Method for Privacy Requirements Elicitation in Ubiquitous Computing

被引:1
|
作者
da Silva Junior, Deogenes P. [1 ]
de Souza, Patricia Cristiane [1 ]
Maciel, Cristiano [1 ]
机构
[1] Inst Comp, Cuiaba, Mato Grosso, Brazil
关键词
Privacy; Ubiquitous Computing; Method;
D O I
10.1145/3266237.3266239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 50 条
  • [1] An effective method for location privacy in ubiquitous computing
    Lee, G
    Kim, W
    Kim, DK
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1006 - 1015
  • [2] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [3] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [4] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
  • [5] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [6] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [7] Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective
    Ermakova, Tatiana
    Fabian, Benjamin
    Kornacka, Marta
    Thiebes, Scott
    Sunyaev, Ali
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2020, 11 (02)
  • [8] Requirements of devices for ubiquitous computing
    Jobmann, Klaus
    Heinrich, Andreas
    IT - Information Technology, 2001, 43 (02): : 60 - 66
  • [9] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [10] Privacy Factors for Successful Ubiquitous Computing
    Little, Linda
    Briggs, Pam
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2009, 5 (02) : 1 - 20