Abstract
The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of individuals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This contribution presents an analysis of ambient intelligence scenarios, particularly in regard to AmI’s impacts on and implications for individual privacy. The analysis draws on our review of more than 70 AmI projects, principally in Europe. It notes the visions as well as the specifics of typical AmI scenarios. Several conclusions can be drawn from the analysis, not least of which is that most AmI scenarios depict a rather too sunny view of our technological future. Finally, reference is made to the SWAMI project (Safeguards in a World of Ambient Intelligence) which, inter alia, has constructed ”dark” scenarios, as we term them, to show how things can go wrong in AmI and where safeguards are needed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IST Advisory Group, Ducatel, K., Bogdanovicz, M., Scapolo, F., Leijten, J., Burgelman, J.C.: Scenarios for ambient intelligence in 2010. Institute for Prospective Technological Studies (IPTS), Seville (2001), http://www.cordis.lu/ist/istag-reports.htm
Punie, Y.: The future of ambient intelligence in Europe: The need for more everyday life. Communications and Strategies 57, 141–165 (2005)
Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM 36, 75–85 (1993)
Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Living in a world of smart everyday objects: Social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment 10, 763–786 (2004)
Ackerman, M.S.: Privacy in pervasive environments: Next generation labelling protocols. Personal and Ubiquitous Computing 8, 430–439 (2004)
Åkesson, K.P., Humble, J., Crabtree, A., Bullock, A.: Usage and development scenarios for the tangible toolbox. ACCORD Deliverable D1.3, Swedish Institute of Computer Science (2001), http://www.sics.se/accord/plan/del/D1.3.pdf
Aschmoneit, P., Höbig, M.: Context-aware collaborative environments for next generation business networks: Scenario document. COCONET Deliverable D 2.2, Telematica Institute (2002), http://coconet.telin.nl/
Harrop, P.: Item level RFID: The business benefits of the ”tag everything” scenario. IDTechEx Ltd., Cambridge (2005)
ITEA: ITEA technology roadmap for software-intensive systems, 2nd edn. Information Technology for European Advancement (ITEA) Office Association (2004), http://www.itea-office.org
López de Vallejo, I.L.: E-locus: A clustered view of European ICT for future workspaces. E-Locus Deliverable D5.5, Fundación TEKNIKER (2004), http://e-locus.fundaciontekniker.com/
Masera, M., Bloomfeld, R.: A dependability roadmap for the Information Society in Europe. AMSD Delilverable D1.1, Rand Europe (2003), https://rami.jrc.it/roadmaps/amsd/
Morganti, F., Riva, G.: Ambient intelligence for rehabilitation. In: Riva, G., Vatalaro, F., Davide, F., Alcaiz, M. (eds.) Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, pp. 281–292. IOS Press, Amsterdam (2005)
Palmas, G., Tsapatsoulis, N., Apolloni, B., Malchiodi, D., Delopoulos, A., Beverina, F.: Generic artefacts specification and acceptance criteria. Oresteia Deliverable D01, STMicroelectronics s.r.l. (2001), http://www.image.ece.ntua.gr/oresteia/
Riva, G.: Ambient intelligence in health care. CyberPsychology and Behavior 6, 295–300 (2003)
Savidis, A., Lalis, S., Karypidis, A., Georgalis, Y., Pachoulakis, Y., Gutknecht, J., Egger, B., Kramer, P., Tafra, M., Majoe, D., Lieu, V., Hunt, N., Gredmaier, L., Roberts, D.: Report on key reference scenarios. 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science (2001), http://2wear.ics.forth.gr/
Lessig, L.: Code and other laws of cyberspace. Basic Books, New York (2000)
Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79, 101–139 (2004)
Singer, I.J.: Privacy and human nature. Ends and Means 5, 1 (2001)
Michahelles, F., Matter, P., Schmidt, A., Schiele, B.: Applying wearable sensors to avalanche rescue: First experiences with a novel avalanche beacon. Computers & Graphics 27, 839–847 (2003)
Friedewald, M., Vildjiounaite, E., Wright, D., Maghiros, I., Verlinden, M., Alahuhta, P., Delaitre, S., Gutwirth, S., Schreurs, W., Punie, Y.: Safeguards in a world of ambient intelligence (SWAMI): The brave new world of ambient intelligence – A state-of-the-art review. Deliverable D1 (2005), http://swami.jrc.es
Friedewald, M., Da Costa, O., Punie, Y., Alahuhta, P., Heinonen, S.: Perspectives of ambient intelligence in the home environment. Telematics and Informatics 22, 221–238 (2005)
Elbirt, A.J.: Who are you? How to protect against identity theft. IEEE Technology and Society Magazine 24, 5–8 (2005)
Winters, N.: Personal privacy and popular ubiquitous technology. In: Proceedings of Ubiconf 2004, April 19, 2004, Gresham College, London (2004)
Albrecht, K.: Supermarket cards: The tip of the retail surveillance iceberg. Denver University Law Review 79, 534–539 (2002)
Farrell, N.: Sony gives rootkits for christmas. The Inquirer (December 26, 2005), http://www.theinquirer.net/?article=28548
Borrus, A.: The privacy war of Richard Smith. Businessweek Online (February 14, 2000), http://www.businessweek.com/2000/00_07/b3668067.htm?scriptFramed
Associated Press: Spy agency removes illegal tracking files. The New York Times (December 29, 2005), http://www.nytimes.com/2005/12/29/national/29cookies.html
Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), pp. 77–92. Kluwer, Dordrecht (1993)
Nasoz, F., Alvarez, K., Lisetti, C., Finkelstein, N.: Emotion recognition from physiological signals for user modelling of affect. In: Proceedings of the 3rd Workshop on Affective and Attitude User Modelling, Pittsburgh, PA, USA, June 2003 (2003)
Punie, Y., Delaitre, S., Maghiros, I., Wright, D., Friedewald, M., Alahuhta, P., Gutwirth, S., de Hert, P., Lindner, R., Moscibroda, A., Schreurs, W., Verlinden, M., Vildjiounaite, E.: Safeguards in a world of ambient intelligence (SWAMI): Dark scenarios on ambient intelligence - Higlighting risks and vulnerabilities. SWAMI Deliverable 2 (2005), http://swami.jrc.es
Wright, D.: The dark side of ambient intelligence. Info - The journal of policy, regulation and strategy for telecommunications 7(6), 33–51 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Friedewald, M., Vildjiounaite, E., Punie, Y., Wright, D. (2006). The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_10
Download citation
DOI: https://doi.org/10.1007/11734666_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33376-0
Online ISBN: 978-3-540-33377-7
eBook Packages: Computer ScienceComputer Science (R0)