Academia.eduAcademia.edu

Outline

Ambient Intelligence Environments: Focus on a Human

Abstract

For the past few decades people have faced a dramatic technological development. One of the new technologies that are predicted to be massively widespread in the future is Ambient Intelligence. One can imagine Ambient Intelligence as an environment with embedded sensors enabling the environment to anticipate wishes of its users and to adapt itself accordingly. Development and utilization of such environments, however, entail new threats. The aim of this paper is to identify these threats and the dangers resulting from the need to collect and further process all kinds of data in order to provide highly personalized services.

References (30)

  1. Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Mishra, N., Motwani, R., Srivastava, U., Thomas, D., Widom, J. & Xu, Y. 2004, 'Vision Paper: Enabling Privacy for the Paranoids', VLDB Endowment Inc., http://www.vldb.org/ conf/2004/RS19P1.PDF. Accessed 5 August 2008.
  2. Augusto, J. C. & McGullagh, P. 2007, 'Ambient Intelligence: Concepts and Ap- plications', Int'l J. Computer Science and Information Systems, vol. 4, no. 1, pp. 1-28.
  3. Avižienis, A., Laprie, J. C., Randell, B. & Landwehr, C. 2004, 'Basic Concepts and Taxonomy of Dependable and Secure Computing', IEEE Transactions on Depend- able and Secure Computing, vol. 1, no. 1, pp. 11-33.
  4. Bygrave, L. A. 2002, Data Protection Law: Approaching Its Rationale, Logic and Limits, Kluwer Law International, Hague.
  5. Cai, Y. (ed) 2005, Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems, Springer-Verlag, Berlin, Heidelberg.
  6. zompagna, L., El Khoury, P., Krausová, A., Massacci, F. & Zannone, N. 2008, 'How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns', Artificial Intelligence and Law, doi: 10.1007/s10506-008-9067-3
  7. Compagna, L., El Khoury, P., Massacci, F., Thomas, R. & Zannone, N. 2007, 'How to capture, model, and verify the knowledge of legal, security, and privacy ex- perts: a pattern-based approach', The Eleventh International Conference on Artificial Intelligence and Law (Proceedings of the Conference, Stanford CA, USA, June 4-8, 2007), pp. 149-153.
  8. Escuredo-Pascual, A. & Hosein, I. 2004, 'Questioning Lawful Access to Traffic Data', Communications of the ACM, vol. 47, no. 3, pp. 77-82.
  9. FP7 ICT Advisory Group 2008, 'Working Group Report on ICT and Sustainabil- ity (including Energy and Environment)'. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/sustainability-istag_en.pdf. Accessed 21 Au- gust 2008
  10. Gadzheva, M. 2008, 'Privacy in the Age of Transparency: The New Vulnerabil- ity of the Individual', Social Science Computer Review, vol. 26, no. 1, pp. 60-74.
  11. Gruetser, M., Schelle, G., Jain, A., Han, R. & Grunwald, D. 2003, Privacy-Aware Location Sensor Networks. http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.pdf. Accessed 5 August 2008.
  12. Hoofnagle, C. J. 2005, 'Privacy Self Regulation: A Decade of Disappointment', SSRN Electronic Library, http://ssrn.com/abstract=650804. Accessed 18 July 2008.
  13. IST Advisory Group 1999, Orientations for Workprogramme 2000 and beyond, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-99-final.pdf. Accessed 21 Au- gust 2008.
  14. IST Advisory Group 2002, Software technologies, embedded systems and dis- tributed systems: A European strategy towards an Ambient Intelligent environment, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402472encfull.pdf. Ac- cessed 21 August 2008.
  15. IST Advisory Group 2002, Trust, dependability, security and privacy for IST in FP6, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402464encfull.pdf. Ac- cessed 21 August 2008.
  16. IST Advisory Group 2003, Ambient Intelligence: From Vision to Reality, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-ist2003_consolidated_report.p- df. Accessed 16 July 2008.
  17. IST Advisory Group 2004, Experience and Application Research: Involving Users in the Development of Ambient Intelligence, ISTweb, ftp://ftp.cord- is.europa.eu/pub/ist/docs/2004_ear_web_en.pdf. Accessed 21 August 2008.
  18. IST Advisory Group 2006, ISTAG Report on Shaping Europe's Future Through ICT, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-shaping-europe-future-ict- march-2006-en.pdf. Accessed 21 August 2008.
  19. IST Advisory Group 2006, ISTAG Report on Orientations for Work Programme in FP7, ISTweb, ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-wp-wg-report-ver- final_en.pdf. Accessed 21 August 2008.
  20. Pedersen, D. M. 1997, 'Psychological Functions of Privacy', Journal of Environ- mental Psychology, vol. 17, no. 2, pp. 147-156.
  21. Perrig, A., Stankovic, J. & Wagner, D. 2004, 'Security in Wireless Sensor Net- works', Communications of the ACM, vol. 47, no. 6, pp. 53-57.
  22. Saraogi, M. 2005, Security in Wireless Sensor Networks, http://www.cs.utk.edu/ ~saraogi/594paper.pdf. Accessed 5 August 2008
  23. SERENITY Project, A1 Deliverable -A1.D3.1 -Initial Set of Security and Pri- vacy Patterns at Organizational Level, EU-IST-IP 6th Framework Programme - SERENITY 27587, http://www.serenity-forum.org/IMG/pdf/A1.D3.1_patterns_at_or- ganizational_level_v1.3_final.pdf. Accessed 2 January 2009.
  24. SERENITY Project, A7 Deliverable -A7.D1.1 -Scenario Selection and Definiti- on, EU-IST-IP 6th Framework Programme -SERENITY 27587, http://www.serenity- forum.org/IMG/zip/A7_1_.D1.1_scenarios_v1.1_final.zip. Accessed 2 January 2009.
  25. SERENITY Project, Securing Smart Home: How SERENITY Patterns Enforce Security in Remote Healthcare Systems, http://www.serenity-forum.org/IMG/pdf/ serenity_leaflet08_web.pdf. Accessed 25 November 2008.
  26. Solove, D. J. 2005, 'The New Vulnerability: Data Security and Personal Informa- tion', SSRN Electronic Library, http://ssrn.com/abstract=583483. Accessed 15 May 2008.
  27. Solove, D. J. 2008, Understanding Privacy, Harvard University Press, London.
  28. Spiekermann, S. 2005, 'Perceived Control: Scales for Privacy in Ubiquitous Computing', SSRN Electronic Library, http://ssrn.com/abstract=761109. Accessed 15 May 2008.
  29. Stankovic, J. A., Cao, Q., Doan, T., Fang, L., He, Z., Kiran, R., Lin, S., Son, S., Stoleru, R. & Wood, A. 2005, Wireless Sensor Networks for In-Home Healthcare: Po- tential and Challenges, http://faculty.cs.tamu.edu/stoleru/papers/stankovic05wsn.p- df. Accessed 5 August 2008.
  30. Wahlgren, P. 1992, Automation of Legal Reasoning: A Study on Artificial Intel- ligence, Kluwer Law and Taxation Publishers, Deventer.