Abstract
The purpose of this chapter is to provide a background on the fundamental concepts of Toy Computing, including mobile services, physical computing, and augmented reality. It will also present some examples of toy computing products currently on the market. The chapter will also provide a background on security and privacy and relevant research works on these topics in order to provide the necessary foundations for the rest of this book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, A. H. (2006). A Comparison of Two Privacy Policy Languages: EPAL and XACML. Proceedings of the 3rd ACM Workshop on Secure Web Services, (pp. 53–60). New York, NY.
Andreae, H., Andreae, P., Low, J., & Brown, D. (2014). A Study of Auti: A Socially Assistive Robotic Toy. IDC ’14 Proceedings of the 2014 Conference on Interaction Design and Children (pp. 245–248). New York, NY, USA: ACM.
Android. (2015). Location Strategies. (Android Developer) Retrieved February 2015, from http://developer.android.com/guide/topics/location/strategies.html
Araujo, G. M., & Siqueira, F. (2009). The Device Service Bus: A Solution for Embedded Device Integration through Web Services. Proceedings of the 2009 ACM Symposium on Applied Computing (pp. 185–189). New York, NY: ACM.
Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., & Samarati, P. (2007). Location Privacy Protection Through Obfuscation-based Techniques. In Lecture Notes in Computer Science: Data and Applications Security (Vol. 4602, pp. 47–60). Redondo Beach, California, USA: Springer Berlin Heidelberg.
Ashley, P., Hada, S., Karjoth, G., Powers, C., & Schunter, M. (2003a, November 10). Enterprise Privacy Authorization Language (EPAL 1.2). Retrieved March 2015, from http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/
Ashley, P., Hada, S., Karjoth, G., Powers, C., & Schunter, M. (2003b). The Enterprise Privacy Authorizsation Language (EPAL)—How to Enforce Privacy Throughout an Enterprise. Retrieved March 2015, from http://www.w3.org/2003/p3p-ws/pp/ibm3.html
Ashouri-Talouki, M., & Baraani-Dastjerdi, A. (2012). Homomorphic Encryption to Preserve Location Privacy. International Journal of Security and Its Applications, 6(4), 183–190.
Baber, C., & Westmancott, O. (2004). Social networks and mobile games: the use of bluetooth for a multiplayer card game. 6th International Conference on Human Computer Interaction with Mobile Devices and Services, (pp. 98–107). Glasgow, Scotland.
Barnes, R., Lepinski, M., Cooper, A., Morris, J., Tschofenig, H., & Schulzrinne, H. (2011). An Architecture for Location and Location Privacy in Internet Applications. IETF. Retrieved from http://tools.ietf.org/html/rfc6280
Beckett, P. (2014). BYOD—Popular and Problematic. Network Security, 2014(9), 7–9.
Booyah. (2015). iTunes—MyTown2. Retrieved February 2015, from https://itunes.apple.com/app/mytown-2/id442345455
Chakraborty, S., Bitouze, N., Srivastava, M., & Dolocek, L. (2013a). Protecting Data Against Unwanted Inferences. Proceedings of the 2013 IEEE Information Theory Workshop. Seville, Spain.
Chakraborty, S., Raghavan, K., Johnson, M., & Srivastava, M. (2013b). A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems. The Fourteenth Workshop on Mobile Computing Systems and Applications (ACM HotMobile2013) (pp. 1–6, Article 11). New York, USA: ACM.
Cheng, R., & Prabhakar, S. (2004). Using Uncertainty to Provide Privacy-Preserving and High-Quality Location-Based Services. Workshop on Location Systems Privacy and Control (mobileHCI’04). Glasgow, Scotland.
Cherubini, M., de Oliveira, R., Hiltunen, A., & Oliver, N. (2011). Barriers and bridges in the adoption of today’s mobile phone contextual services. MobileHCI ’11 (pp. 167–176). Stockholm, Sweden: ACM.
ChineseCUBES. (2014). AR Cubes. Retrieved from https://www.chinesecubes.com/ar_cubes
Cranor, L. (2012a, February 18). Internet Explorer Privacy Protections also Being Circumvented by Facebook, and Many more. Retrieved October 2013, from TechPolicy.com: http://www.techpolicy.com/Cranor_InternetExplorerPrivacyProtectionsBeingCircumvented-by-Google.aspx
Cranor, L. (2012b, December 3). P3P is Dead, Long Live P3P! Retrieved October 2013, from http://lorrie.cranor.org/blog/2012/12/03/p3p-is-dead-long-live-p3p/
Cumulonimbus. (2015). PressureNet. (Google Play) Retrieved February 2015, from https://play.google.com/store/apps/details?id=ca.cumulonimbus.barometernetwork&feature=nav_result#?t=W251bGwsMSwxLDMsImNhLmN1bXVsb25pbWJ1cy5iYXJvbWV0ZXJuZXR3b3JrIl0.
Dewri, R., Annadata, P., Eltarjaman, W., & Thurimella, R. (2013). Inferring Trip Destinations from Driving Habits Data. Workshop on Privacy in the Electronic Society. Berlin, Germany.
Dey, A. K., & Abowd, G. D. (1999). Towards a Better Understanding of Context and Context-Awareness. Georgia Institute of Technology, College of Computing.
D’Hooge, H., & Goldstein, M. (2001). History of the Smart Toy Lab and Intel Play Toys. Intel Technology Journal, 2001(Q4).
Digital Services Advisory Group and Federal Chief Information Officers Council, United States of America. (2012, August 23). Bring Your Own Device. Retrieved September 2014, from http://www.whitehouse.gov/digitalgov/bring-your-own-device
Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 2013(9), 43–53.
Duckham, M., & Kulik, L. (2005). A Formal Model of Obfuscation and Negotiation for Location Privacy. In H. G. al. (Ed.), Pervasive Computing (Vol. 3468, pp. 152–170). Munich, Germany: Springer-Verlag Berlin Heidelberg.
Duri, S., Cole, A., Munson, J., & Christensen, J. (2001). An approach to providing a seamless end-user experience for location-aware applications. 1st International Workshop on Mobile Commerce, 86(4), 20.
El Kaed, C., Denneulin, Y., & Ottogalli, F.-G. (2011). Dynamic Service Adaptation for Plug and Play Device Interoperability. Proceedings of the 7th International Conference on Network and Services Management.
Facebook. (2015). Facebook Mobile. (Facebook) Retrieved February 2015, from https://www.facebook.com/mobile/
Fang, S.-H., Lai, W.-J., & Liang, Y.-C. (2011). An Encryption-Based Approach for Protecting Privacy in Network-Based Location Systems. IEEE 2011 International Conference on Machine Learning and Cybernetics (ICMLC) (pp. 377–380). Guilin: IEEE.
Ferraiolo, D., & Kuhn, R. (1992). Role-based Access Control. Proceedings of the 15th National Computer Security Conference, (pp. 1–11).
Fonseca, J., Abdelouahab, Z., Lopes, D., & Labidi, S. (2009). A Security Framework for SOA Applications on Mobile Environment. International Journal of Network Security & ITS Applications, 1(3), 90–107.
Fusion Forge. (n.d.). Welcome to the SOA4D Forge. Retrieved September 2014, from https://forge.soa4d.org/
Futuresight. (2011). User Perspectives on Mobile Privacy—Summary of Research Findings. GSMA.
Gartner. (2014). Key Challenges in BYOD. Retrieved September 2014, from http://www.gartner.com/technology/topics/byod.jsp
Gedik, B., & Liu, L. (2005). Location Privacy in Mobile Systems: A Personalized Anonymization Model. 25th IEEE International Conference on Distributed Computing Systems (pp. 620–629). Columbus, OH: IEEE.
Ghazinour, K., & Barker, K. (2011). Capturing P3P Semantics Using and Enforceable Lattice-based Structure. Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, (p. 4). New York, NY, USA.
Ghazinour, K., & Barker, K. (2013). A Privacy Preserving Model Bridging Data Provider and Collector Preferences. Proceedings of the Joint EDBT/ICDT 2013 Workshops (pp. 174–178). New York, NY, USA: ACM.
Golatowski, F., Bobek, A., & Zeeb, E. (n.d.). Web Services for Devices—About. (WS4D) Retrieved September 2014, from http://ws4d.e-technik.uni-rostock.de/about/
Google. (n.d.). Sensors Overview. (developer.android.com) Retrieved September 2014, from http://developer.android.com/guide/topics/sensors/sensors_overview.html
Gross, M. D., & Eisenberg, M. (2007). Why Toys Shouldn’t Work “Like Magic”: Children’s Technology and the Values of Construction and Control. The First IEEE International Workshop on Digital Game and Intelligent Toy Enhanced Learning (DIGITEL ’07). Jhongli, Taiwan: IEEE Computer Society.
Gu, T., Pung, H., & Zhang, D. (2004). A Middleware for Building Context-Aware Mobile Services. IEEE Vehicular Techology Conference. 5, pp. 2656–2660. IEEE.
Hasbro. (2013). Furby Boom. Hasbro. Retrieved November 2013, from http://www.hasbro.com/furby/en_CA/
Hinske, S., & Langheinrich, M. (2007). Managing Augmented Toy Environments—A New Perspective for Smart Space Management. Proceedings of the 4th International Workshop on Managing Ubiquitous Communications and Services (MUCS). Munich, Germany.
Hinske, S., Langheinrich, M., & Lampe, M. (2008). Towards Guidelines for Designing Augmented Toy Environments. Designing Interactive Systems (DIS) 2008. Cape Town, South Africa: ACM.
Hung, P. C., & Cheng, V. S. (2009). Privacy. In Encyclopedia of Database Systems (pp. 2136–2137). Springer.
Hung, P. C., Ferrari, E., & Carminati, B. (2004). Towards Standardized Web Services Privacy Technologies. Proceedings of the IEEE International Conference on Web Services (ICWS’04). San Diego, CA.
Instagram. (2015). Instagram. (Instagram) Retrieved February 2015, from http://instagram.com/
Jorns, O., Jung, O., Gross, J., & Bessler, S. (2005). A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. In Lecture Notes in Computer Science: Trust, Privacy, and Security in Digital Business (Vol. 3592, pp. 100–109). Copenhagen, Denmark: Sprinter-Verlag Berlin Heidelberg.
Kaasinen, E. (2003, May). User Needs for Location-Aware Mobile Services. Personal and Ubiquitous Computing, 7(1), 70–79.
Lee, S., & Doh, Y. Y. (2013). iSpy: RFID-Driven Language Learning Toy Integrating Living Environment. CHI ’13 Proceedings from the 2013 International Conference on Interaction Design and Children (pp. 697–702). Paris, France: ACM.
Luckin, R., Connolly, D., Plowman, L., & Airey, S. (2003). Children’s Interactions with Interactive Toy Technology. Journal of Computer Assisted Learning, 19, 165–176.
MEF. (2013). MEF Global Privacy Report 2013. MEF.
Merriam-Webster. (n.d.). Location. Retrieved January 2015, from http://www.merriam-webster.com/dictionary/location
Merrill, S., Basalp, N., Biskup, J., Buchmann, E., Clifton, C., Kuijpers, B., … Savas, E. (2013). Privacy Through Uncertainty in Location-Based Services. 2013 IEEE 14th International Conference on Mobile Data Management (pp. 67–72). Milan, Italy: IEEE.
Microsoft. (2007). Intorducing Devices Profile for Web Services.
National Geographic. (n.d.). Encyclopedic Entry: Location. Retrieved January 2015, from http://education.nationalgeographic.com/education/encyclopedia/location/?ar_a=1
Ni, Q., Trombetta, A., Bertino, E., & Lobo, J. (2007). Privacy-Aware Role Based Acces Control. SACMAT ’07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (pp. 41–50). France: ACM.
OASIS. (2009, July). OASIS Devices Profile for Web Services. Retrieved December 2013, from http://docs.oasis-open.org/ws-dd/ns/dpws/2009/01
OASIS. (2013). eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS. Retrieved January 2015, from http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.pdf
Olurin, M., Adams, C., & Logrippo, L. (2012). Platform for Privacy Preferences (P3P): Current Status and Future Directions. 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), (pp. 217–220). Paris, France.
Open Geospatial Consortium. (2005, December 15). GeoXACML. Retrieved December 2014, from https://geoxacml.secure-dimensions.com/
Open Systems Interconnection. (1966). Information Technology—Security Frameworks for Open Systems: Access Control Framework.
Open Web Application Security Project (OWASP). (2014). Access Control Cheat Sheet. OWASP. Retrieved from https://www.owasp.org/index.php/Access_Control_Cheat_Sheet
Pandit, A. A., & Kumar, A. (2012). Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems. IEEE 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 435–442). Sanya, China: IEEE.
Patil, S., Norcie, G., Kapadia, A., & Lee, A. J. (2012). Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice. Symposium on Usable Privacy and Security. Washington, D.C.
Plowman, L., & Luckin, R. (February 2004). Interactivity, Interfaces, and Smart Toys. Computer, 98–100.
Pohlsen, S., Schlichting, S., Strahle, M., Franz, F., & Werner, C. (2009). A Concept for a Medical Device Plug-and-Play Architecture based on Web Services. ACM SIGBED Review—Special Issue on the 2nd Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, 6(2), Article 6.
Pura, M. (2005). Linking perceived value and loyalty in location-based mobile services. Managing Services Quality, 15(6), 509–538.
Reay, I., Dick, S., & Miller, J. (2009). A Large-Scale Empirical Study of P3P Privacy Policies: Stated Actions vs. Legal Obligations. ACM Transactions on The Web, 3(2), 6:1–6:34.
Riboni, D., Pareschi, L., & Bettini, C. (2008). Privacy in Georeferenced Context-aware Services: A Survey. Privacy in Location-Based Applications (PiLBA’08), (pp. 24–43). Malaga, Spain.
Rovio. (2015). Angry Birds. Retrieved February 2015, from http://www.rovio.com/en/our-work/games/view/1/angry-birds
Saha, D. (2003). Pervasive Computing: A Paradigm for the 21st Century. Computer, 36(3), 25–31.
Sandhu, R., & Samarati, P. (1994). Access Control: Principles and Practice. IEEE Communications Magazine, 1994(September), 40–48.
Schilit, B., Adams, N., & Want, R. (1994). Context-Aware Computing Applications. WMCA ’94 (pp. 85–90). Washington, DC, USA: IEEE Computer Society.
Schmidt, A. (2005). Interactive Context-Aware Systems Interacting with Ambient Intelligence. In G. Riva, F. Vatalaro, F. Davide, & M. Alcaniz (Eds.), Ambient Intelligence (pp. 159–178). IOS Press.
Schmidt, A., Beigle, M., & Gellersen, H. W. (1999). There is more to context than location. Computer & Graphics Journal, 23(6), 893–902.
Seifert, J., De Luca, A., & Conradi, B. (2009). A Context-Sensitive Security Model for Privacy Protection on Mobile Phones. Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, NY.
Seligy, J., & Lawson, P. (2006). Compliance with Canadian Data Protection Laws: Are Retailers Measuring Up? Ottawa: Canadian Internet Policy and Public Interest Clinic.
Sheth, A., Anantharam, P., & Henson, C. (2013). Physical-Cyber-Social Computing: An Early 21st Century Approach. Intelligent Systems, IEEE, 28(1), 78–82.
Six to Start. (n.d.). Zombies, Run! 3. (Six to Start) Retrieved September 2014, from https://www.zombiesrungame.com/
Solanas, A., Domingo-Ferrer, J., & Martinez-Balleste, A. (2008). Location Privacy in Location-Based Services: Beyond TTP-based Schemes. Privacy in Location-Based Applications (PiLBA’08), (pp. 12–23). Malaga, Spain.
Sphero. (2014). Sphero. Retrieved August 2014, from http://www.gosphero.com
Taha, S., & Shen, X. (2013). A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs. IEEE Transactions on Intelligent Transportation Systems, 14(4), 1665–1680.
Tech4Kids. (2013). Tek Recon. (Tech4Kids) Retrieved August 2014, from http://www.tekrecon.com/
TIME and Qualcomm. (2012, July). Your Wireless Life: Results of TIME’s Mobility Poll. Retrieved November 2013, from http://content.time.com/time/interactive/0,31813,2122187,00.html
Toymail Co. LLC. (2014). Toy Mail. (Toymail Co. LLC) Retrieved from http://www.toymail.co/
Unger, S., Zeeb, E., Golatowski, F., Grandy, H., & Timmermann, D. (2010). Extending the Devices Profile for Web Services for Secure Mobile Device Communication. 4th International Workshop on Trustworthy Internet of People, Things & Services at the Internet of Things Conference. Tokyo, Japan. Retrieved from http://webcache.googleusercontent.com/search?q=cache:ArR-T87Qq_8 J:www.imd.uni-rostock.de/veroeff/DPWS-DA-paper.pdf
W3C. (2001). Web Services Description Language (WSDL) 1.1. W3C. Retrieved from www.w3.org/TR/wsdl
W3C. (2004). Web Services Architecture. Retrieved 2014, from http://www.w3.org/TR/ws-arch
W3C. (2015). Extensible Markup Language (XML). W3C. Retrieved from http://www.w3.org/XML
Want, R. (2006). An Introduction to RFID Technology. IEEE Pervasive Computing, 5(1).
WAP-W3C. (2000). Report from WAP-W3C Joint Workshop on Mobile Web Privacy. Munich, Germany: W3C.
Waters, G., Wheeler, J., Westerinen, A., Rafalow, L., & Moore, R. (1999). Policy Framework Architecture. IETF. Retrieved from http://tools.ietf.org/html/draft-ietf-policy-arch-00
Wenning, R. (2007, November 20). Platform for Privacy Preferences (P3P) Project: Enabling Smarter Privacy Tools for the Web. Retrieved December 2013, from W3C: http://www.w3.org/P3P/
Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., … Waldbusser, S. (2001, November). Terminology for Policy-Based Management. IETF RFC 3198. Retrieved from http://www.ietf.org/rfc/rfc3198.txt
Westeyn, T. L., Abowd, G. D., Starner, T. E., Johnson, J. M., Presti, P. W., & Weaver, K. A. (2012). Monitoring Children’s Developmental Progress using Augmented Toys and Activity Recognition. Personal Ubiquitous Computing, 2012(16), 169–191.
Whalen, T. (2011). Mobile Devices and Location Privacy: Where do we go from Here? IEEE Security & Privacy, 9(6), 61–62.
Woollaston, V. (2014, February 20). Step Aside Ted, There’s A New Talking Teddy in Town: WikiBear Connects to the Web to Chat, Answer Questions and Tell Jokes. Retrieved from DailyMail: http://www.dailymail.co.uk/sciencetech/article-2564015/Step-aside-Ted-theres-new-talking-teddy-town-WikiBear-connects-web-chat-answer-questions-tells-jokes.html
World Economic Forum. (2011). Personal Data: The Emergence of a New Asset Class. World Economic Forum.
World Wide Web Consirtium (W3C). (2004, February 11). Web Services Architecture Requirements. Retrieved from http://www.w3.org/TR/wsa-reqs/
Yavatkar, R., Pendarakis, D., & Guerin, R. (2000, January). A Framework for Policy-Based Admission Control. IETF RFC2753. Retrieved from http://www.ietf.org/rfc/rfc2753.txt
Yelp. (2015). Yelp Mobile. (Yelp) Retrieved February 2015, from http://www.yelp.ca/yelpmobile
zomato. (2015). Urbanspoon. (zomato) Retrieved February 2015, from http://www.urbanspoon.com/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rafferty, L., Kroese, B., Hung, P. (2015). Toy Computing Background. In: Hung, P. (eds) Mobile Services for Toy Computing. International Series on Computer Entertainment and Media Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-21323-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-21323-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21322-4
Online ISBN: 978-3-319-21323-1
eBook Packages: Computer ScienceComputer Science (R0)