Skip to main content

Information Privacy Engineering in ubiComp

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Abstract

Ubiquitous computing demands a fundamental shift in the control of personal in-formation. Ubiquitous computing requires disclosure of personal information. The technology infrastructure means the basic components of the IT society such as web servers, DB, N/W, personal information devices, etc. And they can flow the personal information through the society. Business application systems which collect, store, process and/or disclose personal information should be identified and categorized. The process map for personal in-formation handling should document the flow of data from collection through all paths, internal and external, including all processing points, access/display points and destruction points. At this level, risks to personal information can be better understood. In this paper, we present the information privacy engineering for constructing to prevent the privacy invasion and measuring the economic value of privacy. We hope this privacy engineering will be used as one of the tool for protecting the users in ubiquitous age. The approach includes the followings; The Privacy Protection in Network, The database modeling in UbiComp, The privacy impact assessment in UbiComp.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. AOL/NCSA: Online Safety Study (2004)

    Google Scholar 

  2. US: US Safe Harbor Privacy Principles (2000)

    Google Scholar 

  3. Deloitte Research: Creating a privacy value strategy (2002)

    Google Scholar 

  4. Kim, T.J., Lee, S.W., Lee, E.Y.: Privacy Engineering in ubiComp (2005)

    Google Scholar 

  5. Addison-Wesley: Database Security (1994)

    Google Scholar 

  6. Glasser Legalworks: Privacy-Taking Action to Safeguard Customer Loyalty (2001)

    Google Scholar 

  7. Information Society Technologies: Identity management PIM Roadmap-Multiple and Dependable Identity Management- R & D Issues (2002)

    Google Scholar 

  8. The National Electronic Commerce Coordinating Council: Identity Management-A White Paper (2002)

    Google Scholar 

  9. Kim, T.J., Lee, E.Y., Kim, I.H., Yoon, K.I., Kim, Y.J.: Architecture of the Privacy Governance in ubiComp (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, T.J., Kim, I.H., Lee, S.W. (2005). Information Privacy Engineering in ubiComp. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_90

Download citation

  • DOI: https://doi.org/10.1007/11553939_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics