Abstract
It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more complexes and distributed, but most system-related research is still focused on the ’performance’ or ’efficiency’. And that most studied papers in privacy have been focused on encryption technology and protocols for securing the personal information data transaction. This paper secondly points out the problem that law-related researcher thinks that law can controller technology beyond human control. Today, due to the complexity of the problem, new privacy-related research based on total solution is integrative needed to consider laws, technology, economy, norms and so on. This paper will focus on analysis about Privacy in Ubiquitous computing Environment and total protection considerations on privacy. We present new privacy-related considerations in UC (Ubiquitous computing) Environment, point out the mechanism which new re-design privacy concept (protection scope) is affected from the UC (Ubiquitous computing) Environment and provide the total considerations for Privacy protection especially personal information protection by improve the intelligent technology applied in context aware technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser, M.: The Computer for the 21st Century. Scientific American, 66–75 (September 1991)
Weiser, M.: Some Computer Science Issues in Ubiquitous Computing. Communication of the ACM 36(7), 75–84 (1993)
Kuramitsu, K., Sakamura, K.: Towards ubiquitous database in mobile commerce. In: Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access, pp. 84–85 (2001)
Neuman, C.: Security, Payment, and Privacy for Network Commerce. IEEE Journal on selected areas in communications 13(8), 1530 (1995)
Cooley, T.M.: A Treaties on the Law of Torts. Callaghan, Chicago (1888)
Langheinrich, M.: Privacy by Design - Principles of privacy - Aware Ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Culnan, M.J.: Protecting privacy online:is self-regulation working? J Public Policy Market 19(1), 20–26 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, J.M., Jung, J.N., Cha, JS., Lee, C.s. (2005). A Study on Privacy-Related Considerations in Ubiquitous Computing Environment. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_61
Download citation
DOI: https://doi.org/10.1007/11552451_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28895-4
Online ISBN: 978-3-540-31986-3
eBook Packages: Computer ScienceComputer Science (R0)