語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy in mobile and pervasive comp...
~
Langheinrich, Marc,
Privacy in mobile and pervasive computing /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
005.8
書名/作者:
Privacy in mobile and pervasive computing // Marc Langheinrich, Florian Schaub.
作者:
Langheinrich, Marc,
其他作者:
Schaub, Florian,
出版者:
[San Rafael, California] : : Morgan & Claypool,, 2019.
面頁冊數:
1 PDF (xi, 127 pages) : : illustrations.
附註:
Part of: Synthesis digital library of engineering and computer science.
標題:
Mobile computing - Security measures.
標題:
Ubiquitous computing - Security measures.
ISBN:
9781681731186
書目註:
Includes bibliographical references (pages 95-125).
內容註:
1. Introduction -- 1.1 Lecture goals and overview -- 1.2 Who should read this --
摘要、提要註:
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly--making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of--and ability to enjoy--privacy, but also look at what constitutes "privacy" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
電子資源:
https://ieeexplore.ieee.org/servlet/opac?bknumber=8563170
Privacy in mobile and pervasive computing /
Langheinrich, Marc,
Privacy in mobile and pervasive computing /
Marc Langheinrich, Florian Schaub. - [San Rafael, California] :Morgan & Claypool,2019. - 1 PDF (xi, 127 pages) :illustrations. - Synthesis lectures on mobile and pervasive computing,# 131933-902X ;. - Synthesis digital library of engineering and computer science..
Part of: Synthesis digital library of engineering and computer science.
Includes bibliographical references (pages 95-125).
1. Introduction -- 1.1 Lecture goals and overview -- 1.2 Who should read this --
Abstract freely available; full-text restricted to subscribers or individual document purchasers.
Compendex
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly--making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of--and ability to enjoy--privacy, but also look at what constitutes "privacy" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
Mode of access: World Wide Web.
ISBN: 9781681731186
Standard No.: 10.2200/S00882ED1V01Y201810MPC013doiSubjects--Topical Terms:
405108
Mobile computing
--Security measures.Subjects--Index Terms:
mobile computing
LC Class. No.: QA76.9.A25 / L256 2019
Dewey Class. No.: 005.8
Privacy in mobile and pervasive computing /
LDR
:06311nmm 2200661 i 4500
001
509505
003
IEEE
005
20190104105147.0
006
m eo d
007
cr cn |||m|||a
008
210524s2019 caua foab 000 0 eng d
020
$a
9781681731186
$q
ebook
020
$z
9781681734583
$q
hardcover
020
$z
9781681734712
$q
epub
020
$z
9781681731179
$q
paperback
024
7
$a
10.2200/S00882ED1V01Y201810MPC013
$2
doi
035
$a
(CaBNVSL)swl000408881
035
$a
(OCoLC)1080937191
035
$a
8563170
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.9.A25
$b
L256 2019
082
0 4
$a
005.8
$2
23
100
1
$a
Langheinrich, Marc,
$e
author.
$3
729024
245
1 0
$a
Privacy in mobile and pervasive computing /
$c
Marc Langheinrich, Florian Schaub.
260
1
$a
[San Rafael, California] :
$b
Morgan & Claypool,
$c
2019.
264
1
$a
[San Rafael, California] :
$b
Morgan & Claypool,
$c
2019.
300
$a
1 PDF (xi, 127 pages) :
$b
illustrations.
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
490
1
$a
Synthesis lectures on mobile and pervasive computing,
$x
1933-902X ;
$v
# 13
500
$a
Part of: Synthesis digital library of engineering and computer science.
504
$a
Includes bibliographical references (pages 95-125).
505
0
$a
1. Introduction -- 1.1 Lecture goals and overview -- 1.2 Who should read this --
505
8
$a
2. Understanding privacy -- 2.1 Codifying privacy -- 2.1.1 Historical roots -- 2.1.2 Privacy law and regulations -- 2.2 Motivating privacy -- 2.2.1 Privacy benefits -- 2.2.2 Limits of privacy -- 2.3 Conceptualizing privacy -- 2.3.1 Privacy types -- 2.3.2 Privacy constituents -- 2.3.3 Privacy expectations -- 2.3.4 A privacy taxonomy -- 2.4 Summary --
505
8
$a
3. Mobile and pervasive computing -- 3.1 Mobile computing characteristics -- 3.1.1 Novel form factors-mobility and diversity -- 3.1.2 Power in your pocket-computation and communication -- 3.1.3 Data recording-sensing and context-awareness -- 3.1.4 Software ecosystems, the device as a platform -- 3.2 Pervasive and ubiquitous computing characteristics -- 3.2.1 Embeddedness-invisible computing -- 3.2.2 Implicit interaction-understanding user intent -- 3.2.3 Ubiquity, from social to societal scale -- 3.3 Summary --
505
8
$a
4. Privacy implications of mobile and pervasive computing -- 4.1 Data shadows, the digitization of daily life -- 4.1.1 Technological development -- 4.1.2 Privacy implications -- 4.2 From atoms to bits-automated real-world data capture -- 4.2.1 Technological development -- 4.2.2 Privacy implications -- 4.3 Profiling-predicting behavior -- 4.3.1 Technological development -- 4.3.2 Privacy implications -- 4.4 Summary --
505
8
$a
5. Supporting privacy in mobile and pervasive computing -- 5.1 Privacy-friendly by default -- 5.2 Privacy risk communication -- 5.3 Privacy management assistance -- 5.4 Context-adaptive privacy mechanisms -- 5.5 User-centric privacy controls -- 5.6 Algorithmic accountability -- 5.7 Privacy engineering -- 5.8 Summary --
505
8
$a
6. Conclusions -- Bibliography -- Authors' biographies.
506
$a
Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510
0
$a
Compendex
510
0
$a
INSPEC
510
0
$a
Google scholar
510
0
$a
Google book search
520
3
$a
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly--making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of--and ability to enjoy--privacy, but also look at what constitutes "privacy" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
538
$a
System requirements: Adobe Acrobat Reader.
588
$a
Title from PDF title page (viewed on January 3, 2019).
650
0
$a
Mobile computing
$x
Security measures.
$3
405108
650
0
$a
Ubiquitous computing
$x
Security measures.
$3
549668
653
$a
mobile computing
653
$a
pervasive computing
653
$a
ubiquitous computing
653
$a
Internet of Things
653
$a
privacy
653
$a
security
653
$a
privacy-enhancing technology
653
$a
privacy behavior
653
$a
privacy engineering
700
1
$a
Schaub, Florian,
$e
author.
$3
729025
776
0 8
$i
Print version:
$z
9781681731179
$z
9781681734583
830
0
$a
Synthesis digital library of engineering and computer science.
$3
461208
830
0
$a
Synthesis lectures on mobile and pervasive computing ;
$v
#10.
$3
492722
856
4 2
$3
Abstract with links to resource
$u
https://ieeexplore.ieee.org/servlet/opac?bknumber=8563170
筆 0 讀者評論
多媒體
多媒體檔案
https://ieeexplore.ieee.org/servlet/opac?bknumber=8563170
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入