Auszug
Der Erfolg von intelligenten Umgebungen (engl. Ambient Intelligence, AmI) wird entscheidend davon abhängen, wie gut persönliche Daten sowie die Privatsphäre und andere Rechte des potenziellen Nutzers geschützt werden können und ob es gelingt, Vertrauen gegenüber der wenig greifbaren informatisierten Umwelt aufzubauen. Dieser Beitrag beleuchtet diese Themen, indem Szenarien analysiert werden, die im Rahmen von technischen Entwicklungsprojekten, aber auch von politischen Entscheidungsträgern und ihren Beratern erstellt wurden. Dabei werden grundlegende Annahmen herausgearbeitet, die die Befürworter dieser Technik über den Benutzer, den Nutzungskontext und eventuell unerwünschte Nebeneffekte treffen. Auf dieser Basis wird eine Reihe von möglichen Schwachpunkten und Verwundbarkeiten intelligenter Umgebungen abgeleitet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literatur
Aarts E, Marzano S (Eds.) (2003) The New Everyday: Views on Ambient Intelligence. Uitgeverij 010 Publishers, Rotterdam
Ackerman MS (2004) Privacy in pervasive environments: next generation labelling protocols. Personal and Ubiquitous Computing 8(6) 430–439
Åkesson K-P, Humble J, Crabtree A, Bullock A (2001) Usage and Development Scenarios for the Tangible Toolbox. ACCORD Deliverable D1.3, Swedish Institute of Computer Science, Kista, www.sics.se/accord/plan/del/D1.3.pdf
Albrecht K, McIntyre L (2005) Spychips: How Major Corporations and Governments Plan to Track Every Move with RFID. Nelson Current
Aschmoneit P, Höbig M (2002) Context-Aware Collaborative Environments for Next Generation Business Networks: Scenario Document. COCONET deliverable D 2.2, Enschede: Telematica Institute
Bohn J, Coroama V, Langheinrich M, Mattern F, Rohs M (2004) Living in a World of Smart Everyday Objects — Social, Economic, and Ethical Implications. Human and Ecological Risk Assessment 10(5) 763–786
Beckwith R (2003) Designing for Ubiquity: The Perception of Privacy. IEEE Pervasive Computing 2(2) 40–46
Bellotti V, Sellen A (1993) Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW’93) 77–92
Bülligen F (2005) Vorratsdatenspeicherung von Telekommunikationsdaten im internationalen Vergleich: Stand und Perspektiven — Zur Konstitution einer neuen politischen Arena. DuD — Datenschutz und Datensicherheit 29(6) 349–353
Cabrera Giráldez M, Rodríguez Casal C (2005) The Role of Ambient Intelligence in the Social Integration of the Elderly. In: Riva G, Vatalaro F, Davide F, Alcañiz M (Eds.): Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, IOS Press, 265–280
Casert R (2004). Workshop Ambient Intelligence: In the service of Man? Societal aspects of ambient intelligence in the field of health and surveillance. Rathenau Institute
Elbirt AJ (2005) Who Are You? How to Protect Against Identity Theft. IEEE Technology and Society Magazine 24(2) 5–8
Friedewald M, Da Costa O, Punie Y, Alahuhta P, Heinonen S (2005) Perspectives of Ambient Intelligence in the Home Environment. Telematics and Informatics 22(3) 221–238
Hameling CJ (2002) Risks in the Global e-Society. In: Banse G, Grunwald A, Rader M (Eds.): Innovations for an e-Society — Challenges for Technology Assessment, Edition Sigma, 57–66
Harrop P (2005) Item level RFID: The business benefits of the „tag everything“ scenario. IDTechEx Ltd, Cambridge
Heesen J (2005) Ubiquitous Computing als subjektorientierte Technikvision. In: Bora A, Decker M, Grunwald A, Renn O (Hrsg.): Technik in einer fragilen Welt: Die Rolle der Technikfolgenabschätzung, Edition Sigma, Berlin, 183–191
Heinonen S (2004) Mobile Telework at the Crossroads of Social, Environmental and Cultural Challenges. In: 9th International Telework Workshop, International Telework Academy, Crete, Greece, 6th–9th September, 2004
IST Advisory Group, Ducatel K, Bogdanowicz M, Scapolo F, Leijten J, Burgelman JC (2001) Scenarios for Ambient Intelligence in 2010. Institute for Prospective Technological Studies (IPTS), Sevilla
ITEA Technology Roadmap for Software-Intensive Systems, 2nd edition (2004) Information Technology for European Advancement (ITEA) Office Association, Eindhoven
Jafari R, Dabiri F, Sarrafzadeh M (2004) Reconfigurable Fabric Vest for Fatal Heart Disease Prevention. In: UbiHealth 2004 — The 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Nottingham, 7 September 2004
Lessig L (2000) Code and other laws of cyberspace. Basic Books, New York
Luff P, Heath C, Norrie M, Signer B, Herdman P (2004) Only touching the surface: Creating affinities between digital content and paper. In: Proceedings of the 2004 ACM conference on computer supported cooperative work, Chicago, USA, 8th–10th November 2004, 523–532
Luck M, McBurney P, Preist C (2003) Agent Technology: Enabling Next Generation Computing. A Roadmap for Agent Based Computing, AgentLink, Southampton
López de Vallejo IL (2004) E-Locus: A clustered view of European ICT for future workspaces. E-Locus Deliverable D5.5, Fundación TEKNIKER, Guipúzcoa
Masera M, Bloomfeld R (2003) A Dependability Roadmap for the Information Society in Europe. AMSD Deliverable D1.1, Rand Europe, Leiden, https://rami.jrc.it/roadmaps/amsd
Michahelles F, Matter P, Schmidt A, Schiele B (2003) Applying Wearable Sensors to Avalanche Rescue: First Experiences with a Novel Avalanche Beacon. Computers & Graphics 27(6) 839–847
Morganti F, Riva G (2005) Ambient Intelligence for Rehabilitation. In: Riva G, Vatalaro F, Davide F, Alcañiz M (Eds.) Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction. IOS Press, Amsterdam, 281–292
Ma J, Yang LT, Apduhan BO, Huang R, Barolli L, Takizawa M (2005) Towards a Smart World and Ubiquitous Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbiKids. International Journal of Pervasive Computing and Communications 1(1)
Nasoz F, Alvarez K, Lisetti C, Finkelstein N (2003) Emotion Recognition from Physiological Signals for User Modelling of Affect. In: Proceedings of the 3rd Workshop on Affective and Attitude User Modelling, Pittsburgh, USA, June 2003
Nissenbaum H (2004) Privacy as Contextual Integrity. Washington Law Review 79(1) 101–139
Orr RJ, Raymond R, Berman J, Seay F (1999) A System for Finding Frequently Lost Objects in the Home. Technical Report 99-24. Graphics, Visualization, and Usability Center, Georgia Tech, Atlanta
Palmas G, Tsapatsoulis N, Apolloni B, Malchiodi D, Delopoulos A, Beverina F (2001) Generic Artefacts Specification and Acceptance Criteria. Oresteia Deliverable D01, STMicroelectronics s.r.l, Milano
Remagnino P, Foresti GL, Ellis T (Eds.) (2005) Ambient Intelligence: A Novel Paradigm. Springer
Riva G (2003) Ambient Intelligence in Health Care. CyberPsychology and Behavior 6(3) 295–300
Roßnagel A (2005) Verantwortung für Datenschutz. Informatik-Spktrum 28(6) 462–473
Scheule RM (2005) Das „Digitale Gefälle“ als Gerechtigkeitsproblem. Informatik-Spektrum 28(6) 474–488
Singer I (2001) Privacy and Human Nature. Ends and Means 5(1)
Savidis A, Lalis S, Karypidis A, Georgalis Y, Pachoulakis Y, Gutknecht J, Egger B, Kramer P, Tafra M, Majoe D, Lieu V, Hunt N, Gredmaier L, Roberts D (2001) Report on Key Reference Scenarios. 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion
Van Laerhoven K, Lo BPL, Ng JWP, Thiemjarus S, King R, Kwan S, Gellersen H, Sloman M, Wells M, Needham P, Peters N, Darzi A, Toumazou C, Yang GZ (2004) Medical Healthcare Monitoring with Wearable and Implantable Sensors. In: UbiHealth 2004 — The 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Nottingham, 7 September 2004
Weiser M (1993) Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM 36(7) 75–85
Winters N (2004) Personal Privacy and Popular Ubiquitous Technology. In: Proceedings of Ubiconf 2004, Gresham College, London, 19 April 2004
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Friedewald, M., Lindner, R. (2007). Datenschutz, Privatsphäre und Identität in intelligenten Umgebungen: Eine Szenarioanalyse. In: Mattern, F. (eds) Die Informatisierung des Alltags. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71455-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-71455-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71454-5
Online ISBN: 978-3-540-71455-2
eBook Packages: Computer Science and Engineering (German Language)