Skip to main content
Log in

Understanding privacy regulation in ubicomp interactions

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Ubiquitous computing contains a huge promise for more intelligent services that are available anywhere and are able to dynamically adapt to the users’ current context. However, what necessarily follows such an environment is the compromising of the users’ privacy. We aim at analyzing this complex issue by applying and extending Altman’s theoretical privacy framework, well known in social sciences, to privacy in ubicomp. Altman understands privacy as a two-way interactive process, which makes the approach promising in analyzing ubicomp where people, devices and the environment interact with each other. We point out similarities between the existing model and the features of ubicomp environment, and verify the results by applying and analyzing the resulting extended framework to typical ubicomp use cases. Based on the analysis, we argue that privacy in ubicomp can be modeled similarly to privacy in general by extending the model to cover such factors as mediation and non-human actors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. This paper emphasizes the role of a personal device as a mediator. However, the mediator can also be a system that one access via general access devices in the environment or via shared, and thus, less personal devices.

References

  1. Weiser M (1991) The Computer for the Twenty-First Century. Scientific American, September 1991, pp 94–10

  2. Abowd GD, Atkeson CG, Feinstein A, Hmelo C, Kooper R, Long S, Sawhney N, Tan M (1996) Teaching and learning as multimedia authoring: the classroom 2000 project. In: Proceedings of ACM Multimedia 1996, pp 187–198

  3. Geyer W, Richter H, Abowd GD (2003) Making multimedia meeting records more meaningful. In: Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), vol 2, pp 669–672

  4. Edwards WK, Grinter RE (2001) At home with ubiquitous computing: seven challenges. In: Proceedings of UbiComp 2001, pp 256–272

  5. Beigl M, Krohn A, Zimmer T, Decker C (2004) Typical sensors needed in ubiquitous and pervasive computing. In: Proceedings of International Workshop of Networked Sensing Systems (INSS) 2004, pp 153–158

  6. Kindberg T, Fox A (2002) System software for ubiquitous computing. Pervasive Comput 1(1):70–81

    Article  Google Scholar 

  7. Sun J-Z (2001) Mobile ad-hoc networking: an essential technology for pervasive computing. In: Proceedings of Internationals Conferences on Info-tech and Info-net, vol 3, pp 316–321

  8. Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75–84

    Article  Google Scholar 

  9. Koskela T, Väänänen-Vainio-Mattila K (2004) Evolution towards smart home environments: empirical evaluation of three user interfaces. PUC 8(3–4):234–240

    Google Scholar 

  10. Intille SS, Tapia EM, Rondoni J, Beaudin J, Kukla C, Agarwal S, Bao L (2003) Tools for studying behavior and technology in natural settings. In: Proceedings of UbiComp 2003, pp 157–174

  11. Altman I (1975) The environment and social behavior. Brooks/Cole Publishing, Monterey

    Google Scholar 

  12. Palen L, Dourish P (2003) Unpacking “Privacy” for a networked world. In: Proceedings of ACM CHI 2003 Conference on Human Factors in Computing Systems 2003, vol 1, pp 129–136

  13. Al-Muhtadi J, Campbell R, Kapadia A, Mickunas MD, Seung Yi (2002) Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: Proceedings of International Conference of Distributed Computing Systems (ICDCS) 2002, pp 65–74

  14. Soppera A, Burbridge T (2004) Maintaining privacy in pervasive computing—enabling acceptance of sensor-based services. BT Technol J 22(3):106–118

    Article  Google Scholar 

  15. Westin A (1970) Privacy and freedom, 2nd edn Atheneum, New York

    Google Scholar 

  16. Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237–245

  17. Marx GT (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157–169

    Article  Google Scholar 

  18. Bellotti V, Sellen A (1993) Design for privacy in ubiquitous computing environments. In: Proceedings of ECSCW 1993, pp 77–92

  19. Price B, Adam K, Nuseibeh B (2005) Keeping ubiquitous computing to yourself: a practical model for user control of privacy. Int J Hum Comput Stud 228–253

  20. Adams A, Sasse MA (1999) Taming the wolf in sheep’s clothing: privacy in multimedia communications. In: Proceedings of ACM Multimedia 1999, pp 101–107

  21. Adams A (2000) Multimedia information changes the whole privacy ballgame. In: Proceedings of the tenth conference on Computers, freedom and privacy, 2000, pp 25–32

  22. Hong JI, Ng JD, Lederer S (2004) Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of Designing Interactive Systems (DIS) 2004, pp 91–100

  23. Jiang X, Hong JI, Landay JA (2002) Approximate information flows: socially-based modeling of privacy in ubiquitous computing. In: Proceedings of UbiComp 2002, pp 176–1993

  24. Lederer S, Dey AK, Mankoff J (2002) Everyday privacy in ubiquitous computing environments. Presented at the workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, Conference on Ubiquitous Computing, Ubicomp 2002. Available onlilne at http://www.guir.berkeley.edu/pubs/ubicomp2002/privacyworkshop/papers/lederer-ubicomp02-workshop.pdf. Last checked Oct 3, 2005

  25. Lessig L (2005) The architecture of privacy. In: Proceedings of Taiwan NET 1998. Available online at http://www.lessig.org/content/articles/works/architecture_priv.pdf. Last checked Oct 3, 2005

  26. Adams A (1999) The implications of users’ privacy perception on communication and information privacy policies. In: Proceedings of Telecommunications Policy Research Conference, 1999

  27. Beckwith R (2003) Designing for ubiquity: the perception of privacy. Pervasive Comput 40–46

  28. Campbell R, Al-Muhtadi J, Naldurg P, Sampemane G, Mickunas MD (2003) Towards security and privacy for pervasive computing. In: Proceedings of International Symposium on Software Security—Theories and Systems, 2003, pp 1–15

  29. Petronio S (1991) Communication boundary management: a theoretical model of managing disclosure of private information between marital couples. Commun Theory 1:311–335

    Article  Google Scholar 

  30. Dey KA (2001) Understanding and using context. Personal Ubiquitous Comput J 5(1):4–7

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaakko T. Lehikoinen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lehikoinen, J.T., Lehikoinen, J. & Huuskonen, P. Understanding privacy regulation in ubicomp interactions. Pers Ubiquit Comput 12, 543–553 (2008). https://doi.org/10.1007/s00779-007-0163-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-007-0163-2

Keywords

Navigation