Privacy by Design for the Internet of Things: Building accountability and security最新文献

筛选
英文 中文
Data protection by design and default: IoT app development 设计和默认的数据保护:物联网应用程序开发
Andy Crabtree, T. Lodge
{"title":"Data protection by design and default: IoT app development","authors":"Andy Crabtree, T. Lodge","doi":"10.1049/pbse014e_ch7","DOIUrl":"https://doi.org/10.1049/pbse014e_ch7","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The socially negotiated management of personal data in everyday life 日常生活中个人数据的社会协商管理
D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree
{"title":"The socially negotiated management of personal data in everyday life","authors":"D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree","doi":"10.1049/pbse014e_ch4","DOIUrl":"https://doi.org/10.1049/pbse014e_ch4","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accountability in ordinary action 日常行动中的问责
P. Tolmie, Andy Crabtree
{"title":"Accountability in ordinary action","authors":"P. Tolmie, Andy Crabtree","doi":"10.1049/pbse014e_ch3","DOIUrl":"https://doi.org/10.1049/pbse014e_ch3","url":null,"abstract":"ly, various concepts of privacy posit axioms that essentially revolve around the disclosure of personal information or ‘data’. Often cited definitions thus inform us that privacy is the ability to control the disclosure of personal information [27], to create and manage interpersonal boundaries [28] and to employ contextual norms to regulate the ad hoc flow of personal information between people [29]. Concretely, the studies make it visible that privacy ordinarily and accountably revolves around managing a polymorphous array of mundane activities in which the digital is embedded in the ongoing conduct of manifold human relationships. Within this lively context, the disclosure or sharing of personal data is accountably organised in terms of managing members’ access to devices, applications and content through situated practices, procedures or methods that exploit the local ecology, device visibility and recipient design. The studies make it perspicuous that members’ concern with privacy is a concern to manage their accountability in the digital world and that manifest in data sharing practices is an evolving calculus of accountability employed to manage the potential attack surface the digital creates in everyday life. That the digital poses a threat to privacy and therefore undermines societal trust in the digital is broadly acknowledged. Much less wellknown and understood is how and why this happens and what kinds of steps beyond demonstrable compliance with the law might need to be taken to remedy the situation. 4 Privacy by design for the internet of things 3.2 The naturally accountable organisation of digital privacy in the home Managing digital privacy is intimately bound up with the observability and reportability of one’s digital activities and how other people might be able to see them in the first place. Developers and security analysts alike recommend passwords as the first line of defense to protect oneself from prying eyes. Yet there is a more fundamental naturally accountable organisation to privacy in the real world, as one of our participants, Paul (not his real name), tells us: Paul: I’m not particularly fussed about setting up passwords and things. I mean there’s no threat of network hijacking here. We live in the middle of the countryside, miles away from another house, it’s just not an issue. So as Paul makes accountable, one of the simplest and most ubiquitous ways to constrain access and protect privacy is by controlling access to the environments in which our digital activities occur, i.e., controlling access to the places in which digital devices are kept. Paul’s was not the only example of password suspension for devices considered inaccessible that we encountered in our studies. It was commonplace for devices that always stayed in the home, such as desktop PCs, tablets and media servers. The reasoning generally bound up with this is that the people who have rights of access to the network and the devices on it are the peo","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"561-565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building accountability into the Internet of Things 将问责制融入物联网
Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier
{"title":"Building accountability into the Internet of Things","authors":"Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier","doi":"10.1049/pbse014e_ch6","DOIUrl":"https://doi.org/10.1049/pbse014e_ch6","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anticipating the adoption of IoT in everyday life 期待物联网在日常生活中的应用
P. Coulton, Adrian Ioan Gradinar, Joseph Lindley
{"title":"Anticipating the adoption of IoT in everyday life","authors":"P. Coulton, Adrian Ioan Gradinar, Joseph Lindley","doi":"10.1049/pbse014e_ch10","DOIUrl":"https://doi.org/10.1049/pbse014e_ch10","url":null,"abstract":". Realising the potential economic and societal benefits of emerging and future technologies such as the Internet of Things (IoT) is dependent on a critical mass of potential users adopting them, this is often driven by whether users consider them to be acceptable. However, the processes that drive adoption and acceptability are rarely taken into consideration when researching emerging and future technologies. More often than not, either adoption is regarded as something that will naturally occur once technology is made available to the market, or the process of adoption is considered to be someone else’s future work. The result is that the discovery of challenges and barriers to adoption and acceptability occur only after potentially problematic design patterns have become established and concretised at the core of devices and services. This, in turn, can result in even the most mundane designs having unintended consequences or compromised impact. In this chapter we focus on IoT connected products which are often referred to as ‘smart’ in our IoT-enabled ‘smart homes’. The espoused promise of the smart home is that it will make our lives easier by giving us more free time, improving our energy consumption, and saving money. However, one factor which is frequently absent from these discussions is the tsunami of data which is generated and collected as we add millions of IoT products and services to our home networks. While the nuance of the emergent Human-Data relationships may not be of immediate concern to the majority of their users, when this significant activity is unexpectedly brought to the fore it can challenge our expectations and perceptions of personal privacy in our homes. Such disruptions to notions of privacy then unbalance our perception of IoT devices’ acceptability, causing users to either resist the adoption of new devices or potentially reject devices which had previously been adopted. IoT futures before","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128746717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信