Table of Contents Author Guidelines Submit a Manuscript
Advances in Human-Computer Interaction
Volume 2009, Article ID 713516, 13 pages
http://dx.doi.org/10.1155/2009/713516
Research Article

Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects

1JST/CREST and School of Science and Technology for Future Life, Tokyo Denki University, Chiyoda-Ku, Tokyo 101-0054, Japan
2Department of Industrial Engineering, University of Arkansas, Fayetteville, AR 72701, USA

Received 24 November 2008; Revised 1 July 2009; Accepted 29 September 2009

Academic Editor: Armando Barreto

Copyright © 2009 Shin'ichi Konomi and Chang S. Nam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Palen, M. Salzman, and E. Youngs, “Going wireless: behavior & practice of new mobile phone users,” in Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW '00), pp. 201–210, Philadelphia, Pa, USA, 2000.
  2. R. Want, K. P. Fishkin, A. Gujar, and B. L. Harrison, “Bridging physical and virtual worlds with electronic tags,” in Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '99), pp. 370–377, 1999.
  3. Mobile Marketing Data Labo, “The 3rd Research on the Uses of Mobile Contents,” 2007, http://mmd.up-date.ne.jp/news/detail.php?news_id=100.
  4. Amazon, Amazon ScanSearch, 2005, http://www.amazon.co.jp/exec/obidos/tg/feature/-/546374/ref=gw_lp_ct_4_1/250-0440035-9265812.
  5. NFC, “NFC Forum,” 2006, http://www.nfc-forum.org/home.
  6. P. Kourouthanassis and G. Roussos, “Developing consumer-friendly pervasive retail systems,” IEEE Pervasive Computing, vol. 2, no. 2, pp. 32–39, 2003. View at Publisher · View at Google Scholar
  7. A. Gilbert, “Cutting-edge ‘smart shelf’ test ends,” http://news.cnet.com/2100-1008_3-5067253.html.
  8. G. Borriello, “Introduction,” Communications of the ACM, vol. 48, no. 9, pp. 34–37, 2005. View at Publisher · View at Google Scholar
  9. S. Garfinkel and B. Rosenberg, RFID: Applications, Security, and Privacy, Addison-Wesley, New York, NY, USA, 2005.
  10. B. Nath, F. Reynolds, and R. Want, Eds., “Special issue on RFID technology and applications,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 22–24, 2006. View at Publisher · View at Google Scholar
  11. S. Konomi and G. Roussos, “Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments,” Personal and Ubiquitous Computing, vol. 11, no. 7, pp. 507–521, 2007. View at Publisher · View at Google Scholar
  12. S. Sackmann, J. Strüker, and R. Accorsi, “Personalization in privacy-aware highly dynamic systems,” Communications of the ACM, vol. 49, no. 9, pp. 32–38, 2006. View at Publisher · View at Google Scholar
  13. I. Altman, The Environment and Social Behavior, Brooks/Cole, Monterey, Calif, USA, 1975.
  14. L. Palen and P. Dourish, “Unpacking “privacy” for a networked world,” in Proceedings of the Conference on Human Factors in Computing Systems (CHI '03), pp. 129–136, ACM Press, 2003.
  15. P. Dourish and K. Anderson, “Collective information practice: exploring privacy and security as social and cultural phenomena,” in Human-Computer Interaction, vol. 21, pp. 319–342, Lawrence Erlbaum Associates, Mahwah, NJ, USA, 2006. View at Google Scholar
  16. S. Konomi, “QueryLens: beyond ID-based information access,” in Proceedings of the 4th International Conference on Ubiquitous Computing (Ubicomp '02), pp. 210–218, Springer, 2002.
  17. S. Konomi, “Snap-on filter for mobile information appliances,” in Proceedings of the 5th Asia Pacific Conference on Computer-Human Interaction (APCHI '02), pp. 357–368, Science Press, 2002.
  18. C. S. Nam and S. Konomi, “Usability evaluation of QueryLens: implications for context-aware information sharing using RFID,” in Proceedings of the IASTED International Conference on Human-Computer Interaction (IASTED-HCI '05), pp. 90–95, Phoenix, Ariz, USA, 2005.
  19. T. Kindberg, J. Barton, J. Morgan et al., “People, places, things: Web presence for the real world,” in Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), ACM Press, 2002.
  20. P. Ljungstrand, J. Redstrom, and L. E. Holmquist, “WebStickers: using physical tokens to access, manage and share bookmarks to the Web,” in Proceedings of the Designing Augmented Reality Environments, 2000.
  21. J. S. Olson, J. Grudin, and E. Horvitz, “A study of preferences for sharing and privacy,” in Proceedings of the Conference on Human Factors in Computing Systems (CHI '05), pp. 1985–1988, ACM Press, 2005.
  22. J. Burrell, G. K. Gay, K. Kubo, and N. Farina, “Context-aware computing: a test case,” in Proceedings of the 4th International Conference on Ubiquitous Computing (Ubicomp '02), pp. 1–16, 2002.
  23. F. Espinoza, P. Persson, A. Sandin, H. Nyström, E. Cacciatore, and M. Bylund, “GeoNotes: social and navigational aspects of location-based information systems,” in Proceedings of the International Conference on Ubiquitous Computing (Ubicomp '01), pp. 2–17, Springer, 2001.
  24. I. Smith, S. Consolvo, A. Lamarca et al., “Social disclosure of place: from location technology to communication practices,” in Proceedings of the 3rd International Conference on Pervasive Computing (Pervasive '05), pp. 134–151, Springer, Heidelberg, Germany, 2005.
  25. A. J. B. Brush, T. C. Turner, M. A. Smith, and N. Gupta, “Scanning objects in the wild: assessing an object triggered information system,” in Proceedings of the 7th International Conference on Ubiquitous Computing (Ubicomp '05), pp. 305–322, 2005.
  26. A. Fletcher, “Two sides of RFID,” 2004, European Edition, http://www.foodproductiondaily.com/.
  27. D. Wan, “Magic medicine cabinet: a situated portal for consumer healthcare,” in Proceedings of the 1st International Symposium on Handheld and Ubiquitous Computing (HUC '99), pp. 27–29, 1999.
  28. L. Palan and S. Aaløkke, “Of pill boxes and piano benches: “home-made” methods for managing medication,” in Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work (CSCW '06), pp. 79–88, 2006.
  29. EPCglobal, “Guidelines on EPC for Consumer Products,” 2005, http://www.epcglobalinc.org/public/ppsc_guide.
  30. A. F. Westin, Privacy and Freedom, Atheneum, New York, NY, USA, 1967.
  31. X. Jiang and J. A. Landay, “Modeling privacy control in context-aware systems,” IEEE Pervasive Computing, vol. 1, no. 3, pp. 59–63, 2002. View at Publisher · View at Google Scholar
  32. M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “The evolution of RFID security,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 62–69, 2006. View at Publisher · View at Google Scholar
  33. S. Inoue, S. Konomi, and H. Yasuura, “Privacy in digitally named world with RFID tags,” in Proceedings of the International Workshop on Social-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, 2002.
  34. A. Juels, R. L. Rivest, and M. Szydlo, “The blocker tag: selective blocking of RFID tags for consumer privacy,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS '03), pp. 103–111, ACM Press, 2003.
  35. T. Kriplean, E. Welbourne, N. Khoussainova et al., “Physical access control for captured RFID data,” IEEE Pervasive Computing, vol. 6, no. 4, pp. 48–55, 2007. View at Publisher · View at Google Scholar
  36. V. Rastogi, E. Welbourne, N. Khoussainova et al., “Expressing privacy policies using authorization views,” in Proceedings of the International Workshop on Privacy in UbiComp (UbiPriv '07), pp. 531–542, 2007.
  37. V. Rastogi, D. Suciu, and E. Welbourne, “Access control over uncertain data,” in Proceedings of the 34th International Conference on Very Large Data Bases (VLDB '08), pp. 821–832, 2008.
  38. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  39. L. Sweeney, “Achieving k-anonymity privacy protection using generalization and supression,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, pp. 571–588, 2002. View at Google Scholar
  40. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” in Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), p. 24, 2006.
  41. B. C. M. Fung, M. Cao, B. C. Desai, and H. Xu, “Privacy protection for RFID data,” in Proceedings of the 24th ACM Symposium on Applied Computing (SAC '09), pp. 1528–1535, Honolulu, Hawaii, USA, 2009.
  42. O. Abul, F. Bonchi, and M. Nanni, “Never walk alone: uncertainty for anonymity in moving objects databases,” in Proceedings of the 24th International Conference on Data Engineering (ICDE '08), pp. 376–385, 2008.
  43. A. Acquisti, “Protecting privacy with economics: economic incentives for preventive technologies in ubiquitous computing environments,” in Proceedings of the International Workshop on Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing, 2002.
  44. J. I. Hong and J. A. Landay, “An architecture for privacy-sensitive ubiquitous computing,” in Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services (MobiSys '04), pp. 177–189, ACM Press, Boston, Mass, USA, 2004.
  45. J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, “Privacy risk models for designing privacy-sensitive ubiquitous computing systems,” in Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04), pp. 91–100, ACM Press, Cambridge, Mass, USA, 2004.
  46. C. Floerkemeier, R. Schneider, and M. Langheinrich, “Scanning with a purpose—supporting the fair information principles in RFID protocols,” in Proceedings of the 2nd International Symposium on Ubiquitous Computing Systems (UCS '04), pp. 214–231, 2004.
  47. B. A. Price, K. Adam, and B. Nuseibeh, “Keeping ubiquitous computing to yourself: a practical model for user control of privacy,” International Journal of Human Computer Studies, vol. 63, no. 1-2, pp. 228–253, 2005. View at Publisher · View at Google Scholar
  48. S. Lederer, J. I. Hong, A. K. Dey, and J. A. Landay, “Personal privacy through understanding and action: five pitfalls for designers,” Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 440–454, 2004. View at Google Scholar
  49. V. Bellotti and A. Sellen, “Design for privacy in ubiquitous computing environments,” in Proceedings of the 3rd European Conference on Computer-Supported Cooperative Work (ECSCW '93), pp. 77–92, Kluwer Academic Publishers, 1993.
  50. M. Weiser and J. S. Brown, “Designing calm technology,” PowerGrid Journal, vol. 1, no. 1, 1996. View at Google Scholar
  51. P. Dourish, “What we talk about when we talk about context,” Personal and Ubiquitous Computing, vol. 8, no. 1, pp. 19–30, 2006. View at Google Scholar
  52. S. Konomi and C. S. Nam, “Using context for privacy boundary control in RFID applications,” in Proceedings of the IASTED International Conference on Human-Computer Interaction (IASTED-HCI '05), pp. 252–257, Acta Press, Phoenix, Ariz, USA, 2005.
  53. S. Konomi, “Personal privacy assistants for RFID users,” in Proceedings of the International Workshop Series on RFID—Information Sharing and Privacy, Tokyo, Japan, November-December 2004.
  54. J. Grudin and E. Horvitz, “Presenting choices in context: approaches to information sharing,” in Proceedings of the International Workshop on Ubicomp Communities: Privacy as Boundary Negotiation, 2003.
  55. T. P. Moran and P. Dourish, “Introduction to this special issue on context-aware computing,” Human-Computer Interaction, vol. 16, no. 2, pp. 87–95, 2001. View at Google Scholar
  56. P. Samarati, “Protecting respondents' identities in microdata release,” IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010–1027, 2001. View at Publisher · View at Google Scholar
  57. Spychip.com, “Scandal: Walmart, P&G, Involved in Secret RFID Testing,” 2003, http://www.spychips.com/press-releases/broken-arrow.html.
  58. B. G. Claybrook, “Using views in a multilevel secure database management system,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 4–17, IEEE Computer Society, 1983.
  59. D. E. Denning, S. G. Akl, M. Heckman et al., “Views for multilevel database security,” IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 129–140, 1987. View at Publisher · View at Google Scholar
  60. G. Aggarwal, M. Bawa, P. Ganesan et al., “Vision paper: enabling privacy for the paranoids,” in Proceedings of the 13th International Conference on Very Large Data Bases, pp. 708–719, Morgan Kaufmann, 2004.
  61. G. Fischer, A. C. Lemke, and T. Mastaglio, “Using critics to empower users,” in Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '90), pp. 337–347, ACM Press, 1990.
  62. G. Fischer, K. Nakakoji, J. Ostwald, G. Stahl, and T. Sumner, “Embedding computer-based critics in the contexts of design,” in Proceedings of the Conference on Human Factors in Computing Systems (INTERCHI '93), pp. 157–164, ACM Press, 1993.
  63. M. S. Ackerman and L. Cranor, “Privacy critics: UI components to safeguard users' privacy,” in Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '99), pp. 258–259, ACM Press, Pittsburgh, Pa, USA, 1999.
  64. MetroGroup, “Metro Group Future Store Initiative,” July 2006, http://www.future-store.org/fsi-internet/html/de/375/index.html.
  65. G. Fischer, E. Giaccardi, Y. Ye, A. G. Sutcliffe, and N. Mehandjiev, “Meta-design: a manifesto for end-user development,” Communications of the ACM, vol. 47, no. 9, pp. 33–37, 2004. View at Publisher · View at Google Scholar