Skip to main content

Legal Issues of Ambient Intelligence in the SERENITY Project

  • Chapter
  • First Online:
Security and Dependability for Ambient Intelligence

Part of the book series: Advances in Information Security ((ADIS,volume 45))

  • 369 Accesses

Abstract

The successful functionality of the solutions proposed by the SERENITY project will only be achieved when they fit into the existing legal framework. Therefore, when developing software and hardware solutions, developers must respect requirements set out by law. The aim of this chapter is to define legal challenges that arise with the advent of the Ambient Intelligence, and to explain how SERENITY deals with the challenge of legal compliance. To do this, we will first describe how the legal requirements are translated into a machinereadable form in the SERENITY project, and introduce the concept of so called legal patterns. The application of relevant legal principles on data protection will be illustrated using two particular scenarios. We will then focus on practical legal problems related to daily operations of SERENITY technical solutions. Finally, we conclude with an evaluation of the SERENITY approach and its outcomes

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aggarwal G, Bawa M, Ganesan P, Garcia-Molina H, Kenthapadi K, Mishra N, Motwani R, Srivastava U, Thomas D, Widom J, Xu Y (2004) Vision Paper: Enabling Privacy for the Paranoids. VLDB Endowment Inc. http://www.vldb.org/conf/2004/RS19P1.PDF. Accessed 5 August 2008

  2. Article 29 Data Protection Working Party (2006) Opinion 8/2006 on the review of the regulatory Framework for Electronic Communications and Services, with focus on the ePrivacy Directive. European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2006/wp126_en.pdf. Accessed 28 May 2008

  3. Article 29 Data Protection Working Party (2008) Opinion 2/2008 on the review of the Directive 2002/58/EC on privacy and electronic communications (ePrivacy Directive). European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2008/wp150_en.pdf. Accessed 1 October 2008

  4. 4. Augusto JC and McGullagh P (2007) Ambient Intelligence: Concepts and Applications. Int'l J. Computer Science and Information Systems 4:1-28

    Google Scholar 

  5. 5. Avižienis A, Laprie JC, Randell B, Landwehr C (2004) Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1:11-33

    Article  Google Scholar 

  6. 6. Bygrave Lee A (2002) Data Protection Law: Approaching Its Rationale, Logic and Limits. Kluwer Law International, Hague

    Google Scholar 

  7. 7. Cai Y (ed) (2005) Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems. Springer-Verlag, Berlin, Heidelberg

    Google Scholar 

  8. Compagna L, El Khoury P, Krausová A, Massacci F, Zannone N (2008) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artificial Intelligence and Law. doi: 10.1007/s10506-008-9067-3

    Google Scholar 

  9. Compagna L, El Khoury P, Massacci F, Thomas R, Zannone N (2007) How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL '07: Proceedings of the 11th international conference on Artificial intelligence and law: 149-153

    Google Scholar 

  10. Cybex (2006) The Admissibility of Electronic Evidence in Court. Cybex. http://www.cybex.es/agis2005/docs/libro_aeec_en.pdf. Accessed 14 July 2008

  11. 11. Escuredo-Pascual A, Hosein I (2004) Questioning Lawful Access to Traffic Data. Communications of the ACM 3:77-82

    Article  Google Scholar 

  12. FP7 ICT Advisory Group (2008) Working Group Report on “ICT and Sustainability (including Energy and Environment)”. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/sustainability-istag_en.pdf. Accessed 21 August 2008

    Google Scholar 

  13. 13. Gadzheva M (2008) Privacy in the Age of Transparency: The New Vulnerability of the Individual. Social Science Computer Review 26:60-74

    Article  Google Scholar 

  14. Gruetser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-Aware Location Sensor Networks. http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.pdf. Accessed 5 August 2008

  15. Hohfeld WN (1913) Fundamental legal conceptions as applied to judicial reasoning. Yale Law Journal: 16-59

    Google Scholar 

  16. Hoofnagle CJ (2005) Privacy Self Regulation: A Decade of Disappointment. SSRN Electronic Library. http://ssrn.com/abstract=650804. Accessed 18 July 2008

  17. IST Advisory Group (1999) Orientations for Workprogramme 2000 and beyond. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-99-final.pdf. Accessed 21 August 2008

    Google Scholar 

  18. IST Advisory Group (2002) Software technologies, embedded systems and distributed systems: A European strategy towards an Ambient Intelligent environment. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402472encfull.pdf. Accessed 21 August 2008

    Google Scholar 

  19. IST Advisory Group (2002) Trust, dependability, security and privacy for IST in FP6. IST-web. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402464encfull.pdf. Accessed 21 August 2008

    Google Scholar 

  20. IST Advisory Group (2003) Ambient Intelligence: From Vision to Reality. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-ist2003_consolidated_report.pdf. Accessed 16 July 2008

    Google Scholar 

  21. IST Advisory Group (2004) Experience and Application Research: Involving Users in the Development of Ambient Intelligence. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/2004_ear_web_en.pdf. Accessed 21 August 2008

    Google Scholar 

  22. IST Advisory Group (2006) ISTAG Report on Shaping Europe's Future Through ICT. IST-web. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-shaping-europe-future-ict-march-2006-en.pdf. Accessed 21 August 2008

    Google Scholar 

  23. IST Advisory Group (2006) ISTAG Report on Orientations for Work Programme in FP7. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-wp-wg-report-ver-final_en.pdf. Accessed 21 August 2008

    Google Scholar 

  24. Kosta E, Pitkänen O, Niemelä M, Kaasinen E (2008) Ethical-Legal Challenges in User-Centric AmI Services. Third International Conference on Internet and Web Applications and Services: 19-24

    Google Scholar 

  25. Korff D (2002) EC Study on Implementation of Data Protection Directive: Comparative Summary of National Laws. European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/lawreport/consultation/univessex-comparativestudy_en.pdf. Accessed 21 January 2008

  26. Mason S with specialist contributors (2007) Electronic Evidence: Disclosure, Discovery and Admissibility. LexisNexis Butterworths, Suffolk

    Google Scholar 

  27. 27. Pedersen DM (1997) Psychological Functions of Privacy. Journal of Environmental Psychology 17:147-156

    Article  Google Scholar 

  28. 28. Perrig A, Stankovic J, Wagner D (2004) Security in Wireless Sensor Networks. Communications of the ACM 6:53-57

    Article  Google Scholar 

  29. Saraogi M (2005) Security in Wireless Sensor Networks. http://www.cs.utk.edu/∼saraogi/594paper.pdf. Accessed 5 August 2008

  30. 30. Scherer J (ed) (2005) Telecommunication Laws in Europe. Tottel Publishing, West Sussex

    Google Scholar 

  31. SERENITY Project. A1 Deliverable - A1.D3.1 - Initial Set of Security and Privacy Patterns at Organizational Level. EU-IST-IP 6th Framework Programme - SERENITY 27587.

    Google Scholar 

  32. SERENITY Project. A4 Deliverable - A4.D2.2 - Basic set of Information Collection Mechanisms for Run-Time S&D Monitoring. EU-IST-IP 6th Framework Programme - SERENITY 27587.

    Google Scholar 

  33. SERENITY Project. A5 Deliverable - A5.D2.3 - Patterns and Integration Schemes Languages. EU-IST-IP 6th Framework Programme - SERENITY 27587.

    Google Scholar 

  34. SERENITY Project. A7 Deliverable - A7.D1.1 - Scenario Selection and Definition. EU-IST-IP 6th Framework Programme - SERENITY 27587.

    Google Scholar 

  35. Solove DJ (2005) The New Vulnerability: Data Security and Personal Information. SSRN Electronic Library. http://ssrn.com/abstract=583483. Accessed 15 May 2008

  36. 36. Solove DJ, Rotenberg M, Schwartz PM (2006) Information Privacy Law. Aspen Publishers, New York

    Google Scholar 

  37. Spiekermann S (2005) Perceived Control: Scales for Privacy in Ubiquitous Computing. SSRN Electronic Library. http://ssrn.com/abstract=761109. Accessed 15 May 2008

  38. Stankovic JA, Cao Q, Doan T, Fang L, He Z, Kiran R, Lin S, Son S, Stoleru R, Wood A (2005) Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges. http://faculty.cs.tamu.edu/stoleru/papers/stankovic05wsn.pdf. Accessed 5 August 2008

  39. von Wright GH (1951) Deontic logic. Mind:1-15

    Google Scholar 

  40. Wahlgren P (1992) Automation of Legal Reasoning: A Study on Artificial Intelligence. Kluwer Law and Taxation Publishers, Deventer

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alžběta Krausová .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Krausová, A., Dumortier, J. (2009). Legal Issues of Ambient Intelligence in the SERENITY Project. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-88775-3_16

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-88774-6

  • Online ISBN: 978-0-387-88775-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics