{"title":"Privacy Representation in the Internet of Things Using Pretopological Theory","authors":"A. Toumia","doi":"10.1145/3240117.3240134","DOIUrl":null,"url":null,"abstract":"Data security and privacy protection have been identified as one of the most critical issues of the Internet of Things (IoT). They represent one of the major obstacles to its adoption. Researchers have addressed the matter by extensive work on protection algorithms and mechanisms. However, setting up privacy preferences is still a complicated task for users. Understanding their impact on personal data is also hard to grasp for non-technical users. Continuing our previous work, we present in this article a first implementation of our precedent model and how to use it for a representation that allows users to configure their privacy preferences graphically.","PeriodicalId":318568,"journal":{"name":"Proceedings of the 1st International Conference on Digital Tools & Uses Congress","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Digital Tools & Uses Congress","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3240117.3240134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Data security and privacy protection have been identified as one of the most critical issues of the Internet of Things (IoT). They represent one of the major obstacles to its adoption. Researchers have addressed the matter by extensive work on protection algorithms and mechanisms. However, setting up privacy preferences is still a complicated task for users. Understanding their impact on personal data is also hard to grasp for non-technical users. Continuing our previous work, we present in this article a first implementation of our precedent model and how to use it for a representation that allows users to configure their privacy preferences graphically.