{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:24:48Z","timestamp":1760243088318,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2015,6,16]],"date-time":"2015-06-16T00:00:00Z","timestamp":1434412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper presents a proof of concept from which the metaphor of \u201cfair trade\u201d is validated as an alternative to manage the private information of users. Our privacy solution deals with user\u2019s privacy as a tradable good for obtaining environmental services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and transaction registry mechanisms, enhances users\u2019 confidence in the system while encouraging them to share their information, with the consequent benefit for the community. The study results are promising considering the user responses regarding the usefulness, ease of use, information classification and perception of control with the mechanisms proposed by the metaphor.<\/jats:p>","DOI":"10.3390\/s150614207","type":"journal-article","created":{"date-parts":[[2015,6,16]],"date-time":"2015-06-16T10:28:09Z","timestamp":1434450489000},"page":"14207-14229","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation"],"prefix":"10.3390","volume":"15","author":[{"given":"Abraham","family":"Esquivel","sequence":"first","affiliation":[{"name":"Instituto Tecnol\u00f3gico Superior Zacatecas Norte, R\u00edo Grande (Zac) 98400, Mexico"}]},{"given":"Pablo","family":"Haya","sequence":"additional","affiliation":[{"name":"Instituto de Ingenier\u00eda del Conocimiento, Universidad Aut\u00f3noma de Madrid, Madrid 28049, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5607-6165","authenticated-orcid":false,"given":"Xavier","family":"Alam\u00e1n","sequence":"additional","affiliation":[{"name":"Escuela Polit\u00e9cnica Superior, Universidad Aut\u00f3noma de Madrid, C. Francisco Tom\u00e1s y Valiente. 11, Madrid 28049, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2015,6,16]]},"reference":[{"key":"ref_1","unstructured":"Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, D., and Yi, S. (2002, January 2\u20135). Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. Vienna, Austria."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bellotti, V., and Sellen, A. (1993, January 13\u201317). Design for Privacy in Ubiquitous Computing Environments. Milano, Italy.","DOI":"10.1007\/978-94-011-2094-4_6"},{"key":"ref_3","first-page":"2","article-title":"Privacy: The Achilles Heel of Pervasive Computing","volume":"1","author":"Satyanarayanan","year":"2003","journal-title":"IEEE Distrib. Syst. Online"},{"key":"ref_4","unstructured":"Shen, Y., and Pearson, S. (2011). Privacy Enhancing Technologies: A Review, HP Labs. Technical Report HPL-2011-113."},{"key":"ref_5","unstructured":"Wang, Y., and Kobsa, A. (2008). Handbook of Research on Social and Organizational Liabilities in Information Security, IGI Global."},{"key":"ref_6","unstructured":"Danezis, G., and G\u00fcrses, S. (2010, January 13\u201315). A critical review of 10 years of privacy technology. London, UK."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","article-title":"A taxonomy of privacy","volume":"3","author":"Solove","year":"2006","journal-title":"Univ. PA Law Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MPRV.2003.1186716","article-title":"The Dark Side of Pervasive Computing","volume":"1","author":"Stone","year":"2003","journal-title":"IEEE Perv. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Palen, L, and Dourish, P. (2003, January 5\u201310). Unpacking privacy for a networked world. Ft. Lauderdale, FL, USA.","DOI":"10.1145\/642611.642635"},{"key":"ref_10","unstructured":"Krumm, J. (2009). Ubiquitous Computing Fundamentals, CRC Press."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Cardoso, R.S., and Issarny, V. (2007, January 6\u20139). Architecting pervasive computing systems for privacy: A survey. Mumbai, India.","DOI":"10.1109\/WICSA.2007.11"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1509\/jppm.19.1.20.16944","article-title":"Protecting Privacy Online: Is Self-Regulation Working?","volume":"19","author":"Culnan","year":"2000","journal-title":"J. Public Policy Market."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Palen, L., and Dourish, P. (2003, January 5\u201310). Unpacking \u201cprivacy\u201d for a networked world. Ft. Lauderdale, FL, USA.","DOI":"10.1145\/642611.642635"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MTAS.2005.1407744","article-title":"Privacy in pervasive computing environments\u2013A contradiction in terms?","volume":"24","author":"Cas","year":"2005","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref_15","unstructured":"Langheinrich, M. (2005). Personal Privacy in Ubiquitous Computing: Tools and System Support. [Ph.D. Thesis, ETH Z\u00fcrich]."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","article-title":"Personal privacy through understanding and action: Five pirfalls for designers","volume":"8","author":"Lederer","year":"2004","journal-title":"Pers. Ubiquit. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","article-title":"Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy","volume":"63","author":"Price","year":"2005","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"ref_18","unstructured":"Tschofenig, H., Schulzrinne, H., Newton, A., Peterson, J., and Mankin, A. (2006, January 17\u201318). The IETF Geopriv and Presence Architecture Focusing on Location Privacy. San Diego, CA, USA."},{"key":"ref_19","unstructured":"Bag\u00fc\u00e9s, S.A., Mitic, J., and Emberger, E.A. (2007, January 17\u201321). The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environments. Nice, France."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Shelat, A., Sommer, D., Fischer-H\u00fcbner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., and Tseng, J. (2005, January 11). Privacy and Identity Management for Everyone. Fairfax, VA, USA.","DOI":"10.1145\/1102486.1102491"},{"key":"ref_21","unstructured":"Mackay, W.E. (, January January). Spontaneous Interaction in Virtual Multimedia Space: EuroPARC's RAVE System. Monte Carlo, Monaco."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","article-title":"A Privacy Awareness System for Ubiquitous Computing Environments","volume":"2498","author":"Langheinrich","year":"2002","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Pareschi, L., Riboni, D., Agostini, A., and Bettini, C. (2008, January 17\u201321). Composition and Generalization of Context Data for Privacy Preservation. Hong Kong, China.","DOI":"10.1109\/PERCOM.2008.47"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Pareschi, L., Riboni, D., and Bettini, C. (2008, January 17\u201321). Protecting Users' Anonymity in Pervasive Computing Environments. Hong Kong, China.","DOI":"10.1109\/PERCOM.2008.58"},{"key":"ref_25","unstructured":"Roussaki, I., Strimpakou, M., Pils, C., Kalatzis, N., Neubauer, M., Hauser, C., and Anagnostou, M. (2006, January 26\u201329). Privacy-Aware Modelling and Distribution of Context Information in Pervasive Service Provision. Lyon, France."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Papadopoulou, E., McBurney, S., Taylor, N., Williams, M.H., Dolinar, K., and Neubauer, M. (2008, January 13\u201318). Using User Preferences to Enhance Privacy in Pervasive Systems. Cancun, M\u00e9xico.","DOI":"10.1109\/ICONS.2008.46"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Asif, K.M., Ahamed, S.I., and Talukder, N. (2007, January 23\u201327). Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. Beijing, China.","DOI":"10.1109\/COMPSAC.2007.84"},{"key":"ref_28","first-page":"217","article-title":"Taxonomy of Mixes and Dummy Traffic","volume":"148","author":"Diaz","year":"2004","journal-title":"IFIP Int. Fed. Inf. Process."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/11558859_3","article-title":"Provable Anonymity for Networks of Mixes","volume":"3727","author":"Klonowski","year":"2005","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_30","unstructured":"Hengartner, U., and Steenkiste, P. (2003, January 18\u201321). Access Control to Information in Pervasive Computing Environments. Lihue, HI, USA."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Hengartner, U., and Steenkiste, P. (2005, January 5\u20139). Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Athens, Greece.","DOI":"10.21236\/ADA457869"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Reilly, D., Salimian, M., MacKay, B., Mathiansen, N., Edwards, K., and Franz, J. (2014, January 17\u201320). SecSpace: Prototyping Usable Privacy and Security for Mixed Reality Collaborative Environments. Rome, Italy.","DOI":"10.1145\/2607023.2607039"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPRV.2014.22","article-title":"A Secure Supply-Chain RFID System that Respects Your Privacy","volume":"13","author":"Arbit","year":"2014","journal-title":"IEEE Perv. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"21","DOI":"10.5383\/JUSPN.05.02.004","article-title":"Privacy Management Solution in Ubiquitous Environments Using Percontrol","volume":"5","author":"Leithardt","year":"2014","journal-title":"J. Ubiquit. Syst. Pervas. Netw."},{"key":"ref_35","first-page":"285","article-title":"Exploiting space and location as a design framework for interactive mobile systems","volume":"CHI 7","author":"Dix","year":"2000","journal-title":"ACM Trans."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","article-title":"Understanding and Using Context","volume":"5","author":"Dey","year":"2001","journal-title":"Pers. Ubiquit. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/176789.176796","article-title":"How might people interact with agents","volume":"37","author":"Norman","year":"1994","journal-title":"CACM"},{"key":"ref_38","first-page":"31","article-title":"Agents that Reduce Work and Information Overload","volume":"37","author":"Maez","year":"1994","journal-title":"CACM"},{"key":"ref_39","unstructured":"Westin, A.F. (1967). Privacy and Freedom, Athenaeum."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Haya, PA., Montoro, G., and Alam\u00e1n, X. (2004, January 25\u201329). A Prototype of a Context-Based Architecture for Intelligent Home Environemts. Agia Napa, Cyprus.","DOI":"10.1007\/978-3-540-30468-5_30"},{"key":"ref_41","unstructured":"Engelmore, R., and Morgan, T. (1988). Blackboard Systems, Addison-Wesley."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1007\/978-3-540-76890-6_6","article-title":"Managing Pervasive Environment Privacy Using the \u201cFair Trade\u201d Metaphor","volume":"Volume 4806","author":"Esquivel","year":"2007","journal-title":"On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/6\/14207\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:47:57Z","timestamp":1760215677000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/6\/14207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,16]]},"references-count":42,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2015,6]]}},"alternative-id":["s150614207"],"URL":"https:\/\/doi.org\/10.3390\/s150614207","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2015,6,16]]}}}