skip to main content
10.1145/1314333.1314349acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Disappearing for a while - using white lies in pervasive computing

Published: 29 October 2007 Publication History

Abstract

The pervasive nature of future living environments, saturated with sensors and context-detecting services, pose a completely new challenge for computer science: the art of virtual disappearance. In many situations individuals do not want to be tracked by the environment and do not want their where abouts to be known publicly or even by their friends and relatives. Today's technology often allowsus to use white lies in such circumstances. The question we pose in this paper is: Can we achieve the same using pervasive computing technologies? In this paper we show how our User-centric Privacy Framework can be extended to allow users to pro-actively use white lies as a means to disguise their location or activity without sacrificing the use of context-services as a whole. As a result we are confident that also in the future we can perform some magic:disappearing for a while - when needed.

References

[1]
Marc Langheinrich et al, "As we may live - Real-world Implications of Ubiquitous Computing," Swiss Federal Institute of Technology, ETH Zurich, 2002.
[2]
B. A. Price, K. Adam, and B. Nuseibeh, "Keeping ubiquitous computing to yourself: a practical model for user control of privacy," International Journal of Human-Computer Studies, 63:228,253, 2005.
[3]
Jason I. Hong and James A. Landay, "An architecture for privacy-sensitive ubiquitous computing," In the ACM Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004.
[4]
Scott Lederer et al, "Personal privacy through understanding and action: five pitfalls for designers," International Journal of Personal and Ubiquitous Computing. Vol. 8, Issue 6, 2004.
[5]
Mika Raento and Antti Oulasvirta, "Privacy management for social awareness applications," In the Proceedings of the workshop on Context Awareness for Proactive Systems, 2005.
[6]
"Brits prefer 'techno treachery' when telling white lies," Online Survey, Friends Provident PLC, News from 28 December 2006.
[7]
Susana Alcalde Bagüés et al, "Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing," International Journal of Smart Home. Vol. 1 No. 2., 2007.

Cited By

View all
  • (2015)The Ethical Implications of Personal Health MonitoringBusiness Law and Ethics10.4018/978-1-4666-8195-8.ch069(1414-1440)Online publication date: 2015
  • (2014)The Ethical Implications of Personal Health MonitoringInternational Journal of Technoethics10.4018/ijt.20140701045:2(37-60)Online publication date: 1-Jul-2014
  • (2013)What a tangled web we weaveProceedings of the 2013 conference on Computer supported cooperative work10.1145/2441776.2441808(273-284)Online publication date: 23-Feb-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
October 2007
116 pages
ISBN:9781595938831
DOI:10.1145/1314333
  • General Chair:
  • Peng Ning,
  • Program Chair:
  • Ting Yu
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. pervasive computing
  2. privacy
  3. white lies

Qualifiers

  • Article

Conference

CCS07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)The Ethical Implications of Personal Health MonitoringBusiness Law and Ethics10.4018/978-1-4666-8195-8.ch069(1414-1440)Online publication date: 2015
  • (2014)The Ethical Implications of Personal Health MonitoringInternational Journal of Technoethics10.4018/ijt.20140701045:2(37-60)Online publication date: 1-Jul-2014
  • (2013)What a tangled web we weaveProceedings of the 2013 conference on Computer supported cooperative work10.1145/2441776.2441808(273-284)Online publication date: 23-Feb-2013
  • (2013)Location Sharing with Trusted Peers -- Measuring Sensitivity of Location ObservationsProceedings of the 2013 IEEE 14th International Conference on Mobile Data Management - Volume 0210.1109/MDM.2013.69(73-78)Online publication date: 3-Jun-2013
  • (2009)Faking contextual data for fun, profit, and privacyProceedings of the 8th ACM workshop on Privacy in the electronic society10.1145/1655188.1655204(105-108)Online publication date: 9-Nov-2009
  • (2008)ObligationsProceedings of the 5th international conference on Trust, Privacy and Security in Digital Business10.1007/978-3-540-85735-8_17(173-184)Online publication date: 4-Sep-2008
  • (undefined)Designing the Health-Related Internet of Things: Ethical Principles and GuidelinesSSRN Electronic Journal10.2139/ssrn.2943006
  • (undefined)Ethics of the Health-Related Internet of Things: Mapping the DebateSSRN Electronic Journal10.2139/ssrn.2932221

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media