Skip to main content

A Study on Privacy-Related Considerations in Ubiquitous Computing Environment

(A Focus on Context Aware Environment Applied in Intelligent Technology)

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

  • 732 Accesses

Abstract

It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more complexes and distributed, but most system-related research is still focused on the ’performance’ or ’efficiency’. And that most studied papers in privacy have been focused on encryption technology and protocols for securing the personal information data transaction. This paper secondly points out the problem that law-related researcher thinks that law can controller technology beyond human control. Today, due to the complexity of the problem, new privacy-related research based on total solution is integrative needed to consider laws, technology, economy, norms and so on. This paper will focus on analysis about Privacy in Ubiquitous computing Environment and total protection considerations on privacy. We present new privacy-related considerations in UC (Ubiquitous computing) Environment, point out the mechanism which new re-design privacy concept (protection scope) is affected from the UC (Ubiquitous computing) Environment and provide the total considerations for Privacy protection especially personal information protection by improve the intelligent technology applied in context aware technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer for the 21st Century. Scientific American, 66–75 (September 1991)

    Google Scholar 

  2. Weiser, M.: Some Computer Science Issues in Ubiquitous Computing. Communication of the ACM 36(7), 75–84 (1993)

    Article  Google Scholar 

  3. Kuramitsu, K., Sakamura, K.: Towards ubiquitous database in mobile commerce. In: Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access, pp. 84–85 (2001)

    Google Scholar 

  4. Neuman, C.: Security, Payment, and Privacy for Network Commerce. IEEE Journal on selected areas in communications 13(8), 1530 (1995)

    Article  Google Scholar 

  5. Cooley, T.M.: A Treaties on the Law of Torts. Callaghan, Chicago (1888)

    Google Scholar 

  6. Langheinrich, M.: Privacy by Design - Principles of privacy - Aware Ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Culnan, M.J.: Protecting privacy online:is self-regulation working? J Public Policy Market 19(1), 20–26 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, J.M., Jung, J.N., Cha, JS., Lee, C.s. (2005). A Study on Privacy-Related Considerations in Ubiquitous Computing Environment. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_61

Download citation

  • DOI: https://doi.org/10.1007/11552451_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics