Privacy Implications and Protection in the New Ubiquitous Web Environment

Author(s):  
Charalampos Z. Patrikakis ◽  
Ioannis G. Nikolakopoulos ◽  
Athanasios Voulodimos

In this chapter, we are addressing the issue of privacy in our modern world of Internet, Web 2.0, personalization, location based services, and ubiquitous computing. The issue is initially viewed from the perspective of user profiles, starting from existing approaches used in social networking and mobile computing applications. Emphasis is given on the separation of personal and public information and the way it can be used in Web and mobile applications. Furthermore, identifying the importance and the actual meaning of privacy in an online world is a crucial and difficult task, which has to be carried out before trying to propose ways to protect the users’ privacy.

2017 ◽  
Vol 16 (5) ◽  
pp. 1883-1883
Author(s):  
Jaeil Lee ◽  
Inkyung Jeon ◽  
Hyukjin Kwon ◽  
Dongil Shin ◽  
Dongkyoo Shin

Author(s):  
Shalin Hai-Jew

One degree out from an image “selfie” are text-based self-generated user profiles (self-portrayals) on social media platforms; these are self-depictions of the individual as he or she represents to the world. This work-based self-representation must be sufficiently convincing of professionalism and ethics to encourage other professionals to collaborate on shared work projects through co-creation, support, attention, or other work. While project-based track records may carry the force of fact, there are often more subtle messages that have high impact on distant collaborations. One such important dimension is “indirect reciprocity,” or whether the target individual treats collaborators with respect and care and returns altruistic acts with their own acts of altruism. This work describes some analyses of professional profiles on social media platforms (email, social networking, and microblogging) for indicators of indirect reciprocity.


2019 ◽  
pp. 1266-1276
Author(s):  
David Ramírez Plascencia ◽  
Jorge Ramírez Plascencia

Between October 24 and 25 in 2015, Mexico faced the strongest hurricane ever registered in the Western Hemisphere, which reached a record of 200 mph (325 km/h) of maximum sustained winds. In spite of pessimist predictions about the final outcome of this natural disaster, at the end, it degraded itself into a tropical storm when landing in the Mexican state of Jalisco. The present research stands in a data collecting process from social media during two moments: a) throughout the happening and b) after the incident. It collected not only information and comments generated in federal and local governmental public profiles but in civil organizations and private user profiles as well. This paper describes how social media helped not only to socialize public information in order to prevent danger but it also served as a link between governmental dependencies and civil society to support affected communities after the event.


Author(s):  
Jorge Barbosa ◽  
Fabiane Dillenburg ◽  
Alex Garzão ◽  
Gustavo Lermen ◽  
Cristiano Costa

Mobile computing is been driven by the proliferation of portable devices and wireless communication. Potentially, in the mobile computing scenario, the users can move in different environments and the applications can automatically explore their surroundings. This kind of context-aware application is emerging, but is not yet widely disseminated. Based on perceived context, the application can modify its behavior. This process, in which software modifies itself according to sensed data, is named Adaptation. This constitutes the core of Ubiquitous Computing. The ubiquitous computing scenario brings many new problems such as coping with the limited processing power of mobile devices, frequent disconnections, the migration of code and tasks between heterogeneous devices, and others. Current practical approaches to the ubiquitous computing problem usually rely upon traditional computing paradigms conceived back when distributed applications where not a concern. Holoparadigm (in short Holo) was proposed as a model to support the development of distributed systems. Based on Holo concepts, a new programming language called HoloLanguage (in short, HoloL) was created. In this chapter, we propose the use of Holo for developing and executing ubiquitous applications. We explore the HoloL for ubiquitous programming and propose a full platform to develop and execute Holo programs. The language supports mobility, adaptation, and context awareness. The execution environment is based on a virtual machine that implements the concepts proposed by Holo. The environment supports distribution and strong code mobility.


Author(s):  
Junaid Ahsenali Chaudhry

The networking technologies are moving very fast in pursuit of optimum performance, which has triggered the importance of non-conventional computing methods. In the modern world of pervasive business systems, time is money. The more the system fulfills the needs of the requesting user, the more revenue the business will generate. The modern world is service-oriented, and therefore, providing customers with reliable and fast service delivery is of paramount importance. In this article we present a scheme to increase the reliability of business systems. The arrival of ubiquitous computing has triggered the need previously mentioned even further, and people hold high exceptions from this technology. In Morikawa (2004), the authors characterize the vision of ubiquitous computing into two categories: “3C everywhere and physical interaction.” 3C consists of “computing everywhere,” “content everywhere,” and “connectivity everywhere.” “Physical interaction” connects the hidden world of ubiquitous sensors with the real world. This wide area of coverage and high scalability makes a ubiquitous system quite fragile toward not only external threats, but internal malfunctioning too. With the high probability of “abnormal behavior” it is more important to have knowledge of fault and its root causes. As described in Yau, Wang, and Karim (2002), application failures are like diseases, and there can be many types of faults with matching symptoms, thus fault localization and categorization are very important. Unlike in Hung et al. (2005) and Steglich and Arbanowski (2004), we cannot categorize all abnormal functionalities into fault tolerance or (re)configuration domains simply because faults do not have any predefined pattern; rather we have to find those pattern. Moreover, as in Steglich and Arbanowski (2004) the “without foresight” type of repair in ubiquitous systems is desired. The conventional FCAPS (Fault, Configuration, Accounting, Performance, Security), network management model categorizes management functions in one group, but we argue that categorizing management functions into different segment is mandatory in self management paradigms. Since in highly dynamic and always available very wide area networks, one fault can be atomic (caused because of one atomic reason) or it can be a set of many faults (caused because of many atomic or related reasons). It is often a good practice to break the problem into smaller atomic problems and then solve them (Chaudhry, Park, & Hong, 2006). If we classify all different types of faults (atomic, related, and composite) into one fault management category, the results would not be satisfactory, nor would the system be able to recover from the “abnormal state” well. Since the side effects of system stability and self healing actions are not yet known (Yau et al., 2002), we cannot afford to assume that running self management modules along with functional modules of the core system will not have a negative effect on the system performance. For example, if the system is working properly, there is no need for fault management modules to be active. Lastly, instead of having a fault-centric approach, we should have a recovery-centric approach because of our objective that is to increase the system availability In this article we present autonomic self healing engine (ASHE) architecture for ubiquitous smart systems. We identify the problem context through artificial immune system techniques and vaccinate (deploy solution to) the system through dynamically composed applications. The services involved in the service composition process may or may not be related, but when they are composed into an application they behave in a way it is specified in their composition scheme. The vaccines are dissolved to liberate the system resources (because they take the system’s own resources to recover it) after the system recovery. When the system is running in a normal state, all self management modules are turned off except context awareness and self optimization. These two are always on to monitor and optimize the system respectively.


Author(s):  
Ann Dutton Ewbank ◽  
Adam G. Kay ◽  
Teresa S. Foulger ◽  
Heather L. Carter

This chapter reviews the capabilities of social networking tools and links those capabilities to recent legal and ethical controversies involving use of social networking tools such as Facebook and MySpace. A social cognitive moral framework is applied to explore and analyze the ethical issues present in these incidents. Three ethical vulnerabilities are identified in the use of social networking tools: 1) the medium provides a magnified forum for public humiliation or hazing, 2) a blurring of boundaries exists between private and public information on social networking sites, and 3) the medium merges individuals’ professional and non-professional identities. Prevalent legal and social responses to these kinds of incidents are considered and implications are suggested for encouraging responsible use. The chapter includes a description of the authors’ current research with preservice students involving an intervention whereby students read and think about real cases where educators use social networking. The intervention was created to improve students’ critical thinking about the ethical issues involved. Recommendations for applying institutional codes of conduct to ethical dilemmas involving online tools are discussed.


Author(s):  
Jalal Kawash ◽  
Christo El Morr ◽  
Hamza Taha ◽  
Wissam Charaf

Commuting forms an integral part of our lives, whether we are commuting for leisure or business. The use of location-based services and mobile computing has potentials to improve commuting experience and awareness. For instance, printed bus schedules have been only recently complemented with online systems to provide bus timing information for the community of public transport commuters. Commuters can nowadays inquire about bus timings by the use of telephony systems and the Internet. However, the information provided to users is statically produced, just like the still in-use old fashion bus route tables, and does not take into consideration delays and cancellations. The next step in the evolution of these schedules must produce live information, track bus movements, and alert commuters of bus arrivals and timings. The experience of commuting using taxis can also be improved beyond the use of telephony, while the most common way of asking for a taxi continues to be by hand waiving. Such improvements are more crucial for commuters that are not completely aware of their surrounding environment, such as tourists and business visitors. This article envisions the formation of networked organizations of commuters, through the use of mobile and location-based services. We discuss scenarios and use cases of such organizations and propose an example software implementation for the supporting services.


Author(s):  
Anind K. Dey ◽  
Jonna Häkkilä

Context-awareness is a maturing area within the field of ubiquitous computing. It is particularly relevant to the growing sub-field of mobile computing as a user’s context changes more rapidly when a user is mobile, and interacts with more devices and people in a greater number of locations. In this chapter, we present a definition of context and context-awareness and describe its importance to human-computer interaction and mobile computing. We describe some of the difficulties in building context-aware applications and the solutions that have arisen to address these. Despite these solutions, users have difficulties in using and adopting mobile context-aware applications. We discuss these difficulties and present a set of eight design guidelines that can aid application designers in producing more usable and useful mobile context-aware applications.


2009 ◽  
pp. 3222-3235 ◽  
Author(s):  
Anind K. Dey ◽  
Jonna Häkkilä

Context-awareness is a maturing area within the field of ubiquitous computing. It is particularly relevant to the growing sub-field of mobile computing as a user’s context changes more rapidly when a user is mobile, and interacts with more devices and people in a greater number of locations. In this chapter, we present a definition of context and context-awareness and describe its importance to human-computer interaction and mobile computing. We describe some of the dif- ficulties in building context-aware applications and the solutions that have arisen to address these. Despite these solutions, users have difficulties in using and adopting mobile context-aware applications. We discuss these difficulties and present a set of eight design guidelines that can aid application designers in producing more usable and useful mobile context-aware applications.


Author(s):  
John Krogstie

Today, the PC is only one of many ways to access information resources. On one hand, traditional computing technology is becoming more mobile and ubiquitous and, on the other hand, traditional mass media are becoming richer. Whereas information services related to interactive TV and ubiquitous computing are projected to become prominent in a few years, mobile computing is the most important current trend within information and communication technology.


Sign in / Sign up

Export Citation Format

Share Document