Privacy in Mobile and Pervasive Computing. Florian Schaub

Читать онлайн книгу.

Privacy in Mobile and Pervasive Computing - Florian Schaub


Скачать книгу
ection>

      

       Privacy in Mobile and Pervasive Computing

       Synthesis Lectures on Mobile and Pervasive Computing

      Editor

       Mahadev Satyanarayanan, Carnegie Mellon University

      Synthesis Lectures on Mobile and Pervasive Computing is edited by Mahadev Satyanarayanan of Carnegie Mellon University. Mobile computing and pervasive computing represent major evolutionary steps in distributed systems, a line of research and development that dates back to the mid-1970s. Although many basic principles of distributed system design continue to apply, four key constraints of mobility have forced the development of specialized techniques. These include: unpredictable variation in network quality, lowered trust and robustness of mobile elements, limitations on local resources imposed by weight and size constraints, and concern for battery power consumption. Beyond mobile computing lies pervasive (or ubiquitous) computing, whose essence is the creation of environments saturated with computing and communication, yet gracefully integrated with human users. A rich collection of topics lies at the intersections of mobile and pervasive computing with many other areas of computer science.

      Privacy in Mobile and Pervasive Computing

      Marc Langheinrich and Florian Schaub

      2018

      Mobile User Research: A Practical Guide

      Sunny Consolvo, Frank R. Bentley, Eric B. Hekler, and Sayali S. Phatak

      2017

      Pervasive Displays: Understanding the Future of Digital Signage

      Nigel Davies, Sarah Clinch, and Florian Alt

      2014

      Cyber Foraging: Bridging Mobile and Cloud Computing

      Jason Flinn

      2012

      Mobile Platforms and Development Environments

      Sumi Helal, Raja Bose, and Wendong Li

      2012

      Quality of Service in Wireless Networks Over Unlicensed Spectrum

      Klara Nahrstedt

      2011

      The Landscape of Pervasive Computing Standards

      Sumi Helal

      2010

      A Practical Guide to Testing Wireless Smartphone Applications

      Julian Harty

      2009

      Location Systems: An Introduction to the Technology Behind Location Awareness

      Anthony LaMarca and Eyal de Lara

      2008

      Replicated Data Management for Mobile Computing

      Douglas B. Terry

      2008

      Application Design for Wearable Computing

      Dan Siewiorek, Asim Smailagic, and Thad Starner

      2008

      Controlling Energy Demand in Mobile Computing Systems

      Carla Schlatter Ellis

      2007

      RFID Explained: A Primer on Radio Frequency Identification Technologies

      Roy Want

      2006

      Copyright © 2019 by Morgan & Claypool

      All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopy, recording, or any other except for brief quotations in printed reviews, without the prior permission of the publisher.

      Privacy in Mobile and Pervasive Computing

      Marc Langheinrich and Florian Schaub

       www.morganclaypool.com

      ISBN: 9781681731179 paperback

      ISBN: 9781681731186 ebook

      ISBN: 9781681734712 epub

      ISBN: 9781681734583 hardcover

      DOI 10.2200/S00882ED1V01Y201810MPC013

      A Publication in the Morgan & Claypool Publishers series

       SYNTHESIS LECTURES ON MOBILE AND PERVASIVE COMPUTING

      Lecture #13

      Series Editor: Mahadev Satyanarayanan, Carnegie Mellon University

      Series ISSN

      Print 1933-9011 Electronic 1933-902X

       Privacy in Mobile and Pervasive Computing

      Marc Langheinrich

      Università della Svizzera Italiana (USI)

      Florian Schaub

      University of Michigan

       SYNTHESIS LECTURES ON MOBILE AND PERVASIVE COMPUTING #13

Image

       ABSTRACT

      It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.

      In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes “privacy” in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.

      The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

       KEYWORDS

      mobile computing, pervasive computing, ubiquitous computing, Internet of Things, privacy, security, privacy-enhancing technology, privacy behavior, privacy engineering

       Contents

       Preface


Скачать книгу