Privacy in Mobile and Pervasive Computing. Florian Schaub

Чтение книги онлайн.

Читать онлайн книгу Privacy in Mobile and Pervasive Computing - Florian Schaub страница 2

Privacy in Mobile and Pervasive Computing - Florian Schaub Synthesis Lectures on Mobile and Pervasive Computing

Скачать книгу

we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes “privacy” in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.

      The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

       KEYWORDS

      mobile computing, pervasive computing, ubiquitous computing, Internet of Things, privacy, security, privacy-enhancing technology, privacy behavior, privacy engineering

       Contents

       Preface

       Acknowledgments

       1 Introduction

       1.1 Lecture Goals and Overview

       1.2 Who Should Read This

       2 Understanding Privacy

       2.1 Codifying Privacy

       2.1.1 Historical Roots

       2.1.2 Privacy Law and Regulations

       2.2 Motivating Privacy

       2.2.1 Privacy Benefits

       2.2.2 Limits of Privacy

       2.3 Conceptualizing Privacy

       2.3.1 Privacy Types

       2.3.2 Privacy Constituents

       2.3.3 Privacy Expectations

       2.3.4 A Privacy Taxonomy

       2.4 Summary

       3 Mobile and Pervasive Computing

       3.1 Mobile Computing Characteristics

       3.1.1 Novel Form Factors–Mobility and Diversity

       3.1.2 Power in Your Pocket–Computation and Communication

       3.1.3 Data Recording–Sensing and Context-Awareness

       3.1.4 Software Ecosystems–The Device as a Platform

       3.2 Pervasive and Ubiquitous Computing Characteristics

       3.2.1 Embeddedness–Invisible Computing

       3.2.2 Implicit Interaction–Understanding User Intent

       3.2.3 Ubiquity–From Social to Societal Scale

       3.3 Summary

       4 Privacy Implications of Mobile and Pervasive Computing

       4.1 Data Shadows–The Digitization of Daily Life

       4.1.1 Technological Development

       4.1.2 Privacy Implications

       4.2 From Atoms to Bits–Automated Real-world Data Capture

       4.2.1 Technological Development

       4.2.2 Privacy Implications

       4.3 Profiling–Predicting Behavior

       4.3.1 Technological Development

       4.3.2 Privacy Implications

       4.4 Summary

       5 Supporting Privacy in Mobile and Pervasive Computing

       5.1 Privacy-Friendly by Default

       5.2 Privacy Risk Communication

       5.3 Privacy Management Assistance

       5.4 Context-Adaptive Privacy Mechanisms

       5.5 User-Centric Privacy Controls

       5.6 Algorithmic Accountability

       5.7 Privacy Engineering

       5.8 Summary

       6 Conclusions

       Bibliography

       Authors’ Biographies

       Preface

      In this book, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes “privacy” in the first place, and why we should care about maintaining it. The book is structured as follows.

      •

Скачать книгу