Information privacy engineering in ubiComp

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ubiquitous computing demands a fundamental shift in the control of personal in-formation. Ubiquitous computing requires disclosure of personal information. The technology infrastructure means the basic components of the IT society such as web servers, DB, N/W, personal information devices, etc. And they can flow the personal information through the society. Business application systems which collect, store, process and/or disclose personal information should be identified and categorized. The process map for personal in-formation handling should document the flow of data from collection through all paths, internal and external, including all processing points, access/display points and destruction points. At this level, risks to personal information can be better understood. In this paper, we present the information privacy engineering for constructing to prevent the privacy invasion and measuring the economic value of privacy. We hope this privacy engineering will be used as one of the tool for protecting the users in ubiquitous age. The approach includes the followings; The Privacy Protection in Network, The database modeling in UbiComp, The privacy impact assessment in UbiComp. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kim, T. J., Kim, I. H., & Lee, S. W. (2005). Information privacy engineering in ubiComp. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3683 LNAI, pp. 628–634). Springer Verlag. https://doi.org/10.1007/11553939_90

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free