Abstract
This article analyses the nature of personal information according to privacy and proposes different privacy managing solutions for each type of information. Mainly focused on short-term information, the “Fair Trade” metaphor will be presented as a mean to control privacy in a balance between sharing and getting information. Combined with the appropriate monitoring and punitive tools we hypothesize that this balance will reduce system abuses and enrich the information services provided. Finally a context-aware Instant Messenger prototype, based on the “Fair Trade” metaphor, will be introduced to evaluate our hypothesis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dey, K.A.: Understanding and Using Context. Personal Ubiquitous Computing 5(1) (2001)
Erickson, T., Smith, D.N., Kellogg, W.A., Laff, M., Richards, J.T., Bradner, E.: Socially Translucent Systems: Social Proxies, Persistent Conversation, and the Design of “Babble”. In: Proceedings of CHI 1999, pp. 72–79 (1999)
Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X.: Managing Pervasive Environment Privacy Using the “fair trade” Metaphor. In: CoopIS OTM 2007 Workshops, Vilamoura, Portugal, November 25-30. LNCS, vol. 4806, pp. 804–813. Springer, Heidelberg (2007)
Haya, P.A., Montoro, G., Alamán, X.: A prototype of a context-based architecture for intelligent home environments. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol. 3290, pp. 477–491. Springer, Heidelberg (2004)
Hsieh, G., Tang, K.P., Low, W.Y., Hong, J.I.: Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 91–108. Springer, Heidelberg (2007)
Isaacs, E., Tang, J.C., Morris, T.: Piazza: A Desktop Environment Supporting Impromptu and Planned Interactions. In: Proceedings of CSCW 1996, pp. 315–324 (1996)
Maes, P.: Agents that Reduce Work and Information Overload. Communications of the ACM 37(7), 31–40 (1994)
Norman, D.: How might people interact with agents. Communications of the ACM 37(7), 68–71 (1994)
Povey, D.: Optimistic Security: A New Access Control Paradigm. In: WNSP: New Security Paradigms Workshop. National Information Systems Security Conference (1999)
Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: A Middleware Infrastructure for Active Spaces. IEEE Pervasive Computing, 74–83 (2003)
Scupelli, P., Kiesler, S., Fussell, S.R., Chen, C.: Project View IM: A Tool for Juggling Multiple Projects and Teams. In: Proceedings of ACM CHI, vol. 2, pp. 1773–1776 (2005)
Tang, J.C., Yankelovich, N., Begole, J., Kleek, M.V., Li, F.C., Bhalodia, J.R.: ConNexus to Awarenex: Extending awareness to mobile users. In: Proceedings of CHI 2001, pp. 221–228 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X. (2009). A Proposal for Facilitating Privacy-Aware Applications in Active Environments. In: Corchado, J.M., Tapia, D.I., Bravo, J. (eds) 3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008. Advances in Soft Computing, vol 51. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85867-6_36
Download citation
DOI: https://doi.org/10.1007/978-3-540-85867-6_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85866-9
Online ISBN: 978-3-540-85867-6
eBook Packages: EngineeringEngineering (R0)