Method for Privacy Requirements Elicitation in Ubiquitous Computing

被引:1
|
作者
da Silva Junior, Deogenes P. [1 ]
de Souza, Patricia Cristiane [1 ]
Maciel, Cristiano [1 ]
机构
[1] Inst Comp, Cuiaba, Mato Grosso, Brazil
关键词
Privacy; Ubiquitous Computing; Method;
D O I
10.1145/3266237.3266239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 50 条
  • [21] Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy
    Ma, Tinghuai
    Yan, Sen
    Wang, Jin
    Lee, Sungyoung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1185 - 1206
  • [22] Privacy Preserving in Ubiquitous Computing: Challenges & Issues
    Ma, Tinghuai
    Kim, Shin-Dug
    Wang, Jun
    Zhao, Yawei
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 297 - +
  • [23] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153
  • [24] Computer-Aided Privacy Requirements Elicitation Technique
    Miyazaki, Seiya
    Mead, Nancy
    Zhan, Justin
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 367 - +
  • [25] Towards a Common Security and Privacy Requirements Elicitation Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
  • [26] From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS Identity in Ubiquitous Computing
    Phillips, David
    SOCIAL TEXT, 2005, 23 (02) : 95 - 108
  • [27] Requirements for a component framework of future ubiquitous computing
    Ishikawa, H
    Ogata, Y
    Adachi, K
    Nakajima, T
    WSTFES 2003: IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED SYSTEMS, PROCEEDINGS, 2003, : 9 - 12
  • [28] Privacy protection in ubiquitous computing based on privacy label and information flow
    Hwang, SO
    Yoon, KS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 2, 2004, 3044 : 46 - 54
  • [29] PERCEPTIONS OF PRIVACY IN HOME-BASED UBIQUITOUS COMPUTING
    Lorenzen-Huber, L.
    Boutain, M.
    GERONTOLOGIST, 2008, 48 : 25 - 25
  • [30] Non-functional requirements elicitation for edge computing
    Gupta, Sandeep
    INTERNET OF THINGS, 2022, 18