Smart Privacy Management in Ubiquitous Computing Environments

  • Christian Bünnig
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5618)


Privacy in ubiquitous computing environments is primarily considered as a problem of protecting personal information from unauthorized access and misuse. Additionally it can also be seen as a process of interpersonal communication where not hiding but selective disclosure of personal information is the central issue, i.e. how users can practice privacy intuitively and dynamically in computerized environments similar to the analog world. In this work we discuss the management of private information concerning interpersonal privacy implications in smart environments. Existing work mostly does not match the intuitive and dynamic aspects of privacy in context of interpersonal communication. As an alternative we suggest an ad hoc approach to privacy management which uses learning techniques for an in situ disclosure assistance and present user interaction models for this disclosure assistance.


  1. 1.
    Bünnig, C.: Learning context based disclosure of private information. In: The Internet of Things & Services - 1st Intl. Research Workshop, Valbonne, France (September 2008)Google Scholar
  2. 2.
    Clauß, S., Pfitzmann, A., Hansen, M.: Privacy-enhancing identity management. The IPTS Report 67, 8–16 (September 2002)Google Scholar
  3. 3.
    Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2), 135–178 (2006)CrossRefGoogle Scholar
  4. 4.
    Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive privacy with identity management. Technical Report 178, Universität Freiburg (October 2002)Google Scholar
  5. 5.
    Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: Five pitfalls for designers. Personal Ubiquitous Computing 8(6), 440–454 (2004)CrossRefGoogle Scholar
  7. 7.
    Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB/CSD-03-1257, University of California, Berkeley (2003)Google Scholar
  8. 8.
    Maibaum, N., Sedov, I., Cap, C.H.: A citizen digital assistant for e-government. In: Traunmüller, R., Lenk, K. (eds.) EGOV 2002. LNCS, vol. 2456, pp. 284–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)CrossRefGoogle Scholar
  10. 10.
    Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI 2003: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)Google Scholar
  11. 11.
    Prabaker, M., Rao, J., Fette, I., Kelley, P., Cranor, L., Hong, J., Sadeh, N.: Understanding and capturing people’s privacy policies in a people finder application. In: UBICOMP 2007: Workshop on UBICOMP Privacy (September 2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christian Bünnig
    • 1
  1. 1.Institute of Computer Science Chair for Information and Communication ServicesUniversity of RostockGermany

Personalised recommendations