Advertisement

Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective

  • Patricia C. de SouzaEmail author
  • Cristiano Maciel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9190)

Abstract

Guaranteeing privacy in digital systems is an effort that moves several computing areas such as computer security, cryptography, computer networks, safe protocols, system design and human-computer interaction. One of the hypotheses in our work is that many users of mobile applications are not aware of the risks they run of their data being accessed by intruders, mainly because they do not know what they are exposed to and then, because the terms used in access policies are difficult to understand, too long for a dynamic reading and offer little or no flexibility to allow users to make adjustments according to their preferences. Improving users’ experience means verifying if the implementation of new ways of interaction that provide freedom and flexibility in the control of privacy settings as well as access policies for mobile applications has allowed for higher levels of security and reliability on the users’ side.

Keywords

Privacy User experience Legal aspects Ubiquitous systems 

References

  1. 1.
    Nosko, A., Wood, E., Molema, S.: All about me: Disclosure in online social networking profiles: the case of FACEBOOK. Comput. Hum. Behav. 26, 406–418 (2010)CrossRefGoogle Scholar
  2. 2.
    Fogel, J., Nehmad, E.: Internet social network communities: risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25, 153–160 (2009)CrossRefGoogle Scholar
  3. 3.
    Shin, D.: The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22, 428–438 (2010)CrossRefGoogle Scholar
  4. 4.
    Borges, G., Ribeiro, T., Maciel, C., Souza, P.C.: Who is this guy who liked my picture? privacy control mechanisms on Facebook for Generations X and Y. In: 15th International Conference on Enterprise Information Systems (ICEIS 2013), France, pp. 179–186 (2013)Google Scholar
  5. 5.
    Dritsas, S., Tsaparas, J., Gritzalis, D.: A generic privacy enhancing technology for pervasive computing environments. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol. 4083, pp. 103–113. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J.-P., Aad, I.: Privacy in mobile computing for location-sharing-based services. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 77–96. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  7. 7.
    Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107–124. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    O’Hara, K.: Are we getting privacy the wrong way round?. In: Internet Computing, IEEE, vol.17, no. 4, pp. 89–92, July–August 2013Google Scholar
  9. 9.
    Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012). ACM, NY, USA (2012)Google Scholar
  10. 10.
    Luger, E., Rodden, T.: Terms of agreement: rethinking consent for pervasive computing. Interact. Comput. 25(3), 229–241 (2013)CrossRefGoogle Scholar
  11. 11.
    Lei N° 12.965: Marco Civil da Internet (2014). http://www.planalto.gov.br/ccivil_03/_ato2011-2014/2014/lei/l12965.htm
  12. 12.
    ONU: Declaração Universal dos Direitos Humanos. http://portal.mj.gov.br/sedh/ct/legis_intern/ddh_bib_inter_universal.htm
  13. 13.
    Vianna, T.L.: Transparência pública, opacidade privada: o Direito como instrumento de limitação do poder na sociedade de controle. Tese de doutorado, Universidade Federal do Paraná (2006). http://www.midiaindependente.org/media/2008/05/419863.pdf
  14. 14.
    Kizza, J.M.: Ethical and Social Issues in the Information Age, 5th edn. Springer, New York (2013)CrossRefGoogle Scholar
  15. 15.
    Houaiss, A.: Dicionário Eletrônico Houaiss da Língua Portuguesa. Objetiva, São Paulo (2012)Google Scholar
  16. 16.
    Sibila, P.: La intimidad como espectáculo, 1st edn. Fondo de Cultura Económica, Buenos Aires (2008). http://cmap.javeriana.edu.co/servlet/SBReadResourceServlet?rid=1J2SK927M-22DBXQG-1TB Google Scholar
  17. 17.
    Jennings, C., Fena, L.: Priv@cidade.com – Como preservar sua intimidade na era da internet. Futura, São Paulo, SP (2000)Google Scholar
  18. 18.
    Maciel, C., Souza, P.C., Viterbo, J., Mendes, F.F., Seghrouchni, A.E.F.: A multi-agent architecture to support ubiquitous aplications in smart environments. In: Fifth International Workshop on Collaborative Agents - Research & Development (CARE) - 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2014), Paris-France (2014)Google Scholar
  19. 19.
    Constituição da República Federativa do Brasil (1998). http://www.planalto.gov.br/ccivil_03/constituicao/constituicao.htm
  20. 20.
    Baranauskas, C., Souza, C.S., Pereira, R. (Orgs.): I GranDIHC-BR - Grandes Desafios de Pesquisa em Interação Humano-Computador no Brasil. Relatório Técnico. Comissão Especial de Interação Humano-Computador (CEIHC) da SBC (2014)Google Scholar
  21. 21.
    Maciel, C., Pereira, V., Hornung, H., Piccolo, L.G.S., Prates, R.O.: Valores humanos. In: Baranauskas, Souza and Pereira (orgs.) I GranDIHC-BR — Grandes Desafios de Pesquisa em Interação Humano-Computador no Brasil. Relatório Técnico. Comissão Especial de Interação Humano Computador (CEIHC) da SBC, pp. 27–30 (2014)Google Scholar
  22. 22.
    Fiorela, S.: The Insidiousness of Facebook Messenger’s Android Mobile App Permissions (2013). http://www.huffingtonpost.com/sam-fiorella/the-insidiousness-offace_b_4365645.html
  23. 23.
    Blandford, A., Attfield, S.: Interacting with information. Synth. Lect. Hum.-Centered Inf., Morgan & Claypool 3, 1–99 (2010)CrossRefGoogle Scholar
  24. 24.
    UNHCFREG: Viber security vulnerabilities: do not use Viber until these issues are resolved (2014). http://www.unhcfreg.com/#!Viber-Security-Vulnerabilities-Do-not-use-Viber-until-these-issues-are-resolved/c5rt/BB4208CF-7F0A-4DE1-92A4-529425549683

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Laboratório de Ambientes Virtuais de Aprendizagem, Instituto de ComputaçãoUniversidade Federal de Mato GrossoCuiabáBrazil

Personalised recommendations