Article

USING CONTEXT FOR PRIVACY BOUNDARY CONTROL IN RFID APPLICATIONS

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Creating a usable system that supports users' in-situ control over their privacy boundaries is a challeng ing problem. We propose process and data models for providing feedback that better supports RFID users' privacy boundary regulation. Our context-aware feed back approach uses activity hierarchies to represent context around the use of RFID applications and support privacy critic agents to adapt feedback and information disclosure processes according to users' changing needs.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

Article
Full-text available
RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in everyday environments, there is a heightening tension in the design and shaping of social boundaries in the digitally enhanced real world. Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. We discuss awareness issues and cognitive costs in regulating RFID-triggered information flows and propose a framework for privacy-observant RFID applications. The proposed framework supports users' in situ privacy boundary control by allowing users to (1) see how their information is socially disclosed and viewed by others, (2) dynamically negotiate their privacy boundaries, and (3) automate certain information disclosure processes.
ResearchGate has not been able to resolve any references for this publication.