Abstract
Very large distributed systems that aim to offer natural interaction with their human users fail to address the everyday nature of trust and its establishment at their peril. In human interactions trust builds slowly, it builds contextually, and it builds by association. In contrast most software systems make assumptions regarding user behaviour and do little to learn at the natural pace of the user, this leads to an unnatural relationship between the user and the software, system or service they are using. The claims of social networking to address this only go so far as in many cases the objectives of the service and those of the user do not align or one melds to the other – treating a person as a social network entity quite distinct from that same person as a natural person. What this paper intends to show is how the privacy and security problem is being addressed across the smart city projects in Europe with particular emphasis placed on material from case studies taken from the i-Tour and i-SCOPE projects.
Chapter PDF
Similar content being viewed by others
Keywords
- Smart City
- Lifetime System
- Security Technique
- Information Security Management
- Personal Identifiable Information
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ETSI EG 201 940: Human Factors (HF); User Identification solutions in converging networks
ETSI EG 202 067: Universal Communications Identifier (UCI); System framework
ETSI TR 187 011: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Security; Application of ISO-15408-2 requirements to ETSI standards - guide, method and application with examples
ETSI TR 187 020: Radio Frequency Identification (RFID); Coordinated ESO response to Phase 1 of EU Mandate M436
ETSI TS 102 165-1: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis
ETSI TS 187 001 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN SECurity (SEC); Requirements
Clark, R.V.: UK Home Office; Hot Products: understanding, anticipating and reducing demand for stolen goods, ISBN 1-84082-278-3.
ITU-T Recommendation X.509 (11/2008): Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks
ISO/IEC 15408-1: Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
SO/IEC 15408-2: Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements
ISO/IEC 17799 2005: Information technology - Security techniques - Code of practice for information security management
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
Directive 2002/58/EC of the European Parliament and of the council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)
Recommendation of the OECD Council in 1980 concerning guidelines governing the protection of privacy and transborder flows of personal data (the OECD guidelines for personal data protection
European Convention on Human Rights (ECHR) (long title: Convention for the Protection of Human Rights and Fundamental Freedoms)
Universal Declaration of Human Rights
David, C.: Blind signatures for untraceable payments. Advances in Cryptology Proceedings of Crypto 82(3), 199–203 (1983)
Article 29 of Directive 95/46/EC Working group (an independent European advisory body on data protection and privacy. Its tasks are described in Article 30 of Directive 95/46/EC and Article 15 of Directive 2002/58/EC): Opinion 15/2011 on the definition of consent (adopted on July 13, 2011)
Article 29 of Directive 95/46/EC Working group Opinion 13/2011 on Geolocation services on smart mobile devices (adopted on 16 May 2011)
Privacy Impact Assessment Handbook, http://www.ico.gov.uk/upload/documents/pia_handbook_html_v2/files/PIAhandbookV2.pdf
Fletcher, G.: Identity in practice blog: Privacy across Social Network aggregation, http://practicalid.blogspot.com/2010/09/privacy-across-social-network.html
Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)
ISO/IEC 15408: Information technology - Security techniques - Evaluation Criteria for IT security
ISO/IEC 10181-3: Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework
ISO 14977: Extended Backus-Naur Form (EBNF) syntactic meta-language
Kerckhoffs, A.: La cryptographiemilitaire. Journal des Sciences Militaires IX, 5–38, 161–191 (1883)
Computer Misuse Act 1990: An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes, http://www.legislation.gov.uk/ukpga/1990/18/contents
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cadzow, S.W. (2013). Addressing User Privacy and Experience in Distributed Long Lifetime Systems. In: Marinos, L., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2013. Lecture Notes in Computer Science, vol 8030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39345-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-39345-7_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39344-0
Online ISBN: 978-3-642-39345-7
eBook Packages: Computer ScienceComputer Science (R0)