کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
466240 | 697807 | 2012 | 18 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: Understanding identity exposure in pervasive computing environments Understanding identity exposure in pervasive computing environments](/preview/png/466240.png)
Various miniaturized computing devices that store our identity information are emerging rapidly and are likely to become ubiquitous in the future. They allow private information to be exposed and accessed easily via wireless networks. When identity and context information is gathered by pervasive computing devices, personal privacy might be sacrificed to a greater extent than ever before. People whose information is targeted may have different privacy protection skills, awareness, and privacy preferences. In this research, we studied the following issues and their relations: (a) identity information that people think is important to keep private; (b) actions that people claim to take to protect their identities and privacy; (c) privacy concerns; (d) how people expose their identity information in pervasive computing environments; and (e) how our RationalExposure model can help minimize unnecessary identity exposure. We conducted the research in three stages, a comprehensive survey and two in-lab experiments. We built a simulated pervasive computing shopping system, called InfoSource. It consisted of two applications and our RationalExposure model. Our data show that identity exposure decisions depended on participants’ attitudes about maintaining privacy, but did not depend on participants’ concerns or security actions that they claimed to have taken. Our RationalExposure model did help the participants reduce unnecessary disclosures.
► We studied identity exposure attitudes, concerns, claimed actions, and behaviors.
► Privacy attitudes predict people’s exposure behaviors.
► Privacy concerns and claimed actions do not predict one’s actual behaviors.
► People expose multiple individual identity elements rather than their combination.
► Our RationalExposure model helps people reduce unnecessary identity exposure.
Journal: Pervasive and Mobile Computing - Volume 8, Issue 5, October 2012, Pages 777–794