Author: Helen Nissenbaum
Publisher: Stanford University Press
Release Date: 2009-11-24
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Author: Marc Langheinrich
Publisher: Morgan & Claypool Publishers
Release Date: 2018-12-03
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes "privacy" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
Author: Claudio Bettini
Publisher: Springer Science & Business Media
Release Date: 2009-07-30
Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain. This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services. The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.
Author: National Research Council
Publisher: National Academies Press
Release Date: 2007-07-28
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
Author: Sabrina de Capitani di Vimercati
Publisher: Springer Science & Business Media
Release Date: 2003-04-30
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
Author: Raymond Wacks
Publisher: OUP Oxford
Release Date: 2015-03-26
Genre: Political Science
Some would argue that scarcely a day passes without a new assault on our privacy. In the wake of the whistle-blower Edward Snowden's revelations about the extent of surveillance conducted by the security services in the United States, Britain, and elsewhere, concerns about individual privacy have significantly increased. The Internet generates risks, unimagined even twenty years ago, to the security and integrity of information in all its forms. The manner in which information is collected, stored, exchanged, and used has changed forever; and with it, the character of the threats to individual privacy. The scale of accessible private data generated by the phenomenal growth of blogs, social media, and other contrivances of our information age pose disturbing threats to our privacy. And the hunger for gossip continues to fuel sensationalist media that frequently degrade the notion of a private domain to which we reasonably lay claim. In the new edition of this Very Short Introduction, Raymond Wacks looks at all aspects of privacy to include numerous recent changes, and considers how this fundamental value might be reconciled with competing interests such as security and freedom of expression. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.
Author: Jadwiga Indulska
Publisher: Springer Science & Business Media
Release Date: 2007-06-29
A fascinating bird’s eye view on a hugely relevant topic. This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing held in Hong Kong, China in 2007, co-located with ATC 2007, the 4th International Conference on Autonomic and Trusted Computing. The 119 revised full papers presented together with 1 keynote paper and 1 invited paper were carefully reviewed and selected from 463 submissions. The papers are organized in topical sections.
Author: Anita Allen
Publisher: Oxford University Press
Release Date: 2011-10-17
Can the government stick us with privacy we don't want? It can, it does, and according to Anita L. Allen, it may need to do more of it. Privacy is a foundational good, Allen argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate privacy protections for its people, whether they eagerly embrace them or not. This unique book draws attention to privacies of seclusion, concealment, confidentiality and data-protection undervalued by their intended beneficiaries and targets--and outlines the best reasons for imposing them. Allen looks at laws designed to keep website operators from collecting personal information, laws that force strippers to wear thongs, and the myriad employee and professional confidentiality rules--including insider trading laws--that require strict silence about matters whose disclosure could earn us small fortunes. She shows that such laws recognize the extraordinary importance of dignity, trust and reputation, helping to preserve social, economic and political options throughout a lifetime.
Author: Gavriel Salvendy
Publisher: Springer Science & Business Media
Release Date: 2009-07-15
The 13th International Conference on Human–Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19–24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human–Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human-Centered Design. A total of 4,348 individuals from academia, research institutes, industry and gove- mental agencies from 73 countries submitted contributions, and 1,425 papers that were judged to be of high scientific quality were included in the program. These papers - dress the latest research and development efforts and highlight the human aspects of the design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human–computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
Author: Geir M. Koien
Publisher: River Publishers
Release Date: 2013-07-01
Genre: Technology & Engineering
The modern society is rapidly becoming a fully digital society. This has many benefits, but unfortunately it also means that personal privacy is threatened. The threat does not so much come from a 1984 style Big Brother, but rather from a set of smaller big brothers. The small big brothers are companies that we interact with; they are public services and institutions. Many of these little big brothers are indeed also being invited to our private data by ourselves. Privacy as a subject can be problematic. At the extreme it is personal freedom against safety and security. We shall not take a political stand on personal privacy and what level of personal freedom and privacy is the correct one. Aspects of Personal Privacy in Communications is mostly about understanding what privacy is and some of the technologies may help us to regain a bit of privacy. We discuss what privacy is about, what the different aspects of privacy may be and why privacy needs to be there by default. There are boundaries between personal privacy and societal requirements, and inevitably society will set limits to our privacy (Lawful Interception, etc.). There are technologies that are specifically designed to help us regain some digital privacy. These are commonly known as Privacy Enhancing Technologies (PETs). We investigate some these PETs including MIX networks, Onion Routing and various privacy-preserving methods. Other aspects include identity and location privacy in cellular systems, privacy in RFID, Internet-of-Things (IoT) and sensor networks amongst others. Some aspects of cloud systems are also covered. Content: Getting a Grip on Privacy The Legal Context of Privacy Anonymous Communications Secure Multi-party Computations and Privacy Privacy and Data Mining in Telecommunications Requirements for Cellular System Subscriber Privacy The 3GPP Systems and Subscriber Privacy Future Cellular Systems and Enhanced Subscriber Privacy Sensor Networks Radio Frequency Identification Privacy and Trust for the Internet-of-Things Privacy in the Cloud Summary and Concluding Remarks