia, Nuno
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 311 - 318