Author:
Karyda Maria,Gritzalis Stefanos,Hyuk Park Jong,Kokolakis Spyros
Abstract
PurposeThis paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.Design/methodology/approachThe paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.FindingsA significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.Research limitations/implicationsThis paper identifies key research issues and provides directions for future research.Originality/valueThis study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.
Subject
Economics and Econometrics,Sociology and Political Science,Communication
Reference29 articles.
1. Aarts, E. and Roovers, R. (2003), “IC design challenges for ambient intelligence”, in Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'03), IEEE.
2. Beckwith, R. (2003), “Designing for ubiquity: the perception of privacy”, IEEE Pervasive Computing, Vol. 3 No. 2, pp. 40‐6.
3. Bonner, W. and Chiasson, M. (2005), “If fair information principles are the answer, what was the question? An actor‐network theory investigation of the modern constitution of privacy”, Information and Organization, Vol. 15 No. 4, pp. 267‐93.
4. Brey, P. (2005), “Freedom and privacy in ambient intelligence”, Ethics and Information Technology, Vol. 7 No. 3, pp. 157‐66.
5. Čas, J. (2005), “Privacy in pervasive computing environments: a contradiction in terms?”, IEEE Technology and Society Magazine, Vol. 24 No. 1, pp. 24‐33.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献