Research Output per year
The lifelogging activity enables a user, the lifelogger, to passively capture multimodal records from a first-person perspective and ultimately create a visual diary encompassing every possible aspect of her life with unprecedented details. In recent years it has gained popularity among different groups of users. However, the possibility of ubiquitous presence of lifelogging devices especially in private spheres has raised serious concerns with respect to personal privacy. Different practitioners and active researchers in the field of lifelogging have analysed the issue of privacy in lifelogging and proposed different mitigation strategies. However, none of the existing works has considered a well-defined privacy threat model in the domain of lifelogging. Without a proper threat model, any analysis and discussion of privacy threats in lifelogging remains incomplete. In this paper we aim to fill in this gap by introducing a first-ever privacy threat model identifying several threats with respect to lifelogging. We believe that the introduced threat model will be an essential tool and will act as the basis for any further research within this domain.
|Title of host publication||Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16|
|Place of Publication||New York, NY (US)|
|Number of pages||6|
|Publication status||Published - 12 Sep 2016|
|Event||2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - Heidelberg, Germany|
Duration: 12 Sep 2016 → 16 Sep 2016
|Conference||2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing|
|Abbreviated title||UbiComp 2016|
|Period||12/09/16 → 16/09/16|
Bibliographical note-Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.
Copyright is held by the owner/author(s).
- threat modelling
Chowdhury, S., Ferdous, M. S. & Jose, J. M., 12 Sep 2016, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16. New York, NY (US): ACM, p. 553-558 6 p.
Research output: Chapter in Book/Report/Conference proceeding › Conference publication