Trust and Privacy Permissions for an Ambient World

Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed.

[1]  Tharam S. Dillon,et al.  The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.

[2]  Kenton O'Hara,et al.  Dealing with mobility: understanding access anytime, anywhere , 2001, TCHI.

[3]  Andrew Brien,et al.  Professional Ethics and The Culture of Trust , 1998 .

[4]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[5]  F. Fukuyama Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .

[6]  Y. Chan,et al.  Privacy in the Family: Its Hierarchical and Asymmetric Nature , 2000 .

[7]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[8]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[9]  Matthew K. O. Lee,et al.  EC-Trust (Trust in Electronic Commerce): Exploring the Antecedent Factors , 1999 .

[10]  Frank Biocca,et al.  Internet attitudes and Internet use: some surprising findings from the HomeNetToo project , 2003, Int. J. Hum. Comput. Stud..

[11]  M. Dibben Exploring Interpersonal Trust in the Entrepreneurial Venture , 2000 .

[12]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[13]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[14]  S. Bok,et al.  Lying: Moral Choice in Public and Private Life , 1979 .

[15]  Darhl M. Pedersen,et al.  MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .

[16]  Jonathan Grudin,et al.  A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.

[17]  Stephen Marsh,et al.  The role of trust in information science and technology , 2005, Annu. Rev. Inf. Sci. Technol..

[18]  Craig M. Arndt The loss of privacy and identity , 2005 .

[19]  Justine Cassell,et al.  Relational agents: a model and implementation of building user trust , 2001, CHI.

[20]  Joseph Luft,et al.  Of human interaction , 1969 .

[21]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[22]  H. Kelley,et al.  The social psychology of groups , 1960 .

[23]  Leonard M. Jessup,et al.  The relevance of social issues in ubiquitous computing environments , 2002, CACM.

[24]  D. Good,et al.  Individuals, Interpersonal Relations, and Trust , 2000 .

[25]  D. M. Pedersen Dimensions of Privacy , 1979 .

[26]  Rino Falcone,et al.  The Socio-cognitive Dynamics of Trust: Does Trust Create Trust? , 2000, Trust in Cyber-societies.

[27]  Alfarez Abdul-Rahman,et al.  A framework for decentralised trust reasoning , 2005 .

[28]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[29]  Marco De Boni,et al.  Cultural aspects of internet privacy , 2002 .

[30]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[31]  Fn Florian Egger FROM INTERACTIONS TO TRANSACTIONS: Designing the Trust Experience for Business-to-Consumer Electronic Commerce , 2003 .

[32]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[33]  S. Boon,et al.  The dynamics of interpersonal trust: resolving uncertainty in the ace of risk , 1991 .

[34]  R. Nisbett,et al.  The cultural matrix of social psychology , 1998 .

[35]  R. Ahas,et al.  Location based services—new challenges for planning and public administration? , 2005 .

[36]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[37]  Samuel D. Warren,et al.  Philosophical Dimensions of Privacy: The right to privacy [the implicit made explicit] , 1984 .

[38]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .

[39]  Elizabeth Sillence,et al.  Trust and mistrust of online health sites , 2004, CHI.

[40]  Privacy of Communication , 1970 .

[41]  Mark Weiser The computer for the 21st century , 1991 .

[42]  Diego Gambetta Can We Trust Trust , 2000 .

[43]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[44]  P. Sztompka Trust: A Sociological Theory , 2000 .

[45]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[46]  D. Brin The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .

[47]  Lea Viljanen,et al.  Towards an Ontology of Trust , 2005, TrustBus.

[48]  Yves Punie,et al.  A social and technological view of Ambient Intelligence in Everyday Life : What bends the trend ? Key Deliverable The European Media and Technology in Everyday Life Network , 2000-2003 , 2003 .

[49]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .

[50]  Shailey Minocha,et al.  Social and Cultural Obstacles to the (B2C) E-Commerce Experience , 2004 .

[51]  Keng Siau,et al.  Building customer trust in mobile commerce , 2003, CACM.

[52]  Thomas Rist,et al.  Lost in ambient intelligence? , 2004, CHI EA '04.

[53]  Khai N. Truong,et al.  PHEmail: designing a privacy honoring email system , 2003, CHI Extended Abstracts.

[54]  Naz Kaya,et al.  Cross-cultural differences in the perception of crowding and privacy regulation : American and Turkish students , 2003 .

[55]  I. Altman,et al.  Culture and Environment , 1984 .

[56]  Batya Friedman,et al.  Trust online , 2000, CACM.

[57]  Michael Rohs,et al.  Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.

[58]  Florian N. Egger,et al.  "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.

[59]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[60]  Costas Lambrinoudakis,et al.  Protecting privacy and anonymity in pervasive computing: trends and perspectives , 2006, Telematics Informatics.

[61]  V. Sugumaran The Inaugural Issue of the International Journal of Intelligent Information Technologies , 2005 .

[62]  Norbert A. Streitz,et al.  The Disappearing Computer, Interaction Design, System Infrastructures and Applications for Smart Environments , 2007, The Disappearing Computer.

[63]  Victoria Y. Yoon,et al.  Using Ontological Reasoning for an Adaptive E-Commerce Experience , 2009, Int. J. Intell. Inf. Technol..

[64]  N. Luhmann Trust and Power , 1979 .

[65]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[66]  Linda Little,et al.  Public space systems: Designing for privacy? , 2005, Int. J. Hum. Comput. Stud..

[67]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .