Ir al contenido

Documat


The awareness of privacy issues in ambient intelligence

  • LÓPEZ, Mar [1] ; PEDRAZA, Juanita [2] ; CARBÓ, Javier [1] ; MOLINA, José M. [1]
    1. [1] Computer Science Department, Carlos III University of Madrid
    2. [2] Public State Law Department, Carlos III University of Madrid
  • Localización: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, ISSN-e 2255-2863, Vol. 3, Nº. 2, 2014, págs. 71-84
  • Idioma: inglés
  • DOI: 10.14201/ADCAIJ2014397184
  • Enlaces
  • Resumen
    • Ambient Intelligence (AmI) involves extensive and invisible integration of computer technologies in people´s daily lives: Smart Sensors, Smart Phones, Tablets, Wireless Sensor Network (Wi-Fi, Bluetooth, NFC, RFID, etc.), Internet (Facebook, WhatsApp, Twitter, You Tube, Blogs, Cloud Computing, etc.). The Intelligent Environments (IE) collect and process a massive amount of person-related and sensitive information.The aim of this work is to show the awareness of privacy issues in AmI and to identify the relevant design issues that should be addressed in order to provide privacy in the design of Ambient Intelligence’s applications focused in the user´s domain and involved technologies. We propose a conceptual framework in order to enforce privacy that takes care of interaction between technologies and devices, users and application´s domain with different modules that contain different steps relating to the privacy policies.

  • Referencias bibliográficas
    • AARTS, E. (2003).The new everyday: Views of Ambient Intelligence. 010 Publishiers (2003), Rotterdam.
    • AARTS, E. (2004). Ambient intelligence: a multimedia perspective. IEEE Intelligent Systems. 19, 1, 12–19.
    • ADAMS, A. (2001). Privacy in multimedia communications: protection users, not just data. 2001 Presented at: Joint Proceedings of Human-Computer...
    • AGRAWAL, D. (2001). «On the design and quantification of privacy preserving data mining algorithms». In, Symposium on Principles of Database...
    • ALTMAN, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company,...
    • BELT, S. (2006-Espoo, Finland), User Perceptions on Mobile Interaction with Visual and RFID Tags. Proc. of the Workshop on Mobile Interaction...
    • BOHN, J. (2004). Living in a world of smart everyday objects-Social, economic, and ethical implications. Human Ecol. Risk Assess., 10, 5.
    • http://dx.doi.org/10.1080/10807030490513793
    • BOJEN NIELSEN, L. MA. (2004-Delft, The Netherlands) ICEC’04 Proceedings of the 6th International Conference on Electronic Commerce. Post Disney...
    • BORREJO-JARABA, F. (2010-Córdoba, Spain). Proceedings of the 23rd International Conference on Industrial Engineering and other Applications...
    • BRYCE, C. (2007). Ubiquitous privacy protection. 2007 Presented at: First IEEE International Workshop on Privacy in Ubiquitous Systems; August...
    • CLARKE, R. (1997). Introduction to Dataveillance and Information Privacy, and Definitions of Terms. http://www.rogerclarke.com/DV/Intro.html.
    • CORCHADO, J.M. (2008). GerAmi: improving healthcare delivery in geriatric residences. J. IEEE Intelligent. Systems. (Special Issue on Ambient...
    • COSTABILE, MARIA F. (2008). Proceedings-Learning Support. 26th annual SIGCHI conference on Human factors in computing. Explore! Possibilities...
    • DE HERT, P. (2008). Pers Ubiquit Comput (2009) 13:435-444. Legal safeguards for privacy and data protection in ambient intelligence. Springer-Verlag...
    • DE VRIES, P. (2008). The state of RFID for e®ective baggage tracking in the airline industry. International Journal of Mobile Communications...
    • DIAZ, C. (2003). Towards measuring anonymity. In: Privacy Enhancing Technologies: Second International Workshop, PET 2002, San Francisco,...
    • DOYLE, J. (2010-Dundee, UK). BCS´10 Proceedings of the 24th BCS Interaction Specialist Group Conference. Designing a touch screen communication...
    • FRIEDEWALD, M. (2005). Perspectives of ambient intelligence in the home environment. Telematics Informatics, 22, Elsevier, 221–238.
    • http://dx.doi.org/10.1016/j.tele.2004.11.001
    • FRIEDEWALD, M. (2007). Privacy, identity and security in ambient intelligence: a scenario analysis. Telematics Informatics 2007 Feb;24(1):15-29.
    • http://dx.doi.org/10.1016/j.tele.2005.12.005
    • GAGGIOLI, A. (2005). Optimal experience in ambient intelligence. In Ambient Intelligence, G. Riva, F. Vatalaro, F. Davide, and M. Alcaniz,...
    • HESSELMAN, C. (2008). Controlled Disclosure of Context Information across Ubiquitous Computing Domains. In Intl. Conf. Sensor Networks, Ubiq.,...
    • HOLZINGER, A. (2005). Lifelong-learning support by mlearning: Example scenarios. eLearn, 11, 2.
    • HONG, J.I. (2004a). An architecture for privacy-sensitive ubiquitous computing. In MobySys´0. ACM, 2004.
    • HONG, J.I. (2004b ). Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. DIS ’04 Proceedings of the 5th Conference...
    • ISTAG (2002). Strategic orientation & priorities for IST in FP6. European Commission Report, http://www.cordis.europa.eu/fp7/ict/istag/reports_en.ht
    • ISTAG (2003). Ambient intelligence: from vision to reality. European Commission Report, http://www.cordis.europa.eu/fp7/ict/istag/reports_en.html,...
    • ISTAG (2010). Scenarios for ambient intelligence in 2010. European Commission Report, http://www.cordis.lu/ist/istag.htm, 2010.
    • JIANG, X. (2002). Modeling privacy control in context-aware systems. IEEE Pervasive Computing: 2002 Jul.,1(3):59-63.
    • http://dx.doi.org/10.1109/MPRV.2002.1037723
    • JUNG, D. (2005). A mobile alerting system for the support of patients with chronic conditions. In First European Conference on Mobile Government...
    • KANSTRUP, A.M. (2008-Bloomington,USA) PDC’08 Proceedings of the 10th Anniversary Conference on Participatory Design. Design for More: an Ambient...
    • KAPADIA, A. (2007). Virtual walls: protecting digital privacy in pervasive environments. In LaMarca A, Langheinrich M, Truong KN, editors....
    • KRUMM, J. A. (2009). Survey of computational location privacy. Pers. and Ubiquitous Comp., 13 (6).
    • LANGHEINRICH, M. (2002). A privacy awareness system for ubiquitous computing environments. In UbiComp´02. Springer, 2002.
    • LEDERER, S. (2002). Report No, UCB/CSD-2-1288. Berkeley, CA, USA: University of California; 2002 Jun. A conceptual model and metaphor of everyday...
    • LEDERER, S. (2003). Report No UCB/CSD-3-1257. Berkeley, CA, USA: University of California; 2003 Jul. Managing personal information disclosure...
    • REITER, M. (1999). «Crowds: Anonymity for web transactions». In, Communications of the ACM, vol. 42, no 3, pp. 32-48.
    • http://dx.doi.org/10.1145/293411.293778
    • ROUVROY, A. (2008). Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies Ethics, Law, Technol. 2, 1,...
    • http://dx.doi.org/10.2202/1941-6008.1001
    • RUOTSALAINEN, PS. (2012). A conceptual framework and principles for trusted pervasive health. J. Med Internet Res 2012 Apr;14(2):e52. [doi:...
    • http://dx.doi.org/10.2196/jmir.1972
    • SADRI, F. (2011). Ambient Intelligence: A Survey. ACM Computing Surveys, Vol. 43, Issue 4, Article 36.
    • http://dx.doi.org/10.1145/1978802.1978815
    • SERJANTOVE, A. (2002). «Towards an information theoretic metric for anonymity» In, Proceedings of Workshop on Privacy Enhancing Technologies...
    • SHEIKH, K. (2008). Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. Journal of Software, 3(3):83-93, 2008.
    • SILVA, J.M. (2009-Beijing, China). Proceedings of the 1st ACM SIGMM International Workshop on Media Studies and Implementations that help...
    • SWEENEY, L. (2011). Computational disclosure control: A primer on data Privacy protection, Ph. D Thesis, MIT.
    • WEISER, M. (1991). The computer for the twenty-first century. Scientific Am 265(3):91–104.
    • http://dx.doi.org/10.1038/scientificamerican0991-94
    • WESTIN, A.F. (2003). Social and political dimensions of privacy. J Social Issues 2003 Jun; 59(2):431-453.
    • http://dx.doi.org/10.1111/1540-4560.00072
    • WRIGHT, D. (2008) Safeguards in a world of ambient intelligence, Springer Press, Dordrecht, p 291.

Fundación Dialnet

Mi Documat

Opciones de artículo

Opciones de compartir

Opciones de entorno