Hong-PrivacySensitiveUbiquitousComputing

Hong-PrivacySensitiveUbiquitousComputing - An Architecture...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California at Berkeley Berkeley, CA, 94720-1776 USA jasonh@cs.berkeley.edu James A. Landay DUB Group Computer Science and Engineering University of Washington Seattle, WA 98105-4615 USA landay@cs.washington.edu ABSTRACT Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs. Categories and Subject Descriptors D.2.2 [ Software Engineering ]: Design Tools and Techniques Software libraries. D.2.11 [ Software Engineering ]: Software Architectures Domain-specific architectures. H.1.2 [ Models and Principles ]: User/Machine Systems Human factors. H.5.2 [ Information Interfaces and Presentation ]: User Interfaces User-centered design. K.4.1 [ Computers and Society ]: Public Policy Issues Privacy. General Terms Design, Security, Human Factors Keywords Ubiquitous computing, privacy, toolkit, Confab, location 1. INTRODUCTION Westin defined information privacy as the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others [70]. While many people believe that ubiquitous computing holds great promise, privacy is easily its most often-cited criticism. Numerous interviews (e.g. [8, 35, 43]), essays (e.g. [21, 67, 69]), books (e.g. [11, 28]), and negative media coverage (e.g. [64, 71]) have described peoples concerns about the strong potential for abuse, general unease over a potential lack of control, and desire for privacy-sensitive systems. These concerns suggest that privacy may be the greatest barrier to the long-term success of ubiquitous computing. The large majority of previous work on privacy has tended to focus on providing anonymity or on keeping personal information and messages secret from hackers, governments, and faceless corporations. While anonymity and secrecy are clearly important, they only address a relatively narrow aspect of privacy and do not cover the many situations in everyday life where people do want to share information with others. For example, one could imagine to share information with others....
View Full Document

This note was uploaded on 08/25/2011 for the course EEL 6788 taught by Professor Boloni,l during the Spring '08 term at University of Central Florida.

Page1 / 13

Hong-PrivacySensitiveUbiquitousComputing - An Architecture...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online