메뉴 건너뛰기




Volumn 32, Issue 1, 2016, Pages 4-15

The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective

Author keywords

Australian Privacy Principles (APPs); Authentication; Hacking risk; Individual privacy; Internet of Things; Privacy legislation; Security; Surveillance and ubiquity

Indexed keywords

AUTHENTICATION; DATA ACQUISITION; INTERNET; INTERNET OF THINGS; NETWORK SECURITY; PERSONAL COMPUTING; SECURITY OF DATA;

EID: 84957841635     PISSN: 02673649     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.clsr.2015.12.001     Document Type: Article
Times cited : (102)

References (61)
  • 1
    • 84898043733 scopus 로고    scopus 로고
    • Charting past, present, and future research in ubiquitous computing
    • G.D. Abowd, and E.D. Mynatt Charting past, present, and future research in ubiquitous computing ACM Trans Comput Hum Interact 7 1 2000 29 58
    • (2000) ACM Trans Comput Hum Interact , vol.7 , Issue.1 , pp. 29-58
    • Abowd, G.D.1    Mynatt, E.D.2
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: a survey
    • L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput Netw 54 2010 2787 2805
    • (2010) Comput Netw , Issue.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 4
    • 84870318243 scopus 로고    scopus 로고
    • Semantics for the internet of things: early progress and back to the future
    • P. Barnaghi, Wang W., C. Henson, and K. Taylor Semantics for the internet of things: early progress and back to the future Int J Semantic Web Inf Syst 8 1 2012 1 21
    • (2012) Int J Semantic Web Inf Syst , vol.8 , Issue.1 , pp. 1-21
    • Barnaghi, P.1    Wang, W.2    Henson, C.3    Taylor, K.4
  • 6
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A.R. Beresford, and F. Stajano Location privacy in pervasive computing Pervasive Comput IEEE 2 1 2003 46 55
    • (2003) Pervasive Comput IEEE , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 9
    • 17444413736 scopus 로고    scopus 로고
    • Privacy in pervasive computing environments-a contradiction in terms?
    • J. Cas Privacy in pervasive computing environments-a contradiction in terms? Technol Soc Mag IEEE 24 1 2005 24 33
    • (2005) Technol Soc Mag IEEE , vol.24 , Issue.1 , pp. 24-33
    • Cas, J.1
  • 10
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan, and A. Perrig Security and privacy in sensor networks Computer 36 10 2003 103 105
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 11
    • 84859979325 scopus 로고    scopus 로고
    • Asia and South Pacific design automation conference (ASP-DAC), Issue 17
    • Chen Y.K. Challenges and opportunities of internet of things Asia and South Pacific design automation conference (ASP-DAC), Issue 17 2012 383 388
    • (2012) Challenges and Opportunities of Internet of Things , pp. 383-388
    • Chen, Y.K.1
  • 12
    • 0039456088 scopus 로고    scopus 로고
    • Internet privacy concerns confirm the case for intervention
    • R. Clarke Internet privacy concerns confirm the case for intervention Commun ACM 42 2 1999 60 67
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 60-67
    • Clarke, R.1
  • 15
    • 33646948585 scopus 로고    scopus 로고
    • Research ethics and data quality: the implications of informed consent
    • G. Crow, R. Wiles, S. Heath, and V. Charles Research ethics and data quality: the implications of informed consent Int J Soc Res Methodol 9 2 2006 83 95
    • (2006) Int J Soc Res Methodol , vol.9 , Issue.2 , pp. 83-95
    • Crow, G.1    Wiles, R.2    Heath, S.3    Charles, V.4
  • 16
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
    • M.J. Culnan, and P.K. Armstrong Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation Organ Sci 10 1 1999 104 115
    • (1999) Organ Sci , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.J.1    Armstrong, P.K.2
  • 17
    • 84904152379 scopus 로고    scopus 로고
    • Misuse resistant parallel authenticated encryptions
    • Springer International Publishing Chicago
    • N. Datta, and M. Nandi Misuse resistant parallel authenticated encryptions Information security and privacy 2014 Springer International Publishing Chicago 306 321
    • (2014) Information Security and Privacy , pp. 306-321
    • Datta, N.1    Nandi, M.2
  • 18
    • 31044453562 scopus 로고    scopus 로고
    • "lost in translation"?: intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in Asia)
    • C. Ess "Lost in translation"?: intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in Asia) Ethics Inf Technol 7 1 2005 1 6
    • (2005) Ethics Inf Technol , vol.7 , Issue.1 , pp. 1-6
    • Ess, C.1
  • 19
    • 78650942089 scopus 로고    scopus 로고
    • Vision and challenges for realising the internet of things
    • Publications Office of the European Union Luxembourg
    • European Commission (ISM) Vision and challenges for realising the internet of things CERP-IoT - cluster of European research projects on the internet of things 2010 Publications Office of the European Union Luxembourg 1 230
    • (2010) CERP-IoT - Cluster of European Research Projects on the Internet of Things , pp. 1-230
  • 24
    • 84957854760 scopus 로고    scopus 로고
    • Data quality, database fragmentation and information privacy
    • M.R. Gibbs, G. Shanks, and R. Lederman Data quality, database fragmentation and information privacy Surveill Soc 3 1 2002
    • (2002) Surveill Soc , vol.3 , Issue.1
    • Gibbs, M.R.1    Shanks, G.2    Lederman, R.3
  • 26
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): A vision, architectural elements, and future directions Future Generation Comput Syst 29 7 2013 1645 1660
    • (2013) Future Generation Comput Syst , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 29
    • 2442557513 scopus 로고    scopus 로고
    • Modeling privacy control in context-aware systems
    • Jiang X., and J.A. Landay Modeling privacy control in context-aware systems Pervasive Comput IEEE 1 3 2002 59 63
    • (2002) Pervasive Comput IEEE , vol.1 , Issue.3 , pp. 59-63
    • Jiang, X.1    Landay, J.A.2
  • 30
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • L. Kagal, T. Finin, and A. Joshi Trust-based security in pervasive computing environments Computer 34 12 2001 154 157
    • (2001) Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 31
    • 0010602271 scopus 로고    scopus 로고
    • System software for ubiquitous computing
    • T. Kindberg, and A. Fox System software for ubiquitous computing Pervasive Comput IEEE 1 1 2002 70 81
    • (2002) Pervasive Comput IEEE , vol.1 , Issue.1 , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 33
    • 84904202504 scopus 로고    scopus 로고
    • TMDS: thin-model data sharing scheme supporting keyword search in cloud storage
    • Springer International Publishing Chicago
    • Liu Z., Li J., Chen X., Yang J., and Jia C. TMDS: thin-model data sharing scheme supporting keyword search in cloud storage Information security and privacy 2014 Springer International Publishing Chicago 115 130
    • (2014) Information Security and Privacy , pp. 115-130
    • Liu, Z.1    Li, J.2    Chen, X.3    Yang, J.4    Jia, C.5
  • 35
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model
    • N.K. Malhotra, S.S. Kim, and J. Agarwal Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model Inform Syst Res 15 4 2004 336 355
    • (2004) Inform Syst Res , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 36
    • 55249097295 scopus 로고
    • Four ethical issues of the information age
    • R.O. Mason Four ethical issues of the information age MISQ 1986 5 12
    • (1986) MISQ , pp. 5-12
    • Mason, R.O.1
  • 38
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in an information age: the problem of privacy in public
    • H. Nissenbaum Protecting privacy in an information age: the problem of privacy in public Law Philos 17 5 1998 559 596
    • (1998) Law Philos , vol.17 , Issue.5 , pp. 559-596
    • Nissenbaum, H.1
  • 44
    • 84896918069 scopus 로고    scopus 로고
    • Guidelines for internet of things deployment approaches-the thing commandments
    • E. Oriwoh, P. Sant, and G. Epiphaniou Guidelines for internet of things deployment approaches-the thing commandments Procedia Comput Sci 21 2013 122 131
    • (2013) Procedia Comput Sci , Issue.21 , pp. 122-131
    • Oriwoh, E.1    Sant, P.2    Epiphaniou, G.3
  • 45
    • 64849115259 scopus 로고    scopus 로고
    • Identities in the future internet of things
    • A.C. Sarma, and G. João Identities in the future internet of things Wireless Pers Commun 3 49 2009 353 363
    • (2009) Wireless Pers Commun , vol.3 , Issue.49 , pp. 353-363
    • Sarma, A.C.1    João, G.2
  • 47
    • 0035428427 scopus 로고    scopus 로고
    • Pervasive computing: vision and challenges
    • M. Satyanarayanan Pervasive computing: vision and challenges Pers Commun IEEE 8 4 2001 10 17
    • (2001) Pers Commun IEEE , vol.8 , Issue.4 , pp. 10-17
    • Satyanarayanan, M.1
  • 48
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: an interdisciplinary review
    • H.J. Smith, T. Dinev, and Xu H. Information privacy research: an interdisciplinary review MISQ 35 4 2011 989 1016
    • (2011) MISQ , vol.35 , Issue.4 , pp. 989-1016
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 49
    • 84900078964 scopus 로고    scopus 로고
    • Responsibility for information assurance and privacy: a problem of individual ethics?
    • B.C. Stahl Responsibility for information assurance and privacy: a problem of individual ethics? Adv Top End User Comput 4 4 2005 186
    • (2005) Adv Top End User Comput , vol.4 , Issue.4 , pp. 186
    • Stahl, B.C.1
  • 50
    • 3042803767 scopus 로고    scopus 로고
    • Pervasive computing goes the last hundred feet with RFID systems
    • V. Stanford Pervasive computing goes the last hundred feet with RFID systems Pervasive Comput IEEE 2 2 2003 9 14
    • (2003) Pervasive Comput IEEE , vol.2 , Issue.2 , pp. 9-14
    • Stanford, V.1
  • 51
    • 13844272147 scopus 로고    scopus 로고
    • Technology, security, and individual privacy: new tools, new threats, and new public perceptions
    • L.S. Strickland, and L.E. Hunt Technology, security, and individual privacy: new tools, new threats, and new public perceptions J Am Soc Inf Sci Technol 56 3 2005 221 234
    • (2005) J Am Soc Inf Sci Technol , vol.56 , Issue.3 , pp. 221-234
    • Strickland, L.S.1    Hunt, L.E.2
  • 52
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • L. Sweeney Achieving k-anonymity privacy protection using generalization and suppression Int J Uncertain Fuzziness Knowledge Based Syst 10 5 2002 571 588
    • (2002) Int J Uncertain Fuzziness Knowledge Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 53
    • 84876830574 scopus 로고    scopus 로고
    • The pursuit of privacy in a world where information control is failing
    • A. Thierer The pursuit of privacy in a world where information control is failing Harv J Law Public Policy 36 2013 409 1245
    • (2013) Harv J Law Public Policy , vol.36 , pp. 409-1245
    • Thierer, A.1
  • 56
    • 71649095641 scopus 로고    scopus 로고
    • Internet of things-Need for a new legal environment?
    • R.H. Weber Internet of things-Need for a new legal environment? Comput Law Secur Rev 25 6 2009 522 527
    • (2009) Comput Law Secur Rev , vol.25 , Issue.6 , pp. 522-527
    • Weber, R.H.1
  • 57
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • R.H. Weber Internet of things-new security and privacy challenges Comput Law Secur Rev 1 26 2010 23 30
    • (2010) Comput Law Secur Rev , vol.1 , Issue.26 , pp. 23-30
    • Weber, R.H.1
  • 58
    • 79953100622 scopus 로고    scopus 로고
    • Accountability in the internet of things
    • R.H. Weber Accountability in the internet of things Comput Law Secur Rev 2 27 2011 133 138
    • (2011) Comput Law Secur Rev , vol.2 , Issue.27 , pp. 133-138
    • Weber, R.H.1
  • 59
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • M. Weiser Some computer science issues in ubiquitous computing Commun ACM 36 7 1993 75 84
    • (1993) Commun ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 60
    • 84885391260 scopus 로고
    • Privacy and Freedom
    • A.F. Westin Privacy and Freedom 25 Wash. & Lee L. Rev 166 1968 http://scholarlycommons.law.wlu.edu/wlulr/vol25/iss1/20
    • (1968) 25 Wash. & Lee L. Rev , vol.166
    • Westin, A.F.1
  • 61
    • 84874109016 scopus 로고    scopus 로고
    • Location-aware private service discovery in pervasive computing environment
    • Yu C., Yao D., Li X., Zhang Y., Yang L.T., Xiong N., and et al. Location-aware private service discovery in pervasive computing environment Inf Sci (Ny) 230 2013 78 93
    • (2013) Inf Sci (Ny) , vol.230 , pp. 78-93
    • Yu, C.1    Yao, D.2    Li, X.3    Zhang, Y.4    Yang, L.T.5    Xiong, N.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.