Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems

This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.

[1]  J. Michael,et al.  Privacy and human rights , 1994 .

[2]  Andreas Pfitzmann,et al.  Datenschutz Next Generation , 2000 .

[3]  J. Rubenfeld The Right of Privacy , 1989 .

[4]  Elizabeth D. Mynatt,et al.  Designing audio aura , 1998, CHI.

[5]  D MynattElizabeth,et al.  Charting past, present, and future research in ubiquitous computing , 2000 .

[6]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[7]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[8]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[9]  David Brin,et al.  The Transparent Society , 1998 .

[10]  Gaetano Borriello,et al.  Next century challenges: data-centric networking for invisible computing: the Portolano project at the University of Washington , 1999, MobiCom.

[11]  James Michael Privacy and human rights : an international and comparative study, with special reference to developments in information technology , 1994 .

[12]  Mark Cenite Code and Other Laws of Cyberspace , 2000 .

[13]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[14]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[15]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[16]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[17]  Robert Gellman,et al.  Does privacy law work , 1997 .

[18]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[19]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[20]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[21]  Harold C. Releya Technology and privacy: The new landscape , 1998 .

[22]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[23]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[24]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.