• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments (2002)

by Alessandro Acquisti
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 19
Next 10 →

The Language of Privacy: Learning from video media space analysis and design

by Michael Boyle, Saul Greenberg - ACM TOCHI , 2005
"... Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy problems uncovered in prior work, questions remai ..."
Abstract - Cited by 79 (12 self) - Add to MetaCart
Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy problems uncovered in prior work, questions remain as to how to design a privacy-preserving video media space and how to evaluate its effect on privacy. The problem is more deeply rooted than this, however. Privacy is an enormous concept from which a large vocabulary of terms emerges. Disambiguating the meanings of and relationships between these terms facilitates understanding of the link between privacy and design. In this article, we draw from resources in environmental psychology and computersupported cooperative work (CSCW) to build a broadly and deeply rooted vocabulary for privacy. We relate the vocabulary back to the real and hard problem of designing privacy-preserving video media spaces. In doing so, we facilitate analysis of the privacy-design relationship.

Keeping ubiquitous computing to yourself: a practical model for user control of privacy

by Blaine A. Price, Karim Adam, Bashar Nuseibeh - International Journal of Human-Computer Studies , 2005
"... As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently ..."
Abstract - Cited by 33 (5 self) - Add to MetaCart
As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user’s privacy preferences against the applicable privacy regulations and incorporates five types of user controlled “noise ” to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.

Towards everyday privacy for ubiquitous computing

by Scott Lederer, Jason I. Hong, Xiaodong Jiang, Anind Dey, James L, Jen Mankoff , 2003
"... The goal of everyday privacy is to make it easy for endusers to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback abo ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
The goal of everyday privacy is to make it easy for endusers to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback about disclosure. We also describe a prototype we have created for helping end-users manage their personal privacy, an evaluation of that prototype, and a revised prototype based on feedback from the evaluation.

Losses, Gains, and Hyperbolic Discounting: An Experimental Approach to Information Security Attitudes and Behavior

by Alessandro Acquisti, Jens Grossklags , 2003
"... 2nd Annual Workshop on “Economics and Information Security” Surveys and experiments have uncovered a dichotomy between stated attitudes and actual behavior of individuals facing decisions affecting their privacy and their personal information security. Surveys report that most individuals are concer ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
2nd Annual Workshop on “Economics and Information Security” Surveys and experiments have uncovered a dichotomy between stated attitudes and actual behavior of individuals facing decisions affecting their privacy and their personal information security. Surveys report that most individuals are concerned about the security of their personal information and are willing to act to protect it. Experiments reveal that very few individuals actually take any action to protect their personal information, even when doing so involves limited costs. In this paper we analyze the causes of this dichotomy. We discuss which economic considerations are likely to affect individual choice and we advance testable hypotheses about why individuals ’ information security attitudes seem inconsistent with their behavior. We then outline an experimental design to test our hypotheses. The experiment is designed to compare individuals ’ characteristics as market agents to their information security attitudes and behavior.
(Show Context)

Citation Context

...abstract representations to actual implementations, we realize that an economic agent will actually face an intricate web of trade-offs dominated by subjective evaluations and uncertainties (see also =-=[2]-=-). Because of these uncertainties, individuals might be discounting the potential (and subjectively evaluated) losses from losing control of their personal information with the unlikely probability th...

An User-centric MIX-net Protocol to Protect Privacy

by Alessandro Acquisti - In Proc. of the Workshop on Privacy in Digital Environments: Empowering Users , 2002
"... MIX-net" systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be ad ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
MIX-net" systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be adapted to put the user at the center of the protocol and in control of it, so that each participant can take active steps to protect his or her privacy. The paper also highlights various possible uses of the protocol. Being "in control" comes at a cost, however, and the paper discusses the trade-o#s arising from the proposed approach.

The development of a privacy-enhancing infrastructure: Some interesting findings

by Patrik Osbakk - Ubicomp Privacy: Current Status and Future Directions Workshop, UbiComp 2004 , 2004
"... Providing privacy protection for ubiquitous environments is a complex task that has only recently has become a hot topic. In this paper we describe the current state of our privacyenhancing infrastructure and address some issues that have arisen during its evolution. In particular we contrast users’ ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Providing privacy protection for ubiquitous environments is a complex task that has only recently has become a hot topic. In this paper we describe the current state of our privacyenhancing infrastructure and address some issues that have arisen during its evolution. In particular we contrast users’ online and offline privacy concerns, and their perceived and actual performance in configuring access control mechanisms. We also present a brief assessment of cryptographic performance on small devices.
(Show Context)

Citation Context

...couple of years that research into privacy protection for ubiquitous computing has really taken off. Though work in this area is still very much in its infancy, the variety of existing research [2][3]=-=[4]-=- shows that privacy is not a simple issue that can easily be addressed. Privacy issues surround all aspects of ubiquitous computing and must be taken into account throughout the design. This paper wil...

A Privacy Preference Model for Pervasive Computing

by Karim Adam, Blaine Price, Mike Richards, Bashar Nuseibeh
"... Abstract: Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract: Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes found around the World and suggest that these have directly influenced the uptake of existing private-sector mobile services. Citizen uptake of e-government services will be encouraged by strong regulatory regimes dedicated to the protection of personal data. Consumers will entrust personal data where they can exert some measure of control over the release of that data to other parties. We examine a number of such controlling mechanisms and suggest a new privacy architecture intended for mobile service provision.

Ubiquitous Computing, Customer Tracking, and Price Discrimination

by Alessandro Acquisti , 2005
"... The availability and cost-efficiency of modern information and communication technology have made “interactive marketing ” and individual customer addressability not only possible but economical. In 1991, Blattberg and Deighton Blattberg and Deighton [1991] defined the new frontiers for marketing op ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The availability and cost-efficiency of modern information and communication technology have made “interactive marketing ” and individual customer addressability not only possible but economical. In 1991, Blattberg and Deighton Blattberg and Deighton [1991] defined the new frontiers for marketing opened by

A Payment & Receipt Business Model in U-Commerce Environment Jeong-In Ju

by Jun Kyoung , Kyung Lee , Hee , Kyung Hee , Jeong Mu Jeong
"... ABSTRACT The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a consumer device and peer-based information transactions. We also propose a new business mod ..."
Abstract - Add to MetaCart
ABSTRACT The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a consumer device and peer-based information transactions. We also propose a new business model through digital receipt which is evidence of commercial decision making and transaction. We propose U-PR (Ubiquitous Payment and Receipt) business model and method as a way to make transactions seamless, secure and privacy protected.

Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects

by Shin'ichi Konomi , Chang S Nam , 2009
"... RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in ever ..."
Abstract - Add to MetaCart
RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in everyday environments, there is a heightening tension in the design and shaping of social boundaries in the digitally enhanced real world. Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. We discuss awareness issues and cognitive costs in regulating RFID-triggered information flows and propose a framework for privacy-observant RFID applications. The proposed framework supports users' in situ privacy boundary control by allowing users to (1) see how their information is socially disclosed and viewed by others, (2) dynamically negotiate their privacy boundaries, and (3) automate certain information disclosure processes.
(Show Context)

Citation Context

...Techniques to ensure anonymity, based on k-anonymity [38, 39] and l-diversity [40], are highly relevant because: even when disclosed RFID data does not explicitly contain personally identifiable information, the system could identify individuals by linking the data to other data or by looking at unique characteristics found in the data [38]. Some recent works extended and integrated kanonymity into systems that handle RFID data [41] as well as moving objects [42]. One of the recurring themes in ubicomp privacy research is the tradeoffs between rewards and privacy risks. For instance, Acquisti [43] analyzes economic incentives of privacy preserving technologies and argues that individuals might be acting myopically when it comes to protecting their privacy. Hong and Landay [44] discuss information asymmetry among individuals involved in the exchange of private information makes it difficult to make informed decisions and assess privacy risks. Hong et al. [45] provide in-depth analysis of privacy risks in ubiquitous computing. Floerkemeier et al. [46] enhanced low-level RFID protocols in order to support fair information practices, a key notion that influenced privacy policies worldwide....

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University