1.1 Lecture Goals and Overview
2.1.2 Privacy Law and Regulations
2.2.2 Limits of Privacy
2.3 Conceptualizing Privacy
2.3.1 Privacy Types
2.3.2 Privacy Constituents
2.3.3 Privacy Expectations
2.3.4 A Privacy Taxonomy
2.4 Summary
3 Mobile and Pervasive Computing
3.1 Mobile Computing Characteristics
3.1.1 Novel Form Factors–Mobility and Diversity
3.1.2 Power in Your Pocket–Computation and Communication
3.1.3 Data Recording–Sensing and Context-Awareness
3.1.4 Software Ecosystems–The Device as a Platform
3.2 Pervasive and Ubiquitous Computing Characteristics
3.2.1 Embeddedness–Invisible Computing
3.2.2 Implicit Interaction–Understanding User Intent
3.2.3 Ubiquity–From Social to Societal Scale
3.3 Summary
4 Privacy Implications of Mobile and Pervasive Computing
4.1 Data Shadows–The Digitization of Daily Life
4.1.1 Technological Development
4.1.2 Privacy Implications
4.2 From Atoms to Bits–Automated Real-world Data Capture
4.2.1 Technological Development
4.2.2 Privacy Implications
4.3 Profiling–Predicting Behavior
4.3.1 Technological Development
4.3.2 Privacy Implications
4.4 Summary
5 Supporting Privacy in Mobile and Pervasive Computing
5.1 Privacy-Friendly by Default
5.2 Privacy Risk Communication
5.3 Privacy Management Assistance
5.4 Context-Adaptive Privacy Mechanisms
5.5 User-Centric Privacy Controls
5.6 Algorithmic Accountability
5.7 Privacy Engineering
5.8 Summary
Preface
In this book, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes “privacy” in the first place, and why we should care about maintaining it. The book is structured as follows.
• Chapter 1: Introduction. This short chapter motivates the need for this book and outlines its contents.
• Chapter 2: Understanding Privacy. This chapter offers an in-depth discussion on what privacy is, i.e., what it means to “have privacy”, and why we may want and need privacy. It does so by examining the concept of privacy from three perspectives: legal perspectives on privacy (also with a view towards their historic context); motivations for having (or not having) privacy; and more general conceptualizations of privacy. These perspectives support assessment of the often nuanced privacy implications of new technologies.
• Chapter 3: Mobile and Pervasive Computing (MPC). This chapter summarizes the key defining characteristics of mobile and pervasive computing. While mobile and pervasive computing systems feature privacy issues inherent in any computer system in general (e.g., interconnectivity), aspects such as context awareness and implicit interaction pose new privacy challenges unique to mobile and pervasive computing.
• Chapter 4: Privacy Implications of MPC. This chapter explores the specific privacy implications of mobile and pervasive computing in order to determine the challenges that must be addressed in order to create more privacy-friendly mobile and pervasive computing systems. It groups these around three core aspects: (1) the digitization of everyday life; (2) the ability of automatic data capture; and (3) the ability of using data to predict behavior. While none of these trends are new, mobile and pervasive computing systems exacerbate these issues greatly.
• Chapter 5: Supporting Privacy in MPC. This chapter discusses seven key directions and associated challenges for building privacy-friendly mobile and pervasive computing systems: (1) privacy-friendly defaults; (2) adequate privacy-risk communication; (3) privacy management assistance; (4) context-adaptive privacy mechanisms; (5) user-centric privacy controls; (6) algorithmic accountability; and (7) privacy engineering methodologies. While there is no silver bullet to remedy all privacy implications of any mobile and pervasive computing system, the presented approaches constitute an essential toolbox for building privacy into mobile and pervasive computing systems.
• Chapter 6: Conclusions. This chapter provides a brief outlook and stipulates key challenges for privacy that the authors see.
FOCUS AND AUDIENCE OF THIS BOOK
This book is intended as a brief introduction into the multidisciplinary area of privacy research, with a focus on its applicability