The brave new world of ambient intelligence: An analysis of scenarios regarding privacy, identity and security issues

Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    15 Citations (Scopus)

    Abstract

    The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of individuals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This contribution presents an analysis of ambient intelligence scenarios, particularly in regard to AmI’s impacts on and implications for individual privacy. The analysis draws on our review of more than 70 AmI projects, principally in Europe. It notes the visions as well as the specifics of typical AmI scenarios. Several conclusions can be drawn from the analysis, not least of which is that most AmI scenarios depict a rather too sunny view of our technological future. Finally, reference is made to the SWAMI project (Safeguards in a World of Ambient Intelligence) which, inter alia, has constructed ”dark” scenarios, as we term them, to show how things can go wrong in AmI and where safeguards are needed.
    Original languageEnglish
    Title of host publicationSecurity in Pervasive Computing
    Subtitle of host publicationThird International Conference, SPC 2006, York, UK, April 18-21, 2006. Proceedings.
    EditorsJ. A. Clark, R. F. Paige, F. A. C. Polack, P. J. Brooke
    PublisherSpringer
    Pages119-133
    ISBN (Electronic)978-3-540-33377-7
    ISBN (Print)978-3-540-33376-0
    DOIs
    Publication statusPublished - 2006
    MoE publication typeA4 Article in a conference publication

    Publication series

    SeriesLecture Notes in Computer Science
    Volume3934
    ISSN0302-9743

    Fingerprint

    Dive into the research topics of 'The brave new world of ambient intelligence: An analysis of scenarios regarding privacy, identity and security issues'. Together they form a unique fingerprint.

    Cite this