Abstract
Ubiquitous computing demands a fundamental shift in the control of personal in-formation. Ubiquitous computing requires disclosure of personal information. The technology infrastructure means the basic components of the IT society such as web servers, DB, N/W, personal information devices, etc. And they can flow the personal information through the society. Business application systems which collect, store, process and/or disclose personal information should be identified and categorized. The process map for personal in-formation handling should document the flow of data from collection through all paths, internal and external, including all processing points, access/display points and destruction points. At this level, risks to personal information can be better understood. In this paper, we present the information privacy engineering for constructing to prevent the privacy invasion and measuring the economic value of privacy. We hope this privacy engineering will be used as one of the tool for protecting the users in ubiquitous age. The approach includes the followings; The Privacy Protection in Network, The database modeling in UbiComp, The privacy impact assessment in UbiComp.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
AOL/NCSA: Online Safety Study (2004)
US: US Safe Harbor Privacy Principles (2000)
Deloitte Research: Creating a privacy value strategy (2002)
Kim, T.J., Lee, S.W., Lee, E.Y.: Privacy Engineering in ubiComp (2005)
Addison-Wesley: Database Security (1994)
Glasser Legalworks: Privacy-Taking Action to Safeguard Customer Loyalty (2001)
Information Society Technologies: Identity management PIM Roadmap-Multiple and Dependable Identity Management- R & D Issues (2002)
The National Electronic Commerce Coordinating Council: Identity Management-A White Paper (2002)
Kim, T.J., Lee, E.Y., Kim, I.H., Yoon, K.I., Kim, Y.J.: Architecture of the Privacy Governance in ubiComp (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, T.J., Kim, I.H., Lee, S.W. (2005). Information Privacy Engineering in ubiComp. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_90
Download citation
DOI: https://doi.org/10.1007/11553939_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)