Seven privacy worries in ubiquitous social computing

From AcaWiki
Jump to: navigation, search

Citation: Sara Motahari, Constantine Manikopoulos, Roxanne Hiltz, Quentin Jones Seven privacy worries in ubiquitous social computing. Proceedings of the 3rd symposium on Usable privacy and security (RSS)
DOI (original publisher): 10.1145/1280680.1280713
Semantic Scholar (metadata): 10.1145/1280680.1280713
Sci-Hub (fulltext): 10.1145/1280680.1280713
Internet Archive Scholar (search for fulltext): Seven privacy worries in ubiquitous social computing
Tagged: Computer Science (RSS) privacy (RSS), ubicomp (RSS), mobile (RSS), social computing (RSS)

Summary

Social inferencing based on location is more likely in ubicomp. This short paper identifies 7 threats to user privacy in "ubiquitous social computing", defined as systems combining "on-line social interactions with context-aware computing". Privacy worries are based in part on previous studies, such as Privacy by design: Principles of privacy-aware ubiquitous systems. The threats:

  1. Inappropriate use by administrators
  2. Revealing personal data to meet legal obligations
  3. Inadequate security
  4. Designed invasion - revealing information without informing the user or giving them control
  5. Social inference through lack of entropy (i.e. can narrow number of possible users due to location, and isolate them with additional info)
  6. Social inference through persistent user observation
  7. Social leveraging of privileged data