Design and natural science research on information technology
Decision Support Systems - Special issue on WITS '92
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
Sorting things out: classification and its consequences
Sorting things out: classification and its consequences
Business Modeling With UML: Business Patterns at Work
Business Modeling With UML: Business Patterns at Work
A taxonomy of indoor and outdoor positioning techniques for mobile location services
ACM SIGecom Exchanges - Mobile commerce
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Secure Systems Development with UML
Secure Systems Development with UML
Design science in information systems research
MIS Quarterly
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.00 |
This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data protection experts. Designers of location-based services (LBS) create infrastructures for business or application specific purposes. They have profit-oriented views on the rationale for PET deployment. Finally, users have requirements that might be neither on the PET community's nor on the business people's agenda. Many disciplines provide knowledge about the construction of community-spanning information systems. The challenge for designers of infrastructures and applications is to find a consensus that models all stakeholders' interests - and takes advantage all involved community's knowledge. This paper groups LBS stakeholders into a framework based onto a sociological knowledge construct called "boundary object". For this purpose, a taxonomical analysis of publications in the stakeholder communities is performed. Then the paper proposes a socio-technical approach. Its goal is to find a suitable privacy design for a LBS infrastructure based on the boundary object. Topics for further interdisciplinary research efforts are identified and proposed for discussion.