{"title":"上下文中的隐私:普适计算应用中的隐私问题","authors":"C. O'Driscoll","doi":"10.1109/ICDIM.2008.4746842","DOIUrl":null,"url":null,"abstract":"This paper presents a review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications. Privacy is discussed to determine factors that affect peoples own privacy preferences in public and private environments. Ubiquitous environments based on invisible computers provide a particular challenge where limited user interfaces exist to inform users of the level of data collection and its usage. There is acceptance by designers of privacy-sensitive applications for a balance between control and feedback that is essential for systems to meet legal requirements for deployment to be successful. A survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment. This paper aims to provide a foundation for developing and assessing privacy-sensitive applications.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"208-209 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Privacy in context: Privacy issues in Ubiquitous Computing applications\",\"authors\":\"C. O'Driscoll\",\"doi\":\"10.1109/ICDIM.2008.4746842\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications. Privacy is discussed to determine factors that affect peoples own privacy preferences in public and private environments. Ubiquitous environments based on invisible computers provide a particular challenge where limited user interfaces exist to inform users of the level of data collection and its usage. There is acceptance by designers of privacy-sensitive applications for a balance between control and feedback that is essential for systems to meet legal requirements for deployment to be successful. A survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment. This paper aims to provide a foundation for developing and assessing privacy-sensitive applications.\",\"PeriodicalId\":415013,\"journal\":{\"name\":\"2008 Third International Conference on Digital Information Management\",\"volume\":\"208-209 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Digital Information Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDIM.2008.4746842\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2008.4746842","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy in context: Privacy issues in Ubiquitous Computing applications
This paper presents a review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications. Privacy is discussed to determine factors that affect peoples own privacy preferences in public and private environments. Ubiquitous environments based on invisible computers provide a particular challenge where limited user interfaces exist to inform users of the level of data collection and its usage. There is acceptance by designers of privacy-sensitive applications for a balance between control and feedback that is essential for systems to meet legal requirements for deployment to be successful. A survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment. This paper aims to provide a foundation for developing and assessing privacy-sensitive applications.