Skip to main content

Datenschutz, Privatsphäre und Identität in intelligenten Umgebungen: Eine Szenarioanalyse

  • Chapter
Die Informatisierung des Alltags

Auszug

Der Erfolg von intelligenten Umgebungen (engl. Ambient Intelligence, AmI) wird entscheidend davon abhängen, wie gut persönliche Daten sowie die Privatsphäre und andere Rechte des potenziellen Nutzers geschützt werden können und ob es gelingt, Vertrauen gegenüber der wenig greifbaren informatisierten Umwelt aufzubauen. Dieser Beitrag beleuchtet diese Themen, indem Szenarien analysiert werden, die im Rahmen von technischen Entwicklungsprojekten, aber auch von politischen Entscheidungsträgern und ihren Beratern erstellt wurden. Dabei werden grundlegende Annahmen herausgearbeitet, die die Befürworter dieser Technik über den Benutzer, den Nutzungskontext und eventuell unerwünschte Nebeneffekte treffen. Auf dieser Basis wird eine Reihe von möglichen Schwachpunkten und Verwundbarkeiten intelligenter Umgebungen abgeleitet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Aarts E, Marzano S (Eds.) (2003) The New Everyday: Views on Ambient Intelligence. Uitgeverij 010 Publishers, Rotterdam

    Google Scholar 

  2. Ackerman MS (2004) Privacy in pervasive environments: next generation labelling protocols. Personal and Ubiquitous Computing 8(6) 430–439

    Article  Google Scholar 

  3. Åkesson K-P, Humble J, Crabtree A, Bullock A (2001) Usage and Development Scenarios for the Tangible Toolbox. ACCORD Deliverable D1.3, Swedish Institute of Computer Science, Kista, www.sics.se/accord/plan/del/D1.3.pdf

    Google Scholar 

  4. Albrecht K, McIntyre L (2005) Spychips: How Major Corporations and Governments Plan to Track Every Move with RFID. Nelson Current

    Google Scholar 

  5. Aschmoneit P, Höbig M (2002) Context-Aware Collaborative Environments for Next Generation Business Networks: Scenario Document. COCONET deliverable D 2.2, Enschede: Telematica Institute

    Google Scholar 

  6. Bohn J, Coroama V, Langheinrich M, Mattern F, Rohs M (2004) Living in a World of Smart Everyday Objects — Social, Economic, and Ethical Implications. Human and Ecological Risk Assessment 10(5) 763–786

    Article  Google Scholar 

  7. Beckwith R (2003) Designing for Ubiquity: The Perception of Privacy. IEEE Pervasive Computing 2(2) 40–46

    Article  Google Scholar 

  8. Bellotti V, Sellen A (1993) Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW’93) 77–92

    Google Scholar 

  9. Bülligen F (2005) Vorratsdatenspeicherung von Telekommunikationsdaten im internationalen Vergleich: Stand und Perspektiven — Zur Konstitution einer neuen politischen Arena. DuD — Datenschutz und Datensicherheit 29(6) 349–353

    Google Scholar 

  10. Cabrera Giráldez M, Rodríguez Casal C (2005) The Role of Ambient Intelligence in the Social Integration of the Elderly. In: Riva G, Vatalaro F, Davide F, Alcañiz M (Eds.): Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, IOS Press, 265–280

    Google Scholar 

  11. Casert R (2004). Workshop Ambient Intelligence: In the service of Man? Societal aspects of ambient intelligence in the field of health and surveillance. Rathenau Institute

    Google Scholar 

  12. Elbirt AJ (2005) Who Are You? How to Protect Against Identity Theft. IEEE Technology and Society Magazine 24(2) 5–8

    Article  Google Scholar 

  13. Friedewald M, Da Costa O, Punie Y, Alahuhta P, Heinonen S (2005) Perspectives of Ambient Intelligence in the Home Environment. Telematics and Informatics 22(3) 221–238

    Article  Google Scholar 

  14. Hameling CJ (2002) Risks in the Global e-Society. In: Banse G, Grunwald A, Rader M (Eds.): Innovations for an e-Society — Challenges for Technology Assessment, Edition Sigma, 57–66

    Google Scholar 

  15. Harrop P (2005) Item level RFID: The business benefits of the „tag everything“ scenario. IDTechEx Ltd, Cambridge

    Google Scholar 

  16. Heesen J (2005) Ubiquitous Computing als subjektorientierte Technikvision. In: Bora A, Decker M, Grunwald A, Renn O (Hrsg.): Technik in einer fragilen Welt: Die Rolle der Technikfolgenabschätzung, Edition Sigma, Berlin, 183–191

    Google Scholar 

  17. Heinonen S (2004) Mobile Telework at the Crossroads of Social, Environmental and Cultural Challenges. In: 9th International Telework Workshop, International Telework Academy, Crete, Greece, 6th–9th September, 2004

    Google Scholar 

  18. IST Advisory Group, Ducatel K, Bogdanowicz M, Scapolo F, Leijten J, Burgelman JC (2001) Scenarios for Ambient Intelligence in 2010. Institute for Prospective Technological Studies (IPTS), Sevilla

    Google Scholar 

  19. ITEA Technology Roadmap for Software-Intensive Systems, 2nd edition (2004) Information Technology for European Advancement (ITEA) Office Association, Eindhoven

    Google Scholar 

  20. Jafari R, Dabiri F, Sarrafzadeh M (2004) Reconfigurable Fabric Vest for Fatal Heart Disease Prevention. In: UbiHealth 2004 — The 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Nottingham, 7 September 2004

    Google Scholar 

  21. Lessig L (2000) Code and other laws of cyberspace. Basic Books, New York

    Google Scholar 

  22. Luff P, Heath C, Norrie M, Signer B, Herdman P (2004) Only touching the surface: Creating affinities between digital content and paper. In: Proceedings of the 2004 ACM conference on computer supported cooperative work, Chicago, USA, 8th–10th November 2004, 523–532

    Google Scholar 

  23. Luck M, McBurney P, Preist C (2003) Agent Technology: Enabling Next Generation Computing. A Roadmap for Agent Based Computing, AgentLink, Southampton

    Google Scholar 

  24. López de Vallejo IL (2004) E-Locus: A clustered view of European ICT for future workspaces. E-Locus Deliverable D5.5, Fundación TEKNIKER, Guipúzcoa

    Google Scholar 

  25. Masera M, Bloomfeld R (2003) A Dependability Roadmap for the Information Society in Europe. AMSD Deliverable D1.1, Rand Europe, Leiden, https://rami.jrc.it/roadmaps/amsd

    Google Scholar 

  26. Michahelles F, Matter P, Schmidt A, Schiele B (2003) Applying Wearable Sensors to Avalanche Rescue: First Experiences with a Novel Avalanche Beacon. Computers & Graphics 27(6) 839–847

    Article  Google Scholar 

  27. Morganti F, Riva G (2005) Ambient Intelligence for Rehabilitation. In: Riva G, Vatalaro F, Davide F, Alcañiz M (Eds.) Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction. IOS Press, Amsterdam, 281–292

    Google Scholar 

  28. Ma J, Yang LT, Apduhan BO, Huang R, Barolli L, Takizawa M (2005) Towards a Smart World and Ubiquitous Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbiKids. International Journal of Pervasive Computing and Communications 1(1)

    Google Scholar 

  29. Nasoz F, Alvarez K, Lisetti C, Finkelstein N (2003) Emotion Recognition from Physiological Signals for User Modelling of Affect. In: Proceedings of the 3rd Workshop on Affective and Attitude User Modelling, Pittsburgh, USA, June 2003

    Google Scholar 

  30. Nissenbaum H (2004) Privacy as Contextual Integrity. Washington Law Review 79(1) 101–139

    Google Scholar 

  31. Orr RJ, Raymond R, Berman J, Seay F (1999) A System for Finding Frequently Lost Objects in the Home. Technical Report 99-24. Graphics, Visualization, and Usability Center, Georgia Tech, Atlanta

    Google Scholar 

  32. Palmas G, Tsapatsoulis N, Apolloni B, Malchiodi D, Delopoulos A, Beverina F (2001) Generic Artefacts Specification and Acceptance Criteria. Oresteia Deliverable D01, STMicroelectronics s.r.l, Milano

    Google Scholar 

  33. Remagnino P, Foresti GL, Ellis T (Eds.) (2005) Ambient Intelligence: A Novel Paradigm. Springer

    Google Scholar 

  34. Riva G (2003) Ambient Intelligence in Health Care. CyberPsychology and Behavior 6(3) 295–300

    Article  MathSciNet  Google Scholar 

  35. Roßnagel A (2005) Verantwortung für Datenschutz. Informatik-Spktrum 28(6) 462–473

    Article  Google Scholar 

  36. Scheule RM (2005) Das „Digitale Gefälle“ als Gerechtigkeitsproblem. Informatik-Spektrum 28(6) 474–488

    Article  Google Scholar 

  37. Singer I (2001) Privacy and Human Nature. Ends and Means 5(1)

    Google Scholar 

  38. Savidis A, Lalis S, Karypidis A, Georgalis Y, Pachoulakis Y, Gutknecht J, Egger B, Kramer P, Tafra M, Majoe D, Lieu V, Hunt N, Gredmaier L, Roberts D (2001) Report on Key Reference Scenarios. 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion

    Google Scholar 

  39. Van Laerhoven K, Lo BPL, Ng JWP, Thiemjarus S, King R, Kwan S, Gellersen H, Sloman M, Wells M, Needham P, Peters N, Darzi A, Toumazou C, Yang GZ (2004) Medical Healthcare Monitoring with Wearable and Implantable Sensors. In: UbiHealth 2004 — The 3rd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Nottingham, 7 September 2004

    Google Scholar 

  40. Weiser M (1993) Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM 36(7) 75–85

    Article  Google Scholar 

  41. Winters N (2004) Personal Privacy and Popular Ubiquitous Technology. In: Proceedings of Ubiconf 2004, Gresham College, London, 19 April 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Friedewald, M., Lindner, R. (2007). Datenschutz, Privatsphäre und Identität in intelligenten Umgebungen: Eine Szenarioanalyse. In: Mattern, F. (eds) Die Informatisierung des Alltags. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71455-2_12

Download citation

Publish with us

Policies and ethics