Ubiquitous computing demands a fundamental shift in the control of personal in-formation. Ubiquitous computing requires disclosure of personal information. The technology infrastructure means the basic components of the IT society such as web servers, DB, N/W, personal information devices, etc. And they can flow the personal information through the society. Business application systems which collect, store, process and/or disclose personal information should be identified and categorized. The process map for personal in-formation handling should document the flow of data from collection through all paths, internal and external, including all processing points, access/display points and destruction points. At this level, risks to personal information can be better understood. In this paper, we present the information privacy engineering for constructing to prevent the privacy invasion and measuring the economic value of privacy. We hope this privacy engineering will be used as one of the tool for protecting the users in ubiquitous age. The approach includes the followings; The Privacy Protection in Network, The database modeling in UbiComp, The privacy impact assessment in UbiComp. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Kim, T. J., Kim, I. H., & Lee, S. W. (2005). Information privacy engineering in ubiComp. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3683 LNAI, pp. 628–634). Springer Verlag. https://doi.org/10.1007/11553939_90
Mendeley helps you to discover research relevant for your work.