Читать книгу Privacy in Mobile and Pervasive Computing - Florian Schaub - Страница 7
ОглавлениеContents
1.1 Lecture Goals and Overview
2.1.2 Privacy Law and Regulations
2.2.2 Limits of Privacy
2.3 Conceptualizing Privacy
2.3.1 Privacy Types
2.3.2 Privacy Constituents
2.3.3 Privacy Expectations
2.3.4 A Privacy Taxonomy
2.4 Summary
3 Mobile and Pervasive Computing
3.1 Mobile Computing Characteristics
3.1.1 Novel Form Factors–Mobility and Diversity
3.1.2 Power in Your Pocket–Computation and Communication
3.1.3 Data Recording–Sensing and Context-Awareness
3.1.4 Software Ecosystems–The Device as a Platform
3.2 Pervasive and Ubiquitous Computing Characteristics
3.2.1 Embeddedness–Invisible Computing
3.2.2 Implicit Interaction–Understanding User Intent
3.2.3 Ubiquity–From Social to Societal Scale
3.3 Summary
4 Privacy Implications of Mobile and Pervasive Computing
4.1 Data Shadows–The Digitization of Daily Life
4.1.1 Technological Development
4.1.2 Privacy Implications
4.2 From Atoms to Bits–Automated Real-world Data Capture
4.2.1 Technological Development
4.2.2 Privacy Implications
4.3 Profiling–Predicting Behavior
4.3.1 Technological Development
4.3.2 Privacy Implications
4.4 Summary
5 Supporting Privacy in Mobile and Pervasive Computing
5.1 Privacy-Friendly by Default
5.2 Privacy Risk Communication
5.3 Privacy Management Assistance
5.4 Context-Adaptive Privacy Mechanisms
5.5 User-Centric Privacy Controls
5.6 Algorithmic Accountability
5.7 Privacy Engineering
5.8 Summary