Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering

By Fritsch, Lothar | Journal of Theoretical and Applied Electronic Commerce Research, December 2007 | Go to article overview

Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering


Fritsch, Lothar, Journal of Theoretical and Applied Electronic Commerce Research


Abstract

This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data protection experts. Designers of location-based services (LBS) create infrastructures for business or application specific purposes. They have profit-oriented views on the rationale for PET deployment. Finally, users have requirements that might be neither on the PET community's nor on the business people's agenda. Many disciplines provide knowledge about the construction of community-spanning information systems. The challenge for designers of infrastructures and applications is to find a consensus that models all stakeholders' interests - and takes advantage all involved community's knowledge.

This paper groups LBS stakeholders into a framework based onto a sociological knowledge construct called "boundary object". For this purpose, a taxonomical analysis of publications in the stakeholder communities is performed. Then the paper proposes a socio-technical approach. Its goal is to find a suitable privacy design for a LBS infrastructure based on the boundary object. Topics for further interdisciplinary research efforts are identified and proposed for discussion.

Key words: Privacy design, location, mobile infrastructures, requirements engineering, boundary objects.

1 Introduction

The purpose of this work is to show how to design mobile communication infrastructures in a way that they respect privacy and fulfill user and operator requirements. In particular, the process focuses on the interdisciplinary feasibility of the resulting infrastructure with respect to the business model.

Information systems cross one more border into our personal and private lives by measuring our personal context. In providing context-based, situation-dependant services, human beings are being equipped with technology measuring their daily lives to provide computerized services to them. One kind of context information collected and used in such services is a person's location, determined through the position of the person's mobile telephone. Location-based services (LBS) based on wireless networks can position users with their mobile equipment. LBS business models are seen as an important application for mobile operators and the online services industry. A new challenge is the ubiquity of the infrastructure. By positioning a mobile phone, users can be tracked and profiled all day in all places with network coverage. This poses new service opportunities, but also creates a new class of risk towards privacy. Now many service providers can track an individual, while the existing data protection laws were drafted for protection against centralized infrastructures. As an approach to the privacy dilemma, cryptographers and data protection specialists suggest the use of privacy-enhancing technology (PET). PET development has been technology-centric, detached from business requirements and cost-of-ownership. With the deployment of ubiquitous infrastructures, the analysis and deployment of privacy-friendly infrastructures might stimulate adoption of the new applications against strong privacy concerns that are being voiced by researchers and privacy advocates.

This text presents a process about how design a privacy-friendly on-line infrastructure. This process is to be used for information infrastructure development. The example for such information systems will be LBS. The focus of my analysis is the intersection of economic theory, system design and PET to create information systems that have the properties of privacy-friendliness, efficiency, and value creation. In Figure 1, the steps of the design process are introduced. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.