Skip to main content

Toy Computing Background

  • Chapter
  • First Online:
Mobile Services for Toy Computing

Abstract

The purpose of this chapter is to provide a background on the fundamental concepts of Toy Computing, including mobile services, physical computing, and augmented reality. It will also present some examples of toy computing products currently on the market. The chapter will also provide a background on security and privacy and relevant research works on these topics in order to provide the necessary foundations for the rest of this book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anderson, A. H. (2006). A Comparison of Two Privacy Policy Languages: EPAL and XACML. Proceedings of the 3rd ACM Workshop on Secure Web Services, (pp. 53–60). New York, NY.

    Google Scholar 

  • Andreae, H., Andreae, P., Low, J., & Brown, D. (2014). A Study of Auti: A Socially Assistive Robotic Toy. IDC ’14 Proceedings of the 2014 Conference on Interaction Design and Children (pp. 245–248). New York, NY, USA: ACM.

    Google Scholar 

  • Android. (2015). Location Strategies. (Android Developer) Retrieved February 2015, from http://developer.android.com/guide/topics/location/strategies.html

  • Araujo, G. M., & Siqueira, F. (2009). The Device Service Bus: A Solution for Embedded Device Integration through Web Services. Proceedings of the 2009 ACM Symposium on Applied Computing (pp. 185–189). New York, NY: ACM.

    Google Scholar 

  • Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., & Samarati, P. (2007). Location Privacy Protection Through Obfuscation-based Techniques. In Lecture Notes in Computer Science: Data and Applications Security (Vol. 4602, pp. 47–60). Redondo Beach, California, USA: Springer Berlin Heidelberg.

    Google Scholar 

  • Ashley, P., Hada, S., Karjoth, G., Powers, C., & Schunter, M. (2003a, November 10). Enterprise Privacy Authorization Language (EPAL 1.2). Retrieved March 2015, from http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/

  • Ashley, P., Hada, S., Karjoth, G., Powers, C., & Schunter, M. (2003b). The Enterprise Privacy Authorizsation Language (EPAL)—How to Enforce Privacy Throughout an Enterprise. Retrieved March 2015, from http://www.w3.org/2003/p3p-ws/pp/ibm3.html

  • Ashouri-Talouki, M., & Baraani-Dastjerdi, A. (2012). Homomorphic Encryption to Preserve Location Privacy. International Journal of Security and Its Applications, 6(4), 183–190.

    Google Scholar 

  • Baber, C., & Westmancott, O. (2004). Social networks and mobile games: the use of bluetooth for a multiplayer card game. 6th International Conference on Human Computer Interaction with Mobile Devices and Services, (pp. 98–107). Glasgow, Scotland.

    Google Scholar 

  • Barnes, R., Lepinski, M., Cooper, A., Morris, J., Tschofenig, H., & Schulzrinne, H. (2011). An Architecture for Location and Location Privacy in Internet Applications. IETF. Retrieved from http://tools.ietf.org/html/rfc6280

  • Beckett, P. (2014). BYOD—Popular and Problematic. Network Security, 2014(9), 7–9.

    Article  Google Scholar 

  • Booyah. (2015). iTunes—MyTown2. Retrieved February 2015, from https://itunes.apple.com/app/mytown-2/id442345455

  • Chakraborty, S., Bitouze, N., Srivastava, M., & Dolocek, L. (2013a). Protecting Data Against Unwanted Inferences. Proceedings of the 2013 IEEE Information Theory Workshop. Seville, Spain.

    Google Scholar 

  • Chakraborty, S., Raghavan, K., Johnson, M., & Srivastava, M. (2013b). A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems. The Fourteenth Workshop on Mobile Computing Systems and Applications (ACM HotMobile2013) (pp. 1–6, Article 11). New York, USA: ACM.

    Google Scholar 

  • Cheng, R., & Prabhakar, S. (2004). Using Uncertainty to Provide Privacy-Preserving and High-Quality Location-Based Services. Workshop on Location Systems Privacy and Control (mobileHCI’04). Glasgow, Scotland.

    Google Scholar 

  • Cherubini, M., de Oliveira, R., Hiltunen, A., & Oliver, N. (2011). Barriers and bridges in the adoption of today’s mobile phone contextual services. MobileHCI ’11 (pp. 167–176). Stockholm, Sweden: ACM.

    Google Scholar 

  • ChineseCUBES. (2014). AR Cubes. Retrieved from https://www.chinesecubes.com/ar_cubes

  • Cranor, L. (2012a, February 18). Internet Explorer Privacy Protections also Being Circumvented by Facebook, and Many more. Retrieved October 2013, from TechPolicy.com: http://www.techpolicy.com/Cranor_InternetExplorerPrivacyProtectionsBeingCircumvented-by-Google.aspx

  • Cranor, L. (2012b, December 3). P3P is Dead, Long Live P3P! Retrieved October 2013, from http://lorrie.cranor.org/blog/2012/12/03/p3p-is-dead-long-live-p3p/

  • Cumulonimbus. (2015). PressureNet. (Google Play) Retrieved February 2015, from https://play.google.com/store/apps/details?id=ca.cumulonimbus.barometernetwork&feature=nav_result#?t=W251bGwsMSwxLDMsImNhLmN1bXVsb25pbWJ1cy5iYXJvbWV0ZXJuZXR3b3JrIl0.

  • Dewri, R., Annadata, P., Eltarjaman, W., & Thurimella, R. (2013). Inferring Trip Destinations from Driving Habits Data. Workshop on Privacy in the Electronic Society. Berlin, Germany.

    Google Scholar 

  • Dey, A. K., & Abowd, G. D. (1999). Towards a Better Understanding of Context and Context-Awareness. Georgia Institute of Technology, College of Computing.

    Google Scholar 

  • D’Hooge, H., & Goldstein, M. (2001). History of the Smart Toy Lab and Intel Play Toys. Intel Technology Journal, 2001(Q4).

    Google Scholar 

  • Digital Services Advisory Group and Federal Chief Information Officers Council, United States of America. (2012, August 23). Bring Your Own Device. Retrieved September 2014, from http://www.whitehouse.gov/digitalgov/bring-your-own-device

  • Disterer, G., & Kleiner, C. (2013). BYOD Bring Your Own Device. Procedia Technology, 2013(9), 43–53.

    Article  Google Scholar 

  • Duckham, M., & Kulik, L. (2005). A Formal Model of Obfuscation and Negotiation for Location Privacy. In H. G. al. (Ed.), Pervasive Computing (Vol. 3468, pp. 152–170). Munich, Germany: Springer-Verlag Berlin Heidelberg.

    Chapter  Google Scholar 

  • Duri, S., Cole, A., Munson, J., & Christensen, J. (2001). An approach to providing a seamless end-user experience for location-aware applications. 1st International Workshop on Mobile Commerce, 86(4), 20.

    Google Scholar 

  • El Kaed, C., Denneulin, Y., & Ottogalli, F.-G. (2011). Dynamic Service Adaptation for Plug and Play Device Interoperability. Proceedings of the 7th International Conference on Network and Services Management.

    Google Scholar 

  • Facebook. (2015). Facebook Mobile. (Facebook) Retrieved February 2015, from https://www.facebook.com/mobile/

  • Fang, S.-H., Lai, W.-J., & Liang, Y.-C. (2011). An Encryption-Based Approach for Protecting Privacy in Network-Based Location Systems. IEEE 2011 International Conference on Machine Learning and Cybernetics (ICMLC) (pp. 377–380). Guilin: IEEE.

    Google Scholar 

  • Ferraiolo, D., & Kuhn, R. (1992). Role-based Access Control. Proceedings of the 15th National Computer Security Conference, (pp. 1–11).

    Google Scholar 

  • Fonseca, J., Abdelouahab, Z., Lopes, D., & Labidi, S. (2009). A Security Framework for SOA Applications on Mobile Environment. International Journal of Network Security & ITS Applications, 1(3), 90–107.

    Google Scholar 

  • Fusion Forge. (n.d.). Welcome to the SOA4D Forge. Retrieved September 2014, from https://forge.soa4d.org/

  • Futuresight. (2011). User Perspectives on Mobile Privacy—Summary of Research Findings. GSMA.

    Google Scholar 

  • Gartner. (2014). Key Challenges in BYOD. Retrieved September 2014, from http://www.gartner.com/technology/topics/byod.jsp

  • Gedik, B., & Liu, L. (2005). Location Privacy in Mobile Systems: A Personalized Anonymization Model. 25th IEEE International Conference on Distributed Computing Systems (pp. 620–629). Columbus, OH: IEEE.

    Google Scholar 

  • Ghazinour, K., & Barker, K. (2011). Capturing P3P Semantics Using and Enforceable Lattice-based Structure. Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, (p. 4). New York, NY, USA.

    Google Scholar 

  • Ghazinour, K., & Barker, K. (2013). A Privacy Preserving Model Bridging Data Provider and Collector Preferences. Proceedings of the Joint EDBT/ICDT 2013 Workshops (pp. 174–178). New York, NY, USA: ACM.

    Google Scholar 

  • Golatowski, F., Bobek, A., & Zeeb, E. (n.d.). Web Services for Devices—About. (WS4D) Retrieved September 2014, from http://ws4d.e-technik.uni-rostock.de/about/

  • Google. (n.d.). Sensors Overview. (developer.android.com) Retrieved September 2014, from http://developer.android.com/guide/topics/sensors/sensors_overview.html

  • Gross, M. D., & Eisenberg, M. (2007). Why Toys Shouldn’t Work “Like Magic”: Children’s Technology and the Values of Construction and Control. The First IEEE International Workshop on Digital Game and Intelligent Toy Enhanced Learning (DIGITEL ’07). Jhongli, Taiwan: IEEE Computer Society.

    Google Scholar 

  • Gu, T., Pung, H., & Zhang, D. (2004). A Middleware for Building Context-Aware Mobile Services. IEEE Vehicular Techology Conference. 5, pp. 2656–2660. IEEE.

    Google Scholar 

  • Hasbro. (2013). Furby Boom. Hasbro. Retrieved November 2013, from http://www.hasbro.com/furby/en_CA/

  • Hinske, S., & Langheinrich, M. (2007). Managing Augmented Toy Environments—A New Perspective for Smart Space Management. Proceedings of the 4th International Workshop on Managing Ubiquitous Communications and Services (MUCS). Munich, Germany.

    Google Scholar 

  • Hinske, S., Langheinrich, M., & Lampe, M. (2008). Towards Guidelines for Designing Augmented Toy Environments. Designing Interactive Systems (DIS) 2008. Cape Town, South Africa: ACM.

    Google Scholar 

  • Hung, P. C., & Cheng, V. S. (2009). Privacy. In Encyclopedia of Database Systems (pp. 2136–2137). Springer.

    Google Scholar 

  • Hung, P. C., Ferrari, E., & Carminati, B. (2004). Towards Standardized Web Services Privacy Technologies. Proceedings of the IEEE International Conference on Web Services (ICWS’04). San Diego, CA.

    Google Scholar 

  • Instagram. (2015). Instagram. (Instagram) Retrieved February 2015, from http://instagram.com/

  • Jorns, O., Jung, O., Gross, J., & Bessler, S. (2005). A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. In Lecture Notes in Computer Science: Trust, Privacy, and Security in Digital Business (Vol. 3592, pp. 100–109). Copenhagen, Denmark: Sprinter-Verlag Berlin Heidelberg.

    Chapter  Google Scholar 

  • Kaasinen, E. (2003, May). User Needs for Location-Aware Mobile Services. Personal and Ubiquitous Computing, 7(1), 70–79.

    Article  Google Scholar 

  • Lee, S., & Doh, Y. Y. (2013). iSpy: RFID-Driven Language Learning Toy Integrating Living Environment. CHI ’13 Proceedings from the 2013 International Conference on Interaction Design and Children (pp. 697–702). Paris, France: ACM.

    Google Scholar 

  • Luckin, R., Connolly, D., Plowman, L., & Airey, S. (2003). Children’s Interactions with Interactive Toy Technology. Journal of Computer Assisted Learning, 19, 165–176.

    Article  Google Scholar 

  • MEF. (2013). MEF Global Privacy Report 2013. MEF.

    Google Scholar 

  • Merriam-Webster. (n.d.). Location. Retrieved January 2015, from http://www.merriam-webster.com/dictionary/location

  • Merrill, S., Basalp, N., Biskup, J., Buchmann, E., Clifton, C., Kuijpers, B., … Savas, E. (2013). Privacy Through Uncertainty in Location-Based Services. 2013 IEEE 14th International Conference on Mobile Data Management (pp. 67–72). Milan, Italy: IEEE.

    Book  Google Scholar 

  • Microsoft. (2007). Intorducing Devices Profile for Web Services.

    Google Scholar 

  • National Geographic. (n.d.). Encyclopedic Entry: Location. Retrieved January 2015, from http://education.nationalgeographic.com/education/encyclopedia/location/?ar_a=1

  • Ni, Q., Trombetta, A., Bertino, E., & Lobo, J. (2007). Privacy-Aware Role Based Acces Control. SACMAT ’07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (pp. 41–50). France: ACM.

    Book  Google Scholar 

  • OASIS. (2009, July). OASIS Devices Profile for Web Services. Retrieved December 2013, from http://docs.oasis-open.org/ws-dd/ns/dpws/2009/01

  • OASIS. (2013). eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS. Retrieved January 2015, from http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.pdf

  • Olurin, M., Adams, C., & Logrippo, L. (2012). Platform for Privacy Preferences (P3P): Current Status and Future Directions. 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), (pp. 217–220). Paris, France.

    Google Scholar 

  • Open Geospatial Consortium. (2005, December 15). GeoXACML. Retrieved December 2014, from https://geoxacml.secure-dimensions.com/

  • Open Systems Interconnection. (1966). Information Technology—Security Frameworks for Open Systems: Access Control Framework.

    Google Scholar 

  • Open Web Application Security Project (OWASP). (2014). Access Control Cheat Sheet. OWASP. Retrieved from https://www.owasp.org/index.php/Access_Control_Cheat_Sheet

  • Pandit, A. A., & Kumar, A. (2012). Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems. IEEE 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 435–442). Sanya, China: IEEE.

    Google Scholar 

  • Patil, S., Norcie, G., Kapadia, A., & Lee, A. J. (2012). Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice. Symposium on Usable Privacy and Security. Washington, D.C.

    Google Scholar 

  • Plowman, L., & Luckin, R. (February 2004). Interactivity, Interfaces, and Smart Toys. Computer, 98–100.

    Google Scholar 

  • Pohlsen, S., Schlichting, S., Strahle, M., Franz, F., & Werner, C. (2009). A Concept for a Medical Device Plug-and-Play Architecture based on Web Services. ACM SIGBED Review—Special Issue on the 2nd Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, 6(2), Article 6.

    Google Scholar 

  • Pura, M. (2005). Linking perceived value and loyalty in location-based mobile services. Managing Services Quality, 15(6), 509–538.

    Article  Google Scholar 

  • Reay, I., Dick, S., & Miller, J. (2009). A Large-Scale Empirical Study of P3P Privacy Policies: Stated Actions vs. Legal Obligations. ACM Transactions on The Web, 3(2), 6:1–6:34.

    Google Scholar 

  • Riboni, D., Pareschi, L., & Bettini, C. (2008). Privacy in Georeferenced Context-aware Services: A Survey. Privacy in Location-Based Applications (PiLBA’08), (pp. 24–43). Malaga, Spain.

    Google Scholar 

  • Rovio. (2015). Angry Birds. Retrieved February 2015, from http://www.rovio.com/en/our-work/games/view/1/angry-birds

  • Saha, D. (2003). Pervasive Computing: A Paradigm for the 21st Century. Computer, 36(3), 25–31.

    Article  Google Scholar 

  • Sandhu, R., & Samarati, P. (1994). Access Control: Principles and Practice. IEEE Communications Magazine, 1994(September), 40–48.

    Google Scholar 

  • Schilit, B., Adams, N., & Want, R. (1994). Context-Aware Computing Applications. WMCA ’94 (pp. 85–90). Washington, DC, USA: IEEE Computer Society.

    Google Scholar 

  • Schmidt, A. (2005). Interactive Context-Aware Systems Interacting with Ambient Intelligence. In G. Riva, F. Vatalaro, F. Davide, & M. Alcaniz (Eds.), Ambient Intelligence (pp. 159–178). IOS Press.

    Google Scholar 

  • Schmidt, A., Beigle, M., & Gellersen, H. W. (1999). There is more to context than location. Computer & Graphics Journal, 23(6), 893–902.

    Article  Google Scholar 

  • Seifert, J., De Luca, A., & Conradi, B. (2009). A Context-Sensitive Security Model for Privacy Protection on Mobile Phones. Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, NY.

    Google Scholar 

  • Seligy, J., & Lawson, P. (2006). Compliance with Canadian Data Protection Laws: Are Retailers Measuring Up? Ottawa: Canadian Internet Policy and Public Interest Clinic.

    Google Scholar 

  • Sheth, A., Anantharam, P., & Henson, C. (2013). Physical-Cyber-Social Computing: An Early 21st Century Approach. Intelligent Systems, IEEE, 28(1), 78–82.

    Article  Google Scholar 

  • Six to Start. (n.d.). Zombies, Run! 3. (Six to Start) Retrieved September 2014, from https://www.zombiesrungame.com/

  • Solanas, A., Domingo-Ferrer, J., & Martinez-Balleste, A. (2008). Location Privacy in Location-Based Services: Beyond TTP-based Schemes. Privacy in Location-Based Applications (PiLBA’08), (pp. 12–23). Malaga, Spain.

    Google Scholar 

  • Sphero. (2014). Sphero. Retrieved August 2014, from http://www.gosphero.com

  • Taha, S., & Shen, X. (2013). A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs. IEEE Transactions on Intelligent Transportation Systems, 14(4), 1665–1680.

    Article  Google Scholar 

  • Tech4Kids. (2013). Tek Recon. (Tech4Kids) Retrieved August 2014, from http://www.tekrecon.com/

  • TIME and Qualcomm. (2012, July). Your Wireless Life: Results of TIME’s Mobility Poll. Retrieved November 2013, from http://content.time.com/time/interactive/0,31813,2122187,00.html

  • Toymail Co. LLC. (2014). Toy Mail. (Toymail Co. LLC) Retrieved from http://www.toymail.co/

  • Unger, S., Zeeb, E., Golatowski, F., Grandy, H., & Timmermann, D. (2010). Extending the Devices Profile for Web Services for Secure Mobile Device Communication. 4th International Workshop on Trustworthy Internet of People, Things & Services at the Internet of Things Conference. Tokyo, Japan. Retrieved from http://webcache.googleusercontent.com/search?q=cache:ArR-T87Qq_8 J:www.imd.uni-rostock.de/veroeff/DPWS-DA-paper.pdf

  • W3C. (2001). Web Services Description Language (WSDL) 1.1. W3C. Retrieved from www.w3.org/TR/wsdl

  • W3C. (2004). Web Services Architecture. Retrieved 2014, from http://www.w3.org/TR/ws-arch

  • W3C. (2015). Extensible Markup Language (XML). W3C. Retrieved from http://www.w3.org/XML

  • Want, R. (2006). An Introduction to RFID Technology. IEEE Pervasive Computing, 5(1).

    Google Scholar 

  • WAP-W3C. (2000). Report from WAP-W3C Joint Workshop on Mobile Web Privacy. Munich, Germany: W3C.

    Google Scholar 

  • Waters, G., Wheeler, J., Westerinen, A., Rafalow, L., & Moore, R. (1999). Policy Framework Architecture. IETF. Retrieved from http://tools.ietf.org/html/draft-ietf-policy-arch-00

  • Wenning, R. (2007, November 20). Platform for Privacy Preferences (P3P) Project: Enabling Smarter Privacy Tools for the Web. Retrieved December 2013, from W3C: http://www.w3.org/P3P/

  • Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., … Waldbusser, S. (2001, November). Terminology for Policy-Based Management. IETF RFC 3198. Retrieved from http://www.ietf.org/rfc/rfc3198.txt

  • Westeyn, T. L., Abowd, G. D., Starner, T. E., Johnson, J. M., Presti, P. W., & Weaver, K. A. (2012). Monitoring Children’s Developmental Progress using Augmented Toys and Activity Recognition. Personal Ubiquitous Computing, 2012(16), 169–191.

    Article  Google Scholar 

  • Whalen, T. (2011). Mobile Devices and Location Privacy: Where do we go from Here? IEEE Security & Privacy, 9(6), 61–62.

    Article  Google Scholar 

  • Woollaston, V. (2014, February 20). Step Aside Ted, There’s A New Talking Teddy in Town: WikiBear Connects to the Web to Chat, Answer Questions and Tell Jokes. Retrieved from DailyMail: http://www.dailymail.co.uk/sciencetech/article-2564015/Step-aside-Ted-theres-new-talking-teddy-town-WikiBear-connects-web-chat-answer-questions-tells-jokes.html

  • World Economic Forum. (2011). Personal Data: The Emergence of a New Asset Class. World Economic Forum.

    Google Scholar 

  • World Wide Web Consirtium (W3C). (2004, February 11). Web Services Architecture Requirements. Retrieved from http://www.w3.org/TR/wsa-reqs/

  • Yavatkar, R., Pendarakis, D., & Guerin, R. (2000, January). A Framework for Policy-Based Admission Control. IETF RFC2753. Retrieved from http://www.ietf.org/rfc/rfc2753.txt

  • Yelp. (2015). Yelp Mobile. (Yelp) Retrieved February 2015, from http://www.yelp.ca/yelpmobile

  • zomato. (2015). Urbanspoon. (zomato) Retrieved February 2015, from http://www.urbanspoon.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Rafferty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rafferty, L., Kroese, B., Hung, P. (2015). Toy Computing Background. In: Hung, P. (eds) Mobile Services for Toy Computing. International Series on Computer Entertainment and Media Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-21323-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21323-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21322-4

  • Online ISBN: 978-3-319-21323-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics