Tag Archives: privacy

Unobtrusive physiological monitoring in an airplane seat

Abstract Air travel has become the preferred mode of long-distance transportation for most of the world’s travelers. People of every age group and health status are traveling by airplane and thus the airplane has become part of our environment, in which people with health-related limitations need assistive support. Since the main interaction point between a passenger [...]

Survey on Contemporary Remote Surveillance Systems for Public Safety

Abstract This paper reviews concisely the historical development and current state of the three different generations of contemporary surveillance systems. Recently, in addition to the employment of the incessantly enlarging variety of sensors, the inclination has been to utilize more intelligence and situation awareness capabilities to assist the human surveillance personnel. The most recent generation [...]

Privacy-Aware Object Representation for Surveillance Systems

Abstract Real-time object tracking, feature assessment and classification based on video are enabling technologies for improving situation awareness of human operators as well as for automated recognition of critical situations. To bridge the gap between video signal-processing output and spatio-temporal analysis of object behavior at the semantic level, a generic and sensor-independent object representation is [...]

Internet and Surveillance – The Challenges of Web 2.0 and Social Media

Abstract This book  is dedicated to Internet surveillance in the age of what has come to be termed “social media” or “web 2.0″ (blogs, wikis, file sharing, social networking sites, microblogs, user-generated content sites, etc). The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium [...]

Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks

Abstract With the development of technology, wireless sensor networks (WSNs) performing sensing and communication tasks will be widely deployed in the near future because they greatly extend our ability to monitor and control the physical environment and improve the accuracy of information gathering. Since the sensors are usually deployed in hostile environments and cannot get [...]

Lend me your arms: The use and implications of humancentric RFID

Abstract Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. By employing [...]

Territorial Privacy in Ubiquitous Computing

Abstract Smartphones define a trend towards increasing combination and integration of sensing capabilities with almost ubiquitous inter-connectivity. Resulting location-based services and context-aware applications will benefit users by adapting better to the user application needs. However, there is a lack of effective means for controlling privacy in such systems which will likely increase further with future [...]

Life2Guard: A Physical Disorder Detection in Private Rooms

Abstract We present a research result of our project named Life2Guard. The project aims at detecting a person facing a sudden physical disorder in private rooms such as restrooms. In this paper, firstly we specify the required functions for the system to detect physical disorders in private rooms, which are privacy-aware sensing, high availability, quick [...]

PROACT: An ontology-based model of privacy policies in Ambient Intelligence Environments

Abstract Future computing environments involve integrating everyday objects equipped with tiny processors, sensors and wireless network cards. These smart objects (artifacts) may explore their environment and communicate with each other. Interactivity with humans may provide the ability of dealing with tasks in an intuitive way. In order to model the way everyday activities are carried [...]

Location Sensing and Privacy in a Context-Aware Computing Environment

Abstract This article presents and evaluates the performance of a location sensing algorithm developed and demonstrated at Carnegie Mellon University. We compare our model with various others based on different architectures and software paradigms. We show comparative results in accuracy, the complexity of training, total power consumption, and suitability to users. Our method reduces training [...]

Differentially-Private Network Trace Analysis

Abstract We consider the potential for network trace analysis while providing the guarantees of “differential privacy.” While differential privacy provably obscures the presence or absence of individual records in a dataset, it has two major limitations: analyses must (presently) be expressed in a higher level declarative language; and the analysis results are randomized before returning [...]

Issues in the Development of Location Privacy Theory

Abstract Issues in the development of location privacy theory are identified and organized based on both technological considerations and more general privacy theories. Three broad categories containing six issues are described: location (including sensing methods and location properties), privacy (including definition and subject identification), and information flows (from location information acquisition through storage, use, and [...]

Protecting Consumer Privacy in an Era of Rapid Change

Abstract In today’s digital economy, consumer information is more important than ever. Companies are using this information in innovative ways to provide consumers with new and better products and services.  Although many of these companies manage consumer information responsibly, some appear to treat it in an irresponsible or even reckless manner.  And while recent announcements [...]

Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence

Abstract This paper identifies the unprecedented challenges that the prospects of an ‘ambient intelligence’ era (involving the development of the ‘internet of things’, with widespread dissemination of RFID’s, ubiquitous computing,’smart’ objects and surveillance devices) raise from the points of view of ‘privacy’ and data protection. Privacy and data protection are identified, in line with Agre’s [...]

ROAD: an RFID Offline Authentication, privacy preserving protocol with Dos resilience

Abstract As RFID applications become widespread, different authentication schemes have been proposed to address the security and privacy issues in RFID systems. Most recent protocols have employed a “central server” model. This kind of authentication is vulnerable to Dos attack. In this paper, we present an RFID Offline Authentication protocol with Dos resilience, ROAD, which [...]

A Framework Ensuring Privacy in a Distributed Environment

Abstract In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Individuals lose track of their personal data and have no control over databases and information systems containing their personal data. In the field of distributed systems, resarchers focus mainly on how to integrate a variety of systems in [...]

Privacy-Preserving Data Mining

Abstract A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Specifically, we address the following question. Since the primary task in data mining is the development of models about aggregated data, can we develop accurate models without access to precise information in individual data records? We [...]

Privacy and Publicity in the Context of Big Data

Abstract Unless you’ve been hiding under a rock, you’ve witnessed all sorts of grumblings about privacy issues in relation to social media. Sometimes, this comes in the form of complete panic. “OMG, kids these days! What are they putting up online!?!?” At other times, we hear this issue emerge in relation to security issues: data [...]

Big Brother’s Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement

Abstract Traditionally, law enforcement officers obtained information by speaking with suspects’ neighbors, employers, or friends. They would analyze paper arrest records and crime reports. In order to obtain personal information stored in private databases, they would have to call a variety of different vendors. The shift to a digital environment has brought many changes to [...]