Privacy in Mobile and Pervasive Computing. Florian Schaub
Чтение книги онлайн.
Читать онлайн книгу Privacy in Mobile and Pervasive Computing - Florian Schaub страница 2
The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
KEYWORDS
mobile computing, pervasive computing, ubiquitous computing, Internet of Things, privacy, security, privacy-enhancing technology, privacy behavior, privacy engineering
Contents
1.1 Lecture Goals and Overview
2.1.2 Privacy Law and Regulations
2.2.2 Limits of Privacy
2.3 Conceptualizing Privacy
2.3.1 Privacy Types
2.3.2 Privacy Constituents
2.3.3 Privacy Expectations
2.3.4 A Privacy Taxonomy
2.4 Summary
3 Mobile and Pervasive Computing
3.1 Mobile Computing Characteristics
3.1.1 Novel Form Factors–Mobility and Diversity
3.1.2 Power in Your Pocket–Computation and Communication
3.1.3 Data Recording–Sensing and Context-Awareness
3.1.4 Software Ecosystems–The Device as a Platform
3.2 Pervasive and Ubiquitous Computing Characteristics
3.2.1 Embeddedness–Invisible Computing
3.2.2 Implicit Interaction–Understanding User Intent
3.2.3 Ubiquity–From Social to Societal Scale
3.3 Summary
4 Privacy Implications of Mobile and Pervasive Computing
4.1 Data Shadows–The Digitization of Daily Life
4.1.1 Technological Development
4.1.2 Privacy Implications
4.2 From Atoms to Bits–Automated Real-world Data Capture
4.2.1 Technological Development
4.2.2 Privacy Implications
4.3 Profiling–Predicting Behavior
4.3.1 Technological Development
4.3.2 Privacy Implications
4.4 Summary
5 Supporting Privacy in Mobile and Pervasive Computing
5.1 Privacy-Friendly by Default
5.2 Privacy Risk Communication
5.3 Privacy Management Assistance
5.4 Context-Adaptive Privacy Mechanisms
5.5 User-Centric Privacy Controls
5.6 Algorithmic Accountability
5.7 Privacy Engineering
5.8 Summary
Preface
In this book, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes “privacy” in the first place, and why we should care about maintaining it. The book is structured as follows.