Access the full text.
Sign up today, get DeepDyve free for 14 days.
H. Haddadi, H. Howard, Amir Chaudhry, J. Crowcroft, Anil Madhavapeddy, R. Mortier (2015)
Personal Data: Thinking Inside the BoxArXiv, abs/1501.04737
Yves-Alexandre Montjoye, Sam Wang, A. Pentland (2012)
On the Trusted Use of Large-Scale Personal DataIEEE Data Eng. Bull., 35
Derek McAuley, R. Mortier, James Goulding (2011)
The Dataware manifesto2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
(2016)
Why a push for online privacy is bogged down in Washington
(2010)
Opinion 3/2010 on the principle of accountability
Dear Sotiropoulos (2013)
ARTICLE 29 Data Protection Working Party
J. Manyika, Michael Chui, Peter Bisson, Jonathan Woetzel, R. Dobbs, J. Bughin, D. Aharon (2015)
The internet of things: mapping the value beyond the hype
P. Dourish, G. Button (1998)
On "Technomethodology": Foundational Relationships Between Ethnomethodology and System DesignHum. Comput. Interact., 13
Rethinking personal data: a new lens for strengthening trust
Internet of everything: algorithms, methodologies, technologies and perspectives
Y Montjoye, S Wang, A Pentland (2012)
On the trusted use of large-scale personal dataBull IEEE Tech Comm Data Eng, 35
(2013)
Opinion 03/2013 on purpose limitation.
(2016)
NSFworkshopreportongrandchallenges inedgecomputing
(2015)
Personal datastores
Md. Mahmud, R. Buyya (2016)
Fog Computing: A Taxonomy, Survey and Future DirectionsArXiv, abs/1611.05539
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, Lanyu Xu (2016)
Edge Computing: Vision and ChallengesIEEE Internet of Things Journal, 3
J. Ziegeldorf, Óscar García-Morchón, Klaus Wehrle (2014)
Privacy in the Internet of Things: threats and challengesArXiv, abs/1505.07683
(2017)
Processing Personal Data Fairly and Lawfully (Principle 1)
R. Gellman (2017)
Fair Information Practices: A Basic History - Version 2.20Social Science Research Network
(2015)
Internet of things: privacy and security in a connected World
Databox
(2017)
Node Red
Adam Croom (2017)
MyData - A Nordic Model for human-centered personal data management and processing
Agustí Parera, Xavier Costa (2018)
General Data Protection RegulationData Protection Law in the EU: Roles, Responsibilities and Liability
Anil Madhavapeddy, Dave Scott (2013)
Unikernels: Rise of the Virtual Library Operating SystemQueue, 11
(2015)
Hubofallthings
Yousef Amar, H. Haddadi, R. Mortier (2016)
Privacy-Aware Infrastructure for Managing Personal DataProceedings of the 2016 ACM SIGCOMM Conference
Andy Crabtree, R. Mortier (2015)
Human Data Interaction: Historical Lessons from Social Studies and CSCW
(2015)
Hub of all things. Digital Leaders
(2014)
Policy outline of the institutional revision for utilization of personal data
Toni Robertson, I. Wagner (2015)
CSCW and the Internet of Things
R. Mortier, Jianxin Zhao, J. Crowcroft, Liang Wang, Qi Li, H. Haddadi, Yousef Amar, Andy Crabtree, James Colley, T. Lodge, Tosh Brown, Derek McAuley, C. Greenhalgh (2016)
Personal Data Management with the Databox: What's Inside the Box?Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking
T. Jones (2008)
Accountability and governance
Y. Montjoye, E. Shmueli, Sam Wang, A. Pentland (2014)
openPDS: Protecting the Privacy of Metadata through SafeAnswersPLoS ONE, 9
Anil Madhavapeddy, David Scott (2013)
Unikernels: the rise of the virtual library operating systemCommun. ACM, 57
(2016)
The necessity of edge computing with the internet of things
(2017)
DataProtection2017USA
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT) accountable to individuals. Accountability is a key to building consumer trust and is mandated by the European Union’s general data protection regulation (GDPR). We focus here on the ‘external’ data subject accountability requirement specified by GDPR and how meeting this requirement turns on surfacing the invisible actions and interactions of connected devices and the social arrangements in which they are embedded. The IoT Databox model is proposed as an in principle means of enabling accountability and providing individuals with the mechanisms needed to build trust into the IoT.
Journal of Reliable Intelligent Environments – Springer Journals
Published: Jan 27, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.