Читать книгу Privacy in Mobile and Pervasive Computing - Florian Schaub - Страница 7

Оглавление

Contents

Preface

Acknowledgments

1 Introduction

1.1 Lecture Goals and Overview

1.2 Who Should Read This

2 Understanding Privacy

2.1 Codifying Privacy

2.1.1 Historical Roots

2.1.2 Privacy Law and Regulations

2.2 Motivating Privacy

2.2.1 Privacy Benefits

2.2.2 Limits of Privacy

2.3 Conceptualizing Privacy

2.3.1 Privacy Types

2.3.2 Privacy Constituents

2.3.3 Privacy Expectations

2.3.4 A Privacy Taxonomy

2.4 Summary

3 Mobile and Pervasive Computing

3.1 Mobile Computing Characteristics

3.1.1 Novel Form Factors–Mobility and Diversity

3.1.2 Power in Your Pocket–Computation and Communication

3.1.3 Data Recording–Sensing and Context-Awareness

3.1.4 Software Ecosystems–The Device as a Platform

3.2 Pervasive and Ubiquitous Computing Characteristics

3.2.1 Embeddedness–Invisible Computing

3.2.2 Implicit Interaction–Understanding User Intent

3.2.3 Ubiquity–From Social to Societal Scale

3.3 Summary

4 Privacy Implications of Mobile and Pervasive Computing

4.1 Data Shadows–The Digitization of Daily Life

4.1.1 Technological Development

4.1.2 Privacy Implications

4.2 From Atoms to Bits–Automated Real-world Data Capture

4.2.1 Technological Development

4.2.2 Privacy Implications

4.3 Profiling–Predicting Behavior

4.3.1 Technological Development

4.3.2 Privacy Implications

4.4 Summary

5 Supporting Privacy in Mobile and Pervasive Computing

5.1 Privacy-Friendly by Default

5.2 Privacy Risk Communication

5.3 Privacy Management Assistance

5.4 Context-Adaptive Privacy Mechanisms

5.5 User-Centric Privacy Controls

5.6 Algorithmic Accountability

5.7 Privacy Engineering

5.8 Summary

6 Conclusions

Bibliography

Authors’ Biographies

Privacy in Mobile and Pervasive Computing

Подняться наверх