Abstract
In order for ubiquitous computing to realize its full potential, it is necessary for service providers to detect the presence of user devices to identify the needs and wishes of the associated users—both as this relates to the performance of services and the implementation of privacy preferences. We take a large step in the direction of improving service performance by introducing an approach to tie a person’s online behavior (e.g., as represented by her HTML cookies) with her physical behavior (e.g., location and brick-and-mortar purchases). This enables insights from web browsing to be applied to in-store sales (e.g., using coupons), and data related to user location and behavior to be used to improve the understanding of the user’s online needs. We also show how to tie a user profile to a user communications channel, which enables messaging (e.g., alerts, reminders and coupons) that is tied to the detection of user actions, whether on- or offline. We show how to combine this advance in profiling capabilities with a practically manageable approach to enhance end-user privacy. One aspect of this is an extension of the domain of observations to which users can (or can deny to) grant permissions, e.g., allowing individual users a practical method to determine under what circumstances facial recognition can be used for personalization purposes. Our approach is backwards compatible with existing consumer devices; can be rolled out gradually; and is designed with attention given to the usability of the resulting system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
If the app has BLUETOOTH_ADMIN permission, this can be simplified, as the app can also initiate discovery and manipulate Bluetooth settings.
References
S. Jerde, The New York Times Can Now Predict Your Emotions and Motivations After Reading a Story (2019). https://www.adweek.com/tv-video/the-new-york-times-can-now-predict-your-emotions-and-motivations-after-reading-a-story/
K. Mowery, H. Shacham, Pixel perfect: fingerprinting canvas in HTML5, in Proceedings of W2SP (2012), pp. 1–12
S. Kamkar, Evercookie (2010). http://samy.pl/evercookie
M.K. Franklin, M.K. Reiter, Fair Exchange with a Semi-Trusted Third Party (ACM, New York, 1997), pp. 1–5
J. Camenisch, U. Maurer, M. Stadler, Digital payment systems with passive anonymity-revoking trustees. J. Comput. Sec. 5(1), 69–89 (1997)
S. Micali, Fair cryptosystems. Massachusetts Institute of Technology. Technical Report (1993)
L. Coney, J.L. Hall, P.L. Vora, D. Wagner, Towards a privacy measurement criterion for voting systems, in Proceedings of the 2005 National Conference on Digital Government Research (2005), pp. 287–288
L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(05), 557–570 (2002)
C. Dwork, Differential privacy, in Encyclopedia of Cryptography and Security (2011), pp. 338–340
A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, D. Wagner, Android Permissions: User Attention, Comprehension, and Behavior (ACM, New York, 2012), p. 3
S. Von Solms, D. Naccache, On blind signatures and perfect crimes. Comput. Sec. 11(6), 581–583 (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jakobsson, M., Jakobsson, A. (2020). Privacy and Tracking. In: Jakobsson, M. (eds) Security, Privacy and User Interaction. Springer, Cham. https://doi.org/10.1007/978-3-030-43754-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-43754-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43753-4
Online ISBN: 978-3-030-43754-1
eBook Packages: Computer ScienceComputer Science (R0)