Annotated Biography Mediums and Technologies – Source 2
Link: http://link.springer.com/chapter/10.1007%2F978-3-642-36071-8_28
Reference:
Nayak, Swamy, Ramaswamy, D.N, M.V.S, S.R, 2010. Supporting Location Information Privacy in Mobile Devices. 1st ed. 9th International Conference, ICDCIT 2013, Bhubaneswar, India,: Springer Berlin Heidelberg. pp 361-372
This article explores the growing issue of manipulation that may take place in a company’s aim to obtain information about a user of a smart wearable device for advertising purposes. The article outlines that such manipulations arise from an exploitation of user complacency. The article clarifies ‘complacency’ as the ignorance of what goes on behind the initial façade of the devices advertised function. The article then goes on to posit a software architecture designed to minimalize this breach of user rights.
This outlines a very pertinent issue to our subject of focus; the amount device and software manufacturers can get away with unbeknownst to the user. The information contained in this text will be useful in formulating questions for a planned interview highlighting the public perception of such practices.
Though possessing many useful points, the articles culminating thesis ( the technicalities of software construction to remedy the situation of user lack of privacy) moves beyond the scope and aims of our research topic. The fact that such an effort to correct the issue of user privacy is taking place is useful, but the sheer detail the article goes into regarding technicalities is not of use.