Skip to main content

Evaluation of “Fair Trade” Metaphor as a Control Privacy Method for Pervasive Environments

  • Conference paper
Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services (UCAmI 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8867))

  • 3176 Accesses

Abstract

This paper presents a proof of concepts from which the metaphor of "Fair Trade" is validated as an alternative to manage the private information of users. Our privacy solution deals with user’s privacy as a tradable good for obtaining environment’s services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transations registries mechamisms, enhances users’ confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22nd International Conference on Distributed Computing Systems (22nd ICDCS 2002), pp. 74–83. IEEE, Vienna (2002)

    Google Scholar 

  2. Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), p. 75. Kluwer Academic Publishers, Milan (1993)

    Google Scholar 

  3. Satyanarayanan, M.: Privacy: The Achilles Heel of Pervasive Computing. IEEE Distributed Systems Online 3(4) (2003)

    Google Scholar 

  4. Shen, Y., Pearson, S.: Privacy enhancing technologies: A review. Technical report HPL-2011-113, HP Labs (2011)

    Google Scholar 

  5. Wang, Y., Kobsa, A.: Privacy-Enhancing Technologies. In: Handbook of Research on Social and Organizational Liabilities in Information Security. IGI Global Snippet (2008)

    Google Scholar 

  6. Danezis, G., Gürses, S.: A critical review of 10 years of privacy technology. In: Proceedings of Surveillance Cultures: A Global Surveillance Society?, UK (2010)

    Google Scholar 

  7. Solove, D.: A taxonomy of privacy. University of Pennsylvania Law Review 154(3), 477 (2006)

    Article  Google Scholar 

  8. Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing 1(2), 4–8 (2003)

    Article  Google Scholar 

  9. Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, pp. 129–136. ACM Press, Ft. Lauderdale (2003)

    Google Scholar 

  10. Langheinrich, M.: Privacy in Ubiquitous Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals, pp. 95–160. CRC Press (2009)

    Google Scholar 

  11. Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X.: Managing Pervasive Environment Privacy Using the “Fair Trade” Metaphor. In: Meersman, R., Tari, Z. (eds.) OTM-Ws 2007, Part II. LNCS, vol. 4806, pp. 804–813. Springer, Heidelberg (2007)

    Google Scholar 

  12. Haya, P.A., Montoro, G., Alamán, X.: A Prototype of a Context-Based Architecture for Intelligent Home Environments. In: Meersman, R. (ed.) CoopIS/DOA/ODBASE 2004. LNCS, vol. 3290, pp. 477–491. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Abraham, E.S., Haya, P.A., Alamán, X. (2014). Evaluation of “Fair Trade” Metaphor as a Control Privacy Method for Pervasive Environments. In: Hervás, R., Lee, S., Nugent, C., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. UCAmI 2014. Lecture Notes in Computer Science, vol 8867. Springer, Cham. https://doi.org/10.1007/978-3-319-13102-3_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13102-3_56

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13101-6

  • Online ISBN: 978-3-319-13102-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics