Home Page Icon
Home Page
Table of Contents for
Privacy in Mobile and Pervasive Computing
Close
Privacy in Mobile and Pervasive Computing
by Mahadev Satyanarayanan, Florian Schaub, Marc Langheinrich
Privacy in Mobile and Pervasive Computing
Cover
Copyright
Title Page
Contents
Preface
Acknowledgments
1 Introduction
1.1 Lecture Goals and Overview
1.2 Who Should Read This
2 Understanding Privacy
2.1 Codifying Privacy
2.1.1 Historical Roots
2.1.2 Privacy Law and Regulations
2.2 Motivating Privacy
2.2.1 Privacy Benefits
2.2.2 Limits of Privacy
2.3 Conceptualizing Privacy
2.3.1 Privacy Types
2.3.2 Privacy Constituents
2.3.3 Privacy Expectations
2.3.4 A Privacy Taxonomy
2.4 Summary
3 Mobile and Pervasive Computing
3.1 Mobile Computing Characteristics
3.1.1 Novel Form Factors–Mobility and Diversity
3.1.2 Power in Your Pocket–Computation and Communication
3.1.3 Data Recording–Sensing and Context-Awareness
3.1.4 Software Ecosystems–The Device as a Platform
3.2 Pervasive and Ubiquitous Computing Characteristics
3.2.1 Embeddedness–Invisible Computing
3.2.2 Implicit Interaction–Understanding User Intent
3.2.3 Ubiquity–From Social to Societal Scale
3.3 Summary
4 Privacy Implications of Mobile and Pervasive Computing
4.1 Data Shadows–The Digitization of Daily Life
4.1.1 Technological Development
4.1.2 Privacy Implications
4.2 From Atoms to Bits–Automated Real-world Data Capture
4.2.1 Technological Development
4.2.2 Privacy Implications
4.3 Profiling–Predicting Behavior
4.3.1 Technological Development
4.3.2 Privacy Implications
4.4 Summary
5 Supporting Privacy in Mobile and Pervasive Computing
5.1 Privacy-Friendly by Default
5.2 Privacy Risk Communication
5.3 Privacy Management Assistance
5.4 Context-Adaptive Privacy Mechanisms
5.5 User-Centric Privacy Controls
5.6 Algorithmic Accountability
5.7 Privacy Engineering
5.8 Summary
6 Conclusions
Bibliography
Authors’ Biographies
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Privacy in Mobile and Pervasive Computing
Privacy in Mobile and Pervasive Computing
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset