Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3482))

Included in the following conference series:

Abstract

In the ubiquitous age, privacy will be the matter of trade-offs about pros and cons of revealing personal information for personalized services. Ubiquitous computing demands a fundamental shift in the control of personal information and requires disclosure of personal information. As we enjoy comfortable life, the invasion of personal information can be occurred at the same time. The privacy requires the effective security, but the effective security does not guarantee the effective privacy. We present the privacy engineering in order to prevent the privacy invasion and measure the economic value of privacy. We hope this privacy engineering in ubiComp will be used as one of the tool for protecting the users in the ubiquitous age. The approach includes the followings; the architecture of the privacy engineering, the database modeling, the privacy impact assessment, the economic value assessment of the privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. US: US Safe Harbor Privacy Principles (2000)

    Google Scholar 

  2. Deloitte Research: Creating a privacy value strategy (2002)

    Google Scholar 

  3. Glasser Legalworks: Privacy- Taking Action to Safeguard Customer Loyalty (2001)

    Google Scholar 

  4. Kim, T.J., Lee, E.Y., Kim, I.H., Yoon, K.I., Kim, Y.J.: Architecture of the Privacy Governance in ubiComp (2004)

    Google Scholar 

  5. Pathak, J.: Information Technology Auditing and cybersommerce (2004)

    Google Scholar 

  6. Disaster Recovery Institute International: Evaluating & selecting the most appropriate continuity strategy for your organization (2002)

    Google Scholar 

  7. CNET: Securing data from the threat within (2005)

    Google Scholar 

  8. Ackerman, L., Kempf, J.: Wireless Location Privacy- A Report on Law and Policy in the US, the EU, and Japan (2003)

    Google Scholar 

  9. Database Security. Addison-Wesley, Reading (1994)

    Google Scholar 

  10. Information Society Technologies: Identity management PIM Roadmap- Multiple and Dependable Identity Management- R & D Issues (2002)

    Google Scholar 

  11. The National Electronic Commerce Coordinating Council: Identity Management- A White Paper (2002)

    Google Scholar 

  12. Kurzban, S.: Implementation of Access Controls (1998)

    Google Scholar 

  13. IT governance Institute: Enterprisewide Identity Management (2004)

    Google Scholar 

  14. Office of Management and Budget: OMB Guidance for implementing the privacy provision of the E-Government Act of 2002 (2003)

    Google Scholar 

  15. Privacy and E-Government: privacy Impact Assessments and Privacy Commissioners- Two Mechanisms for Protecting Privacy to Promote Citizen Trust Online (2003)

    Google Scholar 

  16. Harris, P.R.: The European perspective is Data Protection value for money (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, T.J., Lee, S.W., Lee, E.Y. (2005). Privacy Engineering in ubiComp. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_136

Download citation

  • DOI: https://doi.org/10.1007/11424857_136

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25862-9

  • Online ISBN: 978-3-540-32045-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics