Abstract
This paper presents a proof of concepts from which the metaphor of "Fair Trade" is validated as an alternative to manage the private information of users. Our privacy solution deals with user’s privacy as a tradable good for obtaining environment’s services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transations registries mechamisms, enhances users’ confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22nd International Conference on Distributed Computing Systems (22nd ICDCS 2002), pp. 74–83. IEEE, Vienna (2002)
Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), p. 75. Kluwer Academic Publishers, Milan (1993)
Satyanarayanan, M.: Privacy: The Achilles Heel of Pervasive Computing. IEEE Distributed Systems Online 3(4) (2003)
Shen, Y., Pearson, S.: Privacy enhancing technologies: A review. Technical report HPL-2011-113, HP Labs (2011)
Wang, Y., Kobsa, A.: Privacy-Enhancing Technologies. In: Handbook of Research on Social and Organizational Liabilities in Information Security. IGI Global Snippet (2008)
Danezis, G., Gürses, S.: A critical review of 10 years of privacy technology. In: Proceedings of Surveillance Cultures: A Global Surveillance Society?, UK (2010)
Solove, D.: A taxonomy of privacy. University of Pennsylvania Law Review 154(3), 477 (2006)
Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing 1(2), 4–8 (2003)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, pp. 129–136. ACM Press, Ft. Lauderdale (2003)
Langheinrich, M.: Privacy in Ubiquitous Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals, pp. 95–160. CRC Press (2009)
Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X.: Managing Pervasive Environment Privacy Using the “Fair Trade” Metaphor. In: Meersman, R., Tari, Z. (eds.) OTM-Ws 2007, Part II. LNCS, vol. 4806, pp. 804–813. Springer, Heidelberg (2007)
Haya, P.A., Montoro, G., Alamán, X.: A Prototype of a Context-Based Architecture for Intelligent Home Environments. In: Meersman, R. (ed.) CoopIS/DOA/ODBASE 2004. LNCS, vol. 3290, pp. 477–491. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Abraham, E.S., Haya, P.A., Alamán, X. (2014). Evaluation of “Fair Trade” Metaphor as a Control Privacy Method for Pervasive Environments. In: Hervás, R., Lee, S., Nugent, C., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. UCAmI 2014. Lecture Notes in Computer Science, vol 8867. Springer, Cham. https://doi.org/10.1007/978-3-319-13102-3_56
Download citation
DOI: https://doi.org/10.1007/978-3-319-13102-3_56
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13101-6
Online ISBN: 978-3-319-13102-3
eBook Packages: Computer ScienceComputer Science (R0)