Privacy in Mobile and Pervasive Computing (Record no. 84705)

000 -LEADER
fixed length control field 04792nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-3-031-02486-3
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163527.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2019 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031024863
-- 978-3-031-02486-3
082 04 - CLASSIFICATION NUMBER
Call Number 510
100 1# - AUTHOR NAME
Author Langheinrich, Marc.
245 10 - TITLE STATEMENT
Title Privacy in Mobile and Pervasive Computing
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 129 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Mobile & Pervasive Computing,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface -- Acknowledgments -- Introduction -- Understanding Privacy -- Mobile and Pervasive Computing -- Privacy Implications of Mobile and Pervasive Computing -- Supporting Privacy in Mobile and Pervasive Computing -- Conclusions -- Bibliography -- Authors' Biographies.
520 ## - SUMMARY, ETC.
Summary, etc It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly-making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of-and ability to enjoy-privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
700 1# - AUTHOR 2
Author 2 Schaub, Florian.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02486-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2019.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile computing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- User interfaces (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Human-computer interaction.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Technology and Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile Computing.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- User Interfaces and Human Computer Interaction.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1933-902X
912 ## -
-- ZDB-2-SXSC

No items available.