Skip to main content

Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing

  • Conference paper
  • First Online:
UbiComp 2002: Ubiquitous Computing (UbiComp 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2498))

Included in the following conference series:

Abstract

In this paper, we propose a framework for supporting socially-compatible privacy objectives in ubiquitous computing settings. Drawing on social science research, we have developed a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected, and the systems and people that collect and use that data. We have also developed Approximate Information Flow (AIF), a model describing the interaction between the various actors and personal data. AIF effectively supports varying degrees of asymmetry for ubicomp systems, suggests new privacy protection mechanisms, and provides a foundation for inspecting privacy-friendliness of ubicomp systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agre, P., Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction, 2001. 16(2–4): p. 177–192.

    Article  Google Scholar 

  2. Akerlof, G., The Market for “Lemons”:Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 1970.

    Google Scholar 

  3. Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. In The Third European Conference on Computer Supported Cooperative Work (ECSCW’93). 1993. Milan, Italy: Kluwer Academic Publishers.

    Google Scholar 

  4. Berg, I., Education and Jobs: The Great Training Robbery. 1970, New York: Praeger.

    Google Scholar 

  5. Biskup, J. and U. Flegel. Threshold-Based Identity Recovery for Privacy Enhanced Applications. In 7th ACM Conference on Computer and Communications Security (CCS 2000). 2000. Athens, Greece: ACM.

    Google Scholar 

  6. Brin, D., The Transparent Society. 1998, Reading, MA: Perseus Books.

    Google Scholar 

  7. BusinessWeek, Business Week/Harris Poll: A growing threat. 2000. http://www.businessweek.com/2000/0012/b3673010.htm

  8. Covington, M.J., Long, W., Srinivasan, S., Dey, A.K., Ahamad, M., Abowd, G.D. Securing Context-Aw are Applications Using Environment Roles. In 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001). 2001.

    Google Scholar 

  9. Cranor, L., et al., The Platform for Privacy Preferences 1.0 (p3p1.0) Specification. 2000. http://www.w3.org/TR/P3P/

  10. Ellis, H.S. and W. Fellner, External Economies and Diseconomies. American Economic Review, 1943. 33: p. 493–511.

    Google Scholar 

  11. Epic.com, http://www.epic.org/privacy/

  12. Equifax, http://equifax.com/

  13. Ferraiolo, D., J.A. Cugini, and D.R. Kuhn. Role-Based Access Control (RBAC): Features and Motivation. In Eleventh Annual Computer Security Applications Conference. 1995.

    Google Scholar 

  14. Grudin, J., Desituating Action: Digital Representation of Context. Human-Computer Interaction (HCI) Journal, 2001. 16(2–4): p. 269–286.

    Article  Google Scholar 

  15. Horne, C., Sociological Perspectives on the Emergence of Norms, in Social Norms, K. Opp, Editor. 2001, Russell Sage: New York.

    Google Scholar 

  16. Jiang, X. and J. Landay, Modeling Privacy Control in Context-aware Systems Using Decentralized Information Spaces. to appear in IEEE Pervasive Computing, 2002. 1(3).

    Google Scholar 

  17. Langheinrich, M. Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of Ubicomp 2001. 2001. Atlanta, GA.

    Google Scholar 

  18. Laudon, K.C., Extensions to the Theory of Markets and Privacy: Mechanics of Pricing Information, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.

    Google Scholar 

  19. Lessig, L. The Architecture of Privacy. In Taiwan NET’98. 1998. Taipei, Taiwan.

    Google Scholar 

  20. Lessig, L., Code and Other Laws of Cyberspace. 1999, New York NY: Basic Books.

    Google Scholar 

  21. Nguyen, D.H. and E.D. Mynatt. Privacy Mirrors: Making Ubicomp Visible. In Human Factors in Computing Systems: CHI 2001 (Workshop on Building the User Experience in Ubiquitous Computing). 2001. Seattle, WA: ACM Press.

    Google Scholar 

  22. Noam, E.M., Privacy and Self-Regulation: Markets for Electronic Privacy, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.

    Google Scholar 

  23. Pew Internet & American Life, Trust and Privacy Online: Why Americans Want to Rewrite the Rules, 2000. http://www.pewinternet.org/reports/pdfs/PIPPrivacy_Questionnaire_OnlinePDF.pdf

  24. Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In MobiCom 2000: The Sixth Annual International Conference on Mobile Computing and Networking. 2000. Boston, Massachusetts: ACM Press.

    Google Scholar 

  25. Rhodes, B.J., N. Minar, and J. Weaver. Wearable Computing Meets Ubiquitous Computing: Reaping the best of both worlds. In The Third International Symposium on Wearable Computers (ISWC’ 99). 1999. San Francisco, CA.

    Google Scholar 

  26. Samuelson, P., Privacy As Intellectual Property? 52 Stanford Law Review 1125, 2000.

    Google Scholar 

  27. Sandhu, R. Engineering Authority and Trust in Cyberspace: the OM-AM and RBAC way. In 5th ACM Workshop on RBAC. 2000. Berlin.

    Google Scholar 

  28. TRUSTe, http://www.truste.org

  29. Varian, H.R., Economic Aspects of Personal Privacy, in Privacy and Self-Regulation in the Information Age. 1997, US Department of Commerce.

    Google Scholar 

  30. Weiser, M., Some Computer Science Problems in Ubiquitous Computing, in Communications of the ACM. 1993. p. 75–84.

    Google Scholar 

  31. Westin, A.F., Privacy and Freedom. 1967, New York NY: Atheneum.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, X., Hong, J.I., Landay, J.A. (2002). Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds) UbiComp 2002: Ubiquitous Computing. UbiComp 2002. Lecture Notes in Computer Science, vol 2498. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45809-3_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-45809-3_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44267-7

  • Online ISBN: 978-3-540-45809-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics