The media equation: how people treat computers, television, and new media like real people and places
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
The impact of animated interface agents: a review of empirical research
International Journal of Human-Computer Studies
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Relational agents: a model and implementation of building user trust
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A pseudonymous communications infrastructure for the internet
A pseudonymous communications infrastructure for the internet
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Persuasion Through Overheard Communication by Life-Like Agents
IAT '04 Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Privacy-enhanced personalization
Communications of the ACM
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Encountering SenseCam: personal recording technologies in everyday life
Proceedings of the 11th international conference on Ubiquitous computing
Hi-index | 0.00 |
In mobile and pervasive computing environments, users may easily exchange information via ubiquitously available computers ranging from sensors, embedded processors, wearable and handheld devices, to servers. The unprecedented level of interaction between users and intelligent environments poses unparalleled privacy challenges. We identify a new attack that can be used to acquire users' private information---using reciprocity norms. By mutually exchanging information with users, an attacker may use a psychological method, the norm of reciprocity, to acquire users' private information. We implemented software to provide a rich shopping experience in a mobile and pervasive computing environment and embedded the reciprocity attack. Our experiments showed that participants were more willing to provide some types of private information under reciprocity attacks. To the best of our knowledge, this is the first attempt to understand the impact of the norm of reciprocity as an attack in mobile and pervasive computing environments. These human factors should be taken into consideration when designing security measures to protect people's privacy.