The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the emerging Internet of Things era, an adversary can use ubiquitous computing devices and sensors to determine a person's absence from one place while predicting his or her presence at another.
Informations sharing in meetings or conference calls are often done by displaying the information on a shared display, e.g. a projected or shared display, or a shared surface as a table. The amount of information on the shared surface may increase, and the clutter makes the relevant information hidden or hard to find. One challenge for current systems is to filter out the information without interest...
The principle of pervasive computing is to embed sensory and other electronic devices into everyday objects. This will seamlessly enable advanced services and applications, but requires the continuous collection of data about the user. While research into the effects of this new type of monitoring remains relatively unstudied, work has began to explore these issues. The focus of this research has...
Media Space is a network application in which video images are continuously sent, received, and shared by coworkers. Therefore, Media Space is considered to have a high risk of giving its users a sense of privacy violation. So far, maintaining reciprocity of the communication is considered to have the most significant effect for perceived risk of privacy violation. In this research, we implemented...
Most visions of ubiquitous computing anticipate a world permeated by a dense sampling of sensors, many of which will be capable of capturing, analyzing, and transmitting personally relevant and potentially privacy-sensitive media, such as video, audio, and identification information. This paper describes a set of sensor platforms that we have designed to experiment with personalization, interaction,...
This position paper describes a social alarm system integrated in a larger communication platform. This platform, developed in the TranseCare project, uses audio/video communication to allow elderly users to make calls to friends and relatives, and to make alarm calls to a centralized alarm center. Combining these functionalities, it allows older users who live independently to stay in touch with...
In implementing privacy protection in surveillance systems, designers must maximize privacy while retaining the system's purpose. One way to achieve this is to combine data-hiding techniques with context-aware policies governing access to securely collected and stored data.
Future manufacturing processes have to be highly adaptive and transformable in order to support short product life cycles and highly customized products. For an implementation of such a flexible, so-called smart factory, which is driven by a massive proliferation and usage of tiny embedded, context-aware information and communication technologies, many challenges - technical and social ones - have...
In this paper we present preliminary work implementing dynamic privacy in public surveillance. The aim is to maximise the privacy of those under surveillance, while giving an observer access to sufficient information to perform their duties. As these aspects are in conflict, a dynamic approach to privacy is required to balance the systempsilas purpose with the systempsilas privacy. Dynamic privacy...
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and controlling of the privacy visual data through two innovations. First, unlike the existing centralized control of privacy data, the proposed system allows individual users to make the final decision on every access to their...
The ubiquitous information society is to come by the development of technology in the future. To make the society safety and reliable, it is important to prescribe privacy guidelines and examine legal and ethical problems from an initial stage of technological development. This paper presents activity and study of POL (policy and ethics)-ST in the Yaoyorozu project.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.