Abstract
In this paper, we propose a framework for supporting socially-compatible privacy objectives in ubiquitous computing settings. Drawing on social science research, we have developed a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected, and the systems and people that collect and use that data. We have also developed Approximate Information Flow (AIF), a model describing the interaction between the various actors and personal data. AIF effectively supports varying degrees of asymmetry for ubicomp systems, suggests new privacy protection mechanisms, and provides a foundation for inspecting privacy-friendliness of ubicomp systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agre, P., Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction, 2001. 16(2–4): p. 177–192.
Akerlof, G., The Market for “Lemons”:Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 1970.
Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. In The Third European Conference on Computer Supported Cooperative Work (ECSCW’93). 1993. Milan, Italy: Kluwer Academic Publishers.
Berg, I., Education and Jobs: The Great Training Robbery. 1970, New York: Praeger.
Biskup, J. and U. Flegel. Threshold-Based Identity Recovery for Privacy Enhanced Applications. In 7th ACM Conference on Computer and Communications Security (CCS 2000). 2000. Athens, Greece: ACM.
Brin, D., The Transparent Society. 1998, Reading, MA: Perseus Books.
BusinessWeek, Business Week/Harris Poll: A growing threat. 2000. http://www.businessweek.com/2000/0012/b3673010.htm
Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D. Securing Context-Aw are Applications Using Environment Roles. In 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001). 2001.
Cranor, L., et al., The Platform for Privacy Preferences 1.0 (p3p1.0) Specification. 2000. http://www.w3.org/TR/P3P/
Ellis, H.S. and W. Fellner, External Economies and Diseconomies. American Economic Review, 1943. 33: p. 493–511.
Epic.com, http://www.epic.org/privacy/
Equifax, http://equifax.com/
Ferraiolo, D., J.A. Cugini, and D.R. Kuhn. Role-Based Access Control (RBAC): Features and Motivation. In Eleventh Annual Computer Security Applications Conference. 1995.
Grudin, J., Desituating Action: Digital Representation of Context. Human-Computer Interaction (HCI) Journal, 2001. 16(2–4): p. 269–286.
Horne, C., Sociological Perspectives on the Emergence of Norms, in Social Norms, K. Opp, Editor. 2001, Russell Sage: New York.
Jiang, X. and J. Landay, Modeling Privacy Control in Context-aware Systems Using Decentralized Information Spaces. to appear in IEEE Pervasive Computing, 2002. 1(3).
Langheinrich, M. Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of Ubicomp 2001. 2001. Atlanta, GA.
Laudon, K.C., Extensions to the Theory of Markets and Privacy: Mechanics of Pricing Information, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.
Lessig, L. The Architecture of Privacy. In Taiwan NET’98. 1998. Taipei, Taiwan.
Lessig, L., Code and Other Laws of Cyberspace. 1999, New York NY: Basic Books.
Nguyen, D.H. and E.D. Mynatt. Privacy Mirrors: Making Ubicomp Visible. In Human Factors in Computing Systems: CHI 2001 (Workshop on Building the User Experience in Ubiquitous Computing). 2001. Seattle, WA: ACM Press.
Noam, E.M., Privacy and Self-Regulation: Markets for Electronic Privacy, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.
Pew Internet & American Life, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, 2000. http://www.pewinternet.org/reports/pdfs/PIPPrivacy_Questionnaire_OnlinePDF.pdf
Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In MobiCom 2000: The Sixth Annual International Conference on Mobile Computing and Networking. 2000. Boston, Massachusetts: ACM Press.
Rhodes, B.J., N. Minar, and J. Weaver. Wearable Computing Meets Ubiquitous Computing: Reaping the best of both worlds. In The Third International Symposium on Wearable Computers (ISWC’ 99). 1999. San Francisco, CA.
Samuelson, P., Privacy As Intellectual Property? 52 Stanford Law Review 1125, 2000.
Sandhu, R. Engineering Authority and Trust in Cyberspace: the OM-AM and RBAC way. In 5th ACM Workshop on RBAC. 2000. Berlin.
TRUSTe, http://www.truste.org
Varian, H.R., Economic Aspects of Personal Privacy, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.
Weiser, M., Some Computer Science Problems in Ubiquitous Computing, in Communications of the ACM. 1993. p. 75–84.
Westin, A.F., Privacy and Freedom. 1967, New York NY: Atheneum.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, X., Hong, J.I., Landay, J.A. (2002). Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds) UbiComp 2002: Ubiquitous Computing. UbiComp 2002. Lecture Notes in Computer Science, vol 2498. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45809-3_14
Download citation
DOI: https://doi.org/10.1007/3-540-45809-3_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44267-7
Online ISBN: 978-3-540-45809-8
eBook Packages: Springer Book Archive