Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Privacy in mobile and pervasive computing / (Record no. 562335)

000 -LEADER
fixed length control field 06653nam a22007331i 4500
001 - CONTROL NUMBER
control field 8563170
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152928.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190103s2019 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781681731186
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681734583
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681734712
Qualifying information epub
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681731179
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00882ED1V01Y201810MPC013
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl000408881
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1080937191
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number L256 2019
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Langheinrich, Marc,
Relator term author.
245 10 - TITLE STATEMENT
Title Privacy in mobile and pervasive computing /
Statement of responsibility, etc. Marc Langheinrich, Florian Schaub.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [San Rafael, California] :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xi, 127 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on mobile and pervasive computing,
International Standard Serial Number 1933-902X ;
Volume/sequential designation # 13
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 95-125).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Lecture goals and overview -- 1.2 Who should read this --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Understanding privacy -- 2.1 Codifying privacy -- 2.1.1 Historical roots -- 2.1.2 Privacy law and regulations -- 2.2 Motivating privacy -- 2.2.1 Privacy benefits -- 2.2.2 Limits of privacy -- 2.3 Conceptualizing privacy -- 2.3.1 Privacy types -- 2.3.2 Privacy constituents -- 2.3.3 Privacy expectations -- 2.3.4 A privacy taxonomy -- 2.4 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Mobile and pervasive computing -- 3.1 Mobile computing characteristics -- 3.1.1 Novel form factors-mobility and diversity -- 3.1.2 Power in your pocket-computation and communication -- 3.1.3 Data recording-sensing and context-awareness -- 3.1.4 Software ecosystems, the device as a platform -- 3.2 Pervasive and ubiquitous computing characteristics -- 3.2.1 Embeddedness-invisible computing -- 3.2.2 Implicit interaction-understanding user intent -- 3.2.3 Ubiquity, from social to societal scale -- 3.3 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Privacy implications of mobile and pervasive computing -- 4.1 Data shadows, the digitization of daily life -- 4.1.1 Technological development -- 4.1.2 Privacy implications -- 4.2 From atoms to bits-automated real-world data capture -- 4.2.1 Technological development -- 4.2.2 Privacy implications -- 4.3 Profiling-predicting behavior -- 4.3.1 Technological development -- 4.3.2 Privacy implications -- 4.4 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Supporting privacy in mobile and pervasive computing -- 5.1 Privacy-friendly by default -- 5.2 Privacy risk communication -- 5.3 Privacy management assistance -- 5.4 Context-adaptive privacy mechanisms -- 5.5 User-centric privacy controls -- 5.6 Algorithmic accountability -- 5.7 Privacy engineering -- 5.8 Summary --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Conclusions -- Bibliography -- Authors' biographies.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly--making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of--and ability to enjoy--privacy, but also look at what constitutes "privacy" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on January 3, 2019).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing
General subdivision Security measures.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term mobile computing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term pervasive computing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ubiquitous computing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Internet of Things
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy-enhancing technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy behavior
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term privacy engineering
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schaub, Florian,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781681731179
-- 9781681734583
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on mobile and pervasive computing ;
Volume/sequential designation # 13.
International Standard Serial Number 1933-902X
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=8563170
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE835 2020-04-13 2020-04-13 E books

Powered by Koha