Seven privacy worries in ubiquitous social computing
Citation: Sara Motahari, Constantine Manikopoulos, Roxanne Hiltz, Quentin Jones Seven privacy worries in ubiquitous social computing. Proceedings of the 3rd symposium on Usable privacy and security (RSS)
DOI (original publisher): 10.1145/1280680.1280713
Semantic Scholar (metadata): 10.1145/1280680.1280713
Sci-Hub (fulltext): 10.1145/1280680.1280713
Internet Archive Scholar (search for fulltext): Seven privacy worries in ubiquitous social computing
Tagged: Computer Science
(RSS) privacy (RSS), ubicomp (RSS), mobile (RSS), social computing (RSS)
Summary
Social inferencing based on location is more likely in ubicomp. This short paper identifies 7 threats to user privacy in "ubiquitous social computing", defined as systems combining "on-line social interactions with context-aware computing". Privacy worries are based in part on previous studies, such as Privacy by design: Principles of privacy-aware ubiquitous systems. The threats:
- Inappropriate use by administrators
- Revealing personal data to meet legal obligations
- Inadequate security
- Designed invasion - revealing information without informing the user or giving them control
- Social inference through lack of entropy (i.e. can narrow number of possible users due to location, and isolate them with additional info)
- Social inference through persistent user observation
- Social leveraging of privileged data