Abstract
In the ubiquitous age, privacy will be the matter of trade-offs about pros and cons of revealing personal information for personalized services. Ubiquitous computing demands a fundamental shift in the control of personal information and requires disclosure of personal information. As we enjoy comfortable life, the invasion of personal information can be occurred at the same time. The privacy requires the effective security, but the effective security does not guarantee the effective privacy. We present the privacy engineering in order to prevent the privacy invasion and measure the economic value of privacy. We hope this privacy engineering in ubiComp will be used as one of the tool for protecting the users in the ubiquitous age. The approach includes the followings; the architecture of the privacy engineering, the database modeling, the privacy impact assessment, the economic value assessment of the privacy.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
US: US Safe Harbor Privacy Principles (2000)
Deloitte Research: Creating a privacy value strategy (2002)
Glasser Legalworks: Privacy- Taking Action to Safeguard Customer Loyalty (2001)
Kim, T.J., Lee, E.Y., Kim, I.H., Yoon, K.I., Kim, Y.J.: Architecture of the Privacy Governance in ubiComp (2004)
Pathak, J.: Information Technology Auditing and cybersommerce (2004)
Disaster Recovery Institute International: Evaluating & selecting the most appropriate continuity strategy for your organization (2002)
CNET: Securing data from the threat within (2005)
Ackerman, L., Kempf, J.: Wireless Location Privacy- A Report on Law and Policy in the US, the EU, and Japan (2003)
Database Security. Addison-Wesley, Reading (1994)
Information Society Technologies: Identity management PIM Roadmap- Multiple and Dependable Identity Management- R & D Issues (2002)
The National Electronic Commerce Coordinating Council: Identity Management- A White Paper (2002)
Kurzban, S.: Implementation of Access Controls (1998)
IT governance Institute: Enterprisewide Identity Management (2004)
Office of Management and Budget: OMB Guidance for implementing the privacy provision of the E-Government Act of 2002 (2003)
Privacy and E-Government: privacy Impact Assessments and Privacy Commissioners- Two Mechanisms for Protecting Privacy to Promote Citizen Trust Online (2003)
Harris, P.R.: The European perspective is Data Protection value for money (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, T.J., Lee, S.W., Lee, E.Y. (2005). Privacy Engineering in ubiComp. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_136
Download citation
DOI: https://doi.org/10.1007/11424857_136
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25862-9
Online ISBN: 978-3-540-32045-6
eBook Packages: Computer ScienceComputer Science (R0)