{"title":"Is Privacy Regulation Slowing Down or Enabling the Wide Adoption of Pervasive Systems? Panel Summary","authors":"C. Bettini","doi":"10.1109/PERCOM.2019.8767414","DOIUrl":null,"url":null,"abstract":"In the last years we have witnessed large scale data privacy violations mostly due to security issues or to unauthorised use and communication of personal data. Among many events, millions of Yahoo e-mail accounts and Facebook private profiles were violated. Mobile and pervasive technology and services have a role in this scenario, since they introduce new devices with possible hardware and software security holes, new communication protocols, new types of personal data, and a new scale for the amount of data being collected. Location data of individuals collected through mobile devices is a natural example, and video imaging and speech collected in our homes by smart appliances and toys is another.","PeriodicalId":209341,"journal":{"name":"Annual IEEE International Conference on Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual IEEE International Conference on Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOM.2019.8767414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the last years we have witnessed large scale data privacy violations mostly due to security issues or to unauthorised use and communication of personal data. Among many events, millions of Yahoo e-mail accounts and Facebook private profiles were violated. Mobile and pervasive technology and services have a role in this scenario, since they introduce new devices with possible hardware and software security holes, new communication protocols, new types of personal data, and a new scale for the amount of data being collected. Location data of individuals collected through mobile devices is a natural example, and video imaging and speech collected in our homes by smart appliances and toys is another.