The illusion of security

D. Wright, M. Friedewald, W. Schreurs, M. Verlinden, S. Gutwirth, Y. Punie, I. Maghiros, Elena Vildjiounaite, Petteri Alahuhta

Research output: Contribution to journalArticleScientificpeer-review

8 Citations (Scopus)

Abstract

Ambient Intelligence (AmI) offers powerful new technologies for security applications, but it still is undermined. A dark scenario is presented which concerns the theft of personal information held by a data aggregator DMC by three of its employees. The scenario makes reference to several AmI technologies, including biometrics such as the iris scanners, networked sensors or actuators, speech recognition or voice activation, and surveillance technologies. AmI networks are used to compile personal data and profile of would-be visitors and immigrants to help officials assess whether they present a security risk or not. California and some other states in the US have strict laws requiring that companies do inform individuals when their data has been compromised. It is mandatory that designers of new technology should be required to factor in data protection in any new AmI architectures and networks.
Original languageEnglish
Pages (from-to)57-63
Number of pages7
JournalCommunications of the ACM
Volume51
Issue number3
DOIs
Publication statusPublished - 2008
MoE publication typeA1 Journal article-refereed

Fingerprint

Data privacy
Biometrics
Speech recognition
Actuators
Chemical activation
Personnel
Ambient intelligence
Sensors
Industry

Cite this

Wright, D., Friedewald, M., Schreurs, W., Verlinden, M., Gutwirth, S., Punie, Y., ... Alahuhta, P. (2008). The illusion of security. Communications of the ACM, 51(3), 57-63. https://doi.org/10.1145/1325555.1325567
Wright, D. ; Friedewald, M. ; Schreurs, W. ; Verlinden, M. ; Gutwirth, S. ; Punie, Y. ; Maghiros, I. ; Vildjiounaite, Elena ; Alahuhta, Petteri. / The illusion of security. In: Communications of the ACM. 2008 ; Vol. 51, No. 3. pp. 57-63.
@article{9f6ad9314b2a4e6da80a89d95ac3fde1,
title = "The illusion of security",
abstract = "Ambient Intelligence (AmI) offers powerful new technologies for security applications, but it still is undermined. A dark scenario is presented which concerns the theft of personal information held by a data aggregator DMC by three of its employees. The scenario makes reference to several AmI technologies, including biometrics such as the iris scanners, networked sensors or actuators, speech recognition or voice activation, and surveillance technologies. AmI networks are used to compile personal data and profile of would-be visitors and immigrants to help officials assess whether they present a security risk or not. California and some other states in the US have strict laws requiring that companies do inform individuals when their data has been compromised. It is mandatory that designers of new technology should be required to factor in data protection in any new AmI architectures and networks.",
author = "D. Wright and M. Friedewald and W. Schreurs and M. Verlinden and S. Gutwirth and Y. Punie and I. Maghiros and Elena Vildjiounaite and Petteri Alahuhta",
year = "2008",
doi = "10.1145/1325555.1325567",
language = "English",
volume = "51",
pages = "57--63",
journal = "Communications of the ACM",
issn = "0001-0782",
publisher = "Association for Computing Machinery ACM",
number = "3",

}

Wright, D, Friedewald, M, Schreurs, W, Verlinden, M, Gutwirth, S, Punie, Y, Maghiros, I, Vildjiounaite, E & Alahuhta, P 2008, 'The illusion of security', Communications of the ACM, vol. 51, no. 3, pp. 57-63. https://doi.org/10.1145/1325555.1325567

The illusion of security. / Wright, D.; Friedewald, M.; Schreurs, W.; Verlinden, M.; Gutwirth, S.; Punie, Y.; Maghiros, I.; Vildjiounaite, Elena; Alahuhta, Petteri.

In: Communications of the ACM, Vol. 51, No. 3, 2008, p. 57-63.

Research output: Contribution to journalArticleScientificpeer-review

TY - JOUR

T1 - The illusion of security

AU - Wright, D.

AU - Friedewald, M.

AU - Schreurs, W.

AU - Verlinden, M.

AU - Gutwirth, S.

AU - Punie, Y.

AU - Maghiros, I.

AU - Vildjiounaite, Elena

AU - Alahuhta, Petteri

PY - 2008

Y1 - 2008

N2 - Ambient Intelligence (AmI) offers powerful new technologies for security applications, but it still is undermined. A dark scenario is presented which concerns the theft of personal information held by a data aggregator DMC by three of its employees. The scenario makes reference to several AmI technologies, including biometrics such as the iris scanners, networked sensors or actuators, speech recognition or voice activation, and surveillance technologies. AmI networks are used to compile personal data and profile of would-be visitors and immigrants to help officials assess whether they present a security risk or not. California and some other states in the US have strict laws requiring that companies do inform individuals when their data has been compromised. It is mandatory that designers of new technology should be required to factor in data protection in any new AmI architectures and networks.

AB - Ambient Intelligence (AmI) offers powerful new technologies for security applications, but it still is undermined. A dark scenario is presented which concerns the theft of personal information held by a data aggregator DMC by three of its employees. The scenario makes reference to several AmI technologies, including biometrics such as the iris scanners, networked sensors or actuators, speech recognition or voice activation, and surveillance technologies. AmI networks are used to compile personal data and profile of would-be visitors and immigrants to help officials assess whether they present a security risk or not. California and some other states in the US have strict laws requiring that companies do inform individuals when their data has been compromised. It is mandatory that designers of new technology should be required to factor in data protection in any new AmI architectures and networks.

U2 - 10.1145/1325555.1325567

DO - 10.1145/1325555.1325567

M3 - Article

VL - 51

SP - 57

EP - 63

JO - Communications of the ACM

JF - Communications of the ACM

SN - 0001-0782

IS - 3

ER -

Wright D, Friedewald M, Schreurs W, Verlinden M, Gutwirth S, Punie Y et al. The illusion of security. Communications of the ACM. 2008;51(3):57-63. https://doi.org/10.1145/1325555.1325567