the current state of ubiquitous computing
TRANSCRIPT
![Page 1: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/1.jpg)
The Current State of Ubiquitous Computing
Ubiquitous Computing is a movement in computer science to bring computing away from the
specialized ldquodesktoprdquo location and make it available everywhere that people live and work
Ubiquitous computing spans a very broad range of technologies which we can summarize in the
ldquoUbiquitous Computing Equationrdquo Ubiquitous Computing = Mobile Computing + Intelligent
Environments In this paper we present taxonomy of approaches to ubiquitous computing then
we present the EasyLiving project at Microsoft Research EasyLiving is a prototype architecture
to support many of the technologies and scenarios of ubiquitous computing
Present thinking in ubiquitous applications
In the twenty-first century the technology revolution will move into the everyday the small and the invisible The impact of technology will increase ten-fold as it is imbedded in the fabric of everyday life As technology becomes more imbedded and invisible it calms our lives by removing annoyances while keeping us connected with what is truly important This imbedding this invisibility this radical ease-of-use requires radical innovations in our connectivity infrastructure mdash M D Weiser
Ubiquitous computing is about networked microprocessors embedded in everyday objects - not
just cellphones and home appliances but also books bookshelves bus stops and bathtubs--all
talking to each other over some form of links Hundreds of internet-enabled computers per
human being
As you know networked computers are insecure If the ubiquitous systems we deploy in our
homes offices shops and vehicles are as vulnerable as todays PCs the risks for society will be
catastrophic
A very good example of an ubiquitous approach in staying connected with your friends is Your
Messenger You can be connected to your friend wherever you are But what about your enemies
or malicious users
Messengers have built in security features (blocking) where you can control who can see you and
who you do not want to see But until recently even if you block someone there are software that
can detect whether you are online or not That is until Microsoft Patched it up
Ubiquitous computing vision however is over a decade old at this point and we now inhabit the
future
imagined by its pioneers The future though may not have worked out as the field collectively
imagined In this article we explore the vision that has driven the ubiquitous computing research
agenda and the contemporary practice that has emerged Drawing on crosscultural investigations
of technology adoption we argue for developing a lsquolsquoubicomp of the presentrsquorsquo which takes the
messiness of everyday life as a central theme
bull Collaboration with Interactive walls and Tables
Collaborative Environment
Computers will be disappeared in the architecture
The functionality remains ubiquitously available
(Tender et al 2002)
bull Emotions in the world
FeelingsEmotions will be judged by the sensors
Generated results in respect to emotionsfeelings Ex ndash smart homes
(Emotions in the world)
bull In future The characterization of computer as the ldquointimate computerrdquo or ldquorather like a
human assistantrdquo makes this inappropriate attention to the machine itself particularly
apparent
(Weiser 1993)
When computing becomes ubiquitous you will not need to manually set preferences
Everything will be controlled by natural actions opposing to the current point-and-click
interfaces
The object you interact with will learn from you and provide information based on your
environment
Everything will become interactive and more importantly reactive
In the coming future ubiquitous computing will greatly reform our world to create a smart
world filled with a variety of embedded intelligence or smart real and virtual things
ranging from-
software to hardware
man-made artifacts to natural objects
everyday appliances to sophisticated systems
small rooms to large buildings from enclosed sites to open spaces
Stationary places to moveable vehicles
Towards a ubicomp of the present
What this suggests then is an alternative domain of ubicomp researchmdasha ubicomp not of the
future but of the present William Gibson famously quipped that
lsquolsquoThe future is already here itrsquos just not very evenly distributedrsquorsquo [43] We take each
component of this aphorism as a component of an alternative research agenda for ubicomp
The future is already here
The future is already here The technological trends that Weiser insightfully extrapolated
have just as he anticipated resulted in radical transformations and reconfigurations of the
role of computation in everyday life Weiser anticipated a world in which computation would
be embedded into our everyday worldsmdashnot just physically embedded but also socially and
procedurally embedded becoming part and parcel of how we act in the world It has not
perhaps taken the form that he anticipated although PDAs cell phones large-scale displays
and digital cameras do bear family resemblances to the devices that Weiser imagined would
come to populate our world However the fact that the details are different should not blind
us to the remarkable accuracy of Weiserrsquos vision Computation is embedded into the
technology and practice of everyday life we continually use computational devices without
thinking of them as computational in any way The desktop computer has not been displaced
but augmented Interestingly though while the technological form of ubiquitous computing
differs only in its details from the model that Weiser had anticipated it is perhaps the use of
ubiquitous computing which would have surprised him One notable aspect of Weiserrsquos
article is that as he lays out a vision for a radically different form of computational
experience the settings into which those devices are to be deployed and the activities that
they are used to support remain largely unexamined Weiserrsquos ubiquitous computing
technology is used in workplaces it relies on large fixed infrastructure investments by
commercial entities it is directed towards the needs of corporate efficiency Weiserrsquos
ubiquitous computing is a tool for labor From the perspective of a lsquoubicomp of the presentrsquo
we can note that Weiser was entirely correct in one regardmdashthat the purposes to which
people would put computational devices are not radically new ones but rather reflect existing
social and cultural needs However again this did not necessarily take the form that had been
anticipated Computational technologies are embedded in social structures and cultural
scripts of many sorts ubicomp technologies prove also to be sites of social engagement
generational conflict domestic regulation religious practice state surveillance civic protest
romantic encounters office politics artistic expression and more What this suggests then
is that we need a deeper understanding of how social and cultural practice is carried out in
and around emerging information technologies If ubiquitous computing is already here then
we need to pay considerably more attention to just what it is being used to do and its effects
Interestingly while considerations of the social and cultural elements in ubicomprsquos agenda
has traditionally been thought of in terms of lsquosocial impactsrsquo our focus here is more on
technology as a site of social and cultural production that is as an aspect of how social and
cultural work are done rather than as something which will inevitably transform social
practice Indeed it may be quite the other way around
Conclusion
Instead we take the fact that we already live in a world of ubiquitous computing to be a
rather wonderful thing The challenge now is to understand it The UC will bring
information technology beyond the big problems like corporate finance and school
homework to the little annoyances like where are the car-keys Can I get a parking place
and Is that shirt I saw last week at Macyrsquos still on the rack Many researchers are working
towards this new era ndash among them our work at Xerox PARC MITrsquos AIorientedldquoThings
That Thinkrdquo program7 the many mobile and wearable computing programs8
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 2: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/2.jpg)
Present thinking in ubiquitous applications
In the twenty-first century the technology revolution will move into the everyday the small and the invisible The impact of technology will increase ten-fold as it is imbedded in the fabric of everyday life As technology becomes more imbedded and invisible it calms our lives by removing annoyances while keeping us connected with what is truly important This imbedding this invisibility this radical ease-of-use requires radical innovations in our connectivity infrastructure mdash M D Weiser
Ubiquitous computing is about networked microprocessors embedded in everyday objects - not
just cellphones and home appliances but also books bookshelves bus stops and bathtubs--all
talking to each other over some form of links Hundreds of internet-enabled computers per
human being
As you know networked computers are insecure If the ubiquitous systems we deploy in our
homes offices shops and vehicles are as vulnerable as todays PCs the risks for society will be
catastrophic
A very good example of an ubiquitous approach in staying connected with your friends is Your
Messenger You can be connected to your friend wherever you are But what about your enemies
or malicious users
Messengers have built in security features (blocking) where you can control who can see you and
who you do not want to see But until recently even if you block someone there are software that
can detect whether you are online or not That is until Microsoft Patched it up
Ubiquitous computing vision however is over a decade old at this point and we now inhabit the
future
imagined by its pioneers The future though may not have worked out as the field collectively
imagined In this article we explore the vision that has driven the ubiquitous computing research
agenda and the contemporary practice that has emerged Drawing on crosscultural investigations
of technology adoption we argue for developing a lsquolsquoubicomp of the presentrsquorsquo which takes the
messiness of everyday life as a central theme
bull Collaboration with Interactive walls and Tables
Collaborative Environment
Computers will be disappeared in the architecture
The functionality remains ubiquitously available
(Tender et al 2002)
bull Emotions in the world
FeelingsEmotions will be judged by the sensors
Generated results in respect to emotionsfeelings Ex ndash smart homes
(Emotions in the world)
bull In future The characterization of computer as the ldquointimate computerrdquo or ldquorather like a
human assistantrdquo makes this inappropriate attention to the machine itself particularly
apparent
(Weiser 1993)
When computing becomes ubiquitous you will not need to manually set preferences
Everything will be controlled by natural actions opposing to the current point-and-click
interfaces
The object you interact with will learn from you and provide information based on your
environment
Everything will become interactive and more importantly reactive
In the coming future ubiquitous computing will greatly reform our world to create a smart
world filled with a variety of embedded intelligence or smart real and virtual things
ranging from-
software to hardware
man-made artifacts to natural objects
everyday appliances to sophisticated systems
small rooms to large buildings from enclosed sites to open spaces
Stationary places to moveable vehicles
Towards a ubicomp of the present
What this suggests then is an alternative domain of ubicomp researchmdasha ubicomp not of the
future but of the present William Gibson famously quipped that
lsquolsquoThe future is already here itrsquos just not very evenly distributedrsquorsquo [43] We take each
component of this aphorism as a component of an alternative research agenda for ubicomp
The future is already here
The future is already here The technological trends that Weiser insightfully extrapolated
have just as he anticipated resulted in radical transformations and reconfigurations of the
role of computation in everyday life Weiser anticipated a world in which computation would
be embedded into our everyday worldsmdashnot just physically embedded but also socially and
procedurally embedded becoming part and parcel of how we act in the world It has not
perhaps taken the form that he anticipated although PDAs cell phones large-scale displays
and digital cameras do bear family resemblances to the devices that Weiser imagined would
come to populate our world However the fact that the details are different should not blind
us to the remarkable accuracy of Weiserrsquos vision Computation is embedded into the
technology and practice of everyday life we continually use computational devices without
thinking of them as computational in any way The desktop computer has not been displaced
but augmented Interestingly though while the technological form of ubiquitous computing
differs only in its details from the model that Weiser had anticipated it is perhaps the use of
ubiquitous computing which would have surprised him One notable aspect of Weiserrsquos
article is that as he lays out a vision for a radically different form of computational
experience the settings into which those devices are to be deployed and the activities that
they are used to support remain largely unexamined Weiserrsquos ubiquitous computing
technology is used in workplaces it relies on large fixed infrastructure investments by
commercial entities it is directed towards the needs of corporate efficiency Weiserrsquos
ubiquitous computing is a tool for labor From the perspective of a lsquoubicomp of the presentrsquo
we can note that Weiser was entirely correct in one regardmdashthat the purposes to which
people would put computational devices are not radically new ones but rather reflect existing
social and cultural needs However again this did not necessarily take the form that had been
anticipated Computational technologies are embedded in social structures and cultural
scripts of many sorts ubicomp technologies prove also to be sites of social engagement
generational conflict domestic regulation religious practice state surveillance civic protest
romantic encounters office politics artistic expression and more What this suggests then
is that we need a deeper understanding of how social and cultural practice is carried out in
and around emerging information technologies If ubiquitous computing is already here then
we need to pay considerably more attention to just what it is being used to do and its effects
Interestingly while considerations of the social and cultural elements in ubicomprsquos agenda
has traditionally been thought of in terms of lsquosocial impactsrsquo our focus here is more on
technology as a site of social and cultural production that is as an aspect of how social and
cultural work are done rather than as something which will inevitably transform social
practice Indeed it may be quite the other way around
Conclusion
Instead we take the fact that we already live in a world of ubiquitous computing to be a
rather wonderful thing The challenge now is to understand it The UC will bring
information technology beyond the big problems like corporate finance and school
homework to the little annoyances like where are the car-keys Can I get a parking place
and Is that shirt I saw last week at Macyrsquos still on the rack Many researchers are working
towards this new era ndash among them our work at Xerox PARC MITrsquos AIorientedldquoThings
That Thinkrdquo program7 the many mobile and wearable computing programs8
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 3: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/3.jpg)
agenda and the contemporary practice that has emerged Drawing on crosscultural investigations
of technology adoption we argue for developing a lsquolsquoubicomp of the presentrsquorsquo which takes the
messiness of everyday life as a central theme
bull Collaboration with Interactive walls and Tables
Collaborative Environment
Computers will be disappeared in the architecture
The functionality remains ubiquitously available
(Tender et al 2002)
bull Emotions in the world
FeelingsEmotions will be judged by the sensors
Generated results in respect to emotionsfeelings Ex ndash smart homes
(Emotions in the world)
bull In future The characterization of computer as the ldquointimate computerrdquo or ldquorather like a
human assistantrdquo makes this inappropriate attention to the machine itself particularly
apparent
(Weiser 1993)
When computing becomes ubiquitous you will not need to manually set preferences
Everything will be controlled by natural actions opposing to the current point-and-click
interfaces
The object you interact with will learn from you and provide information based on your
environment
Everything will become interactive and more importantly reactive
In the coming future ubiquitous computing will greatly reform our world to create a smart
world filled with a variety of embedded intelligence or smart real and virtual things
ranging from-
software to hardware
man-made artifacts to natural objects
everyday appliances to sophisticated systems
small rooms to large buildings from enclosed sites to open spaces
Stationary places to moveable vehicles
Towards a ubicomp of the present
What this suggests then is an alternative domain of ubicomp researchmdasha ubicomp not of the
future but of the present William Gibson famously quipped that
lsquolsquoThe future is already here itrsquos just not very evenly distributedrsquorsquo [43] We take each
component of this aphorism as a component of an alternative research agenda for ubicomp
The future is already here
The future is already here The technological trends that Weiser insightfully extrapolated
have just as he anticipated resulted in radical transformations and reconfigurations of the
role of computation in everyday life Weiser anticipated a world in which computation would
be embedded into our everyday worldsmdashnot just physically embedded but also socially and
procedurally embedded becoming part and parcel of how we act in the world It has not
perhaps taken the form that he anticipated although PDAs cell phones large-scale displays
and digital cameras do bear family resemblances to the devices that Weiser imagined would
come to populate our world However the fact that the details are different should not blind
us to the remarkable accuracy of Weiserrsquos vision Computation is embedded into the
technology and practice of everyday life we continually use computational devices without
thinking of them as computational in any way The desktop computer has not been displaced
but augmented Interestingly though while the technological form of ubiquitous computing
differs only in its details from the model that Weiser had anticipated it is perhaps the use of
ubiquitous computing which would have surprised him One notable aspect of Weiserrsquos
article is that as he lays out a vision for a radically different form of computational
experience the settings into which those devices are to be deployed and the activities that
they are used to support remain largely unexamined Weiserrsquos ubiquitous computing
technology is used in workplaces it relies on large fixed infrastructure investments by
commercial entities it is directed towards the needs of corporate efficiency Weiserrsquos
ubiquitous computing is a tool for labor From the perspective of a lsquoubicomp of the presentrsquo
we can note that Weiser was entirely correct in one regardmdashthat the purposes to which
people would put computational devices are not radically new ones but rather reflect existing
social and cultural needs However again this did not necessarily take the form that had been
anticipated Computational technologies are embedded in social structures and cultural
scripts of many sorts ubicomp technologies prove also to be sites of social engagement
generational conflict domestic regulation religious practice state surveillance civic protest
romantic encounters office politics artistic expression and more What this suggests then
is that we need a deeper understanding of how social and cultural practice is carried out in
and around emerging information technologies If ubiquitous computing is already here then
we need to pay considerably more attention to just what it is being used to do and its effects
Interestingly while considerations of the social and cultural elements in ubicomprsquos agenda
has traditionally been thought of in terms of lsquosocial impactsrsquo our focus here is more on
technology as a site of social and cultural production that is as an aspect of how social and
cultural work are done rather than as something which will inevitably transform social
practice Indeed it may be quite the other way around
Conclusion
Instead we take the fact that we already live in a world of ubiquitous computing to be a
rather wonderful thing The challenge now is to understand it The UC will bring
information technology beyond the big problems like corporate finance and school
homework to the little annoyances like where are the car-keys Can I get a parking place
and Is that shirt I saw last week at Macyrsquos still on the rack Many researchers are working
towards this new era ndash among them our work at Xerox PARC MITrsquos AIorientedldquoThings
That Thinkrdquo program7 the many mobile and wearable computing programs8
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 4: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/4.jpg)
In the coming future ubiquitous computing will greatly reform our world to create a smart
world filled with a variety of embedded intelligence or smart real and virtual things
ranging from-
software to hardware
man-made artifacts to natural objects
everyday appliances to sophisticated systems
small rooms to large buildings from enclosed sites to open spaces
Stationary places to moveable vehicles
Towards a ubicomp of the present
What this suggests then is an alternative domain of ubicomp researchmdasha ubicomp not of the
future but of the present William Gibson famously quipped that
lsquolsquoThe future is already here itrsquos just not very evenly distributedrsquorsquo [43] We take each
component of this aphorism as a component of an alternative research agenda for ubicomp
The future is already here
The future is already here The technological trends that Weiser insightfully extrapolated
have just as he anticipated resulted in radical transformations and reconfigurations of the
role of computation in everyday life Weiser anticipated a world in which computation would
be embedded into our everyday worldsmdashnot just physically embedded but also socially and
procedurally embedded becoming part and parcel of how we act in the world It has not
perhaps taken the form that he anticipated although PDAs cell phones large-scale displays
and digital cameras do bear family resemblances to the devices that Weiser imagined would
come to populate our world However the fact that the details are different should not blind
us to the remarkable accuracy of Weiserrsquos vision Computation is embedded into the
technology and practice of everyday life we continually use computational devices without
thinking of them as computational in any way The desktop computer has not been displaced
but augmented Interestingly though while the technological form of ubiquitous computing
differs only in its details from the model that Weiser had anticipated it is perhaps the use of
ubiquitous computing which would have surprised him One notable aspect of Weiserrsquos
article is that as he lays out a vision for a radically different form of computational
experience the settings into which those devices are to be deployed and the activities that
they are used to support remain largely unexamined Weiserrsquos ubiquitous computing
technology is used in workplaces it relies on large fixed infrastructure investments by
commercial entities it is directed towards the needs of corporate efficiency Weiserrsquos
ubiquitous computing is a tool for labor From the perspective of a lsquoubicomp of the presentrsquo
we can note that Weiser was entirely correct in one regardmdashthat the purposes to which
people would put computational devices are not radically new ones but rather reflect existing
social and cultural needs However again this did not necessarily take the form that had been
anticipated Computational technologies are embedded in social structures and cultural
scripts of many sorts ubicomp technologies prove also to be sites of social engagement
generational conflict domestic regulation religious practice state surveillance civic protest
romantic encounters office politics artistic expression and more What this suggests then
is that we need a deeper understanding of how social and cultural practice is carried out in
and around emerging information technologies If ubiquitous computing is already here then
we need to pay considerably more attention to just what it is being used to do and its effects
Interestingly while considerations of the social and cultural elements in ubicomprsquos agenda
has traditionally been thought of in terms of lsquosocial impactsrsquo our focus here is more on
technology as a site of social and cultural production that is as an aspect of how social and
cultural work are done rather than as something which will inevitably transform social
practice Indeed it may be quite the other way around
Conclusion
Instead we take the fact that we already live in a world of ubiquitous computing to be a
rather wonderful thing The challenge now is to understand it The UC will bring
information technology beyond the big problems like corporate finance and school
homework to the little annoyances like where are the car-keys Can I get a parking place
and Is that shirt I saw last week at Macyrsquos still on the rack Many researchers are working
towards this new era ndash among them our work at Xerox PARC MITrsquos AIorientedldquoThings
That Thinkrdquo program7 the many mobile and wearable computing programs8
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 5: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/5.jpg)
ubiquitous computing which would have surprised him One notable aspect of Weiserrsquos
article is that as he lays out a vision for a radically different form of computational
experience the settings into which those devices are to be deployed and the activities that
they are used to support remain largely unexamined Weiserrsquos ubiquitous computing
technology is used in workplaces it relies on large fixed infrastructure investments by
commercial entities it is directed towards the needs of corporate efficiency Weiserrsquos
ubiquitous computing is a tool for labor From the perspective of a lsquoubicomp of the presentrsquo
we can note that Weiser was entirely correct in one regardmdashthat the purposes to which
people would put computational devices are not radically new ones but rather reflect existing
social and cultural needs However again this did not necessarily take the form that had been
anticipated Computational technologies are embedded in social structures and cultural
scripts of many sorts ubicomp technologies prove also to be sites of social engagement
generational conflict domestic regulation religious practice state surveillance civic protest
romantic encounters office politics artistic expression and more What this suggests then
is that we need a deeper understanding of how social and cultural practice is carried out in
and around emerging information technologies If ubiquitous computing is already here then
we need to pay considerably more attention to just what it is being used to do and its effects
Interestingly while considerations of the social and cultural elements in ubicomprsquos agenda
has traditionally been thought of in terms of lsquosocial impactsrsquo our focus here is more on
technology as a site of social and cultural production that is as an aspect of how social and
cultural work are done rather than as something which will inevitably transform social
practice Indeed it may be quite the other way around
Conclusion
Instead we take the fact that we already live in a world of ubiquitous computing to be a
rather wonderful thing The challenge now is to understand it The UC will bring
information technology beyond the big problems like corporate finance and school
homework to the little annoyances like where are the car-keys Can I get a parking place
and Is that shirt I saw last week at Macyrsquos still on the rack Many researchers are working
towards this new era ndash among them our work at Xerox PARC MITrsquos AIorientedldquoThings
That Thinkrdquo program7 the many mobile and wearable computing programs8
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 6: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/6.jpg)
Computers for personal use have focused on the excitement of interaction But when
computers are all around so that we want to compute while doing something else and have
more time to be more fully human we must radically rethink the goals context and
technology of the computer and all the other technology crowding into our lives
As we learn to design calm technology we will enrich not only our space of artifacts but
also our opportunities for being with other people When our world is filled with
interconnected imbedded computers calm technology will play a central role in a more
humanly empowered twenty-first century
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 7: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/7.jpg)
Ethical issues related to ubiquitous computing
In accordance with widely held norms of behavior or of written standards of conduct adopted by the members of a profession----- [1(httpwwwyourdictionarycomethical)]
What ethical implications are to be expected from deploying ubiquitous computing and the
implied surveillance for care giving and other domains These issues may be discussed from
both an end-user perspective as well as from a designer perspective Can there be a code of ethics
for designers of ubiquitous systems
Computer ethics is a new branch of ethics that is growing and changing rapidly as
computer technology also grows and develops The term computer ethics is open
to interpretations both broad and narrow
(httpwwwcsuclaeduclassesspring03cs239l5slidespetrospdf)
Huge impact of pervasive computing on society both good amp evilMain concerns1048708 Is society ready for the pervasive future 1048708 Are people mature enough for a largescale pervasive environment 1048708 What are the environmental issues 1048708 Is the legal system ready for a pervasiveenvironment 1048708 What about peoplersquos rights and privacy Are they threatened
Letrsquos talk abouthellip
1048708 Social behavior
1048708 The environment
1048708 Privacy and human rights
Social behavior
Individual Behavior
1048708 Ubiquitous computing challenges individuals to
rethink their behavior
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 8: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/8.jpg)
1048708 The airport anecdotehellip
1048708 Old habits die hard
1048708 Is your grandmother
ready for this
1048708 The only possible
exception health care
Social behavior
Individual Behavior (cont)
1048708 Impact on work environments (eg employeesrsquo supervision)
1048708 Human relationships
1048708 The cell phone example
1048708 Every cell phone owner usually leaves the cell phone on
1048708 Every one expects that you should have your cell phone on (ldquoif itrsquos off then why do you have
it rdquo)
1048708 Cell phone related behavior has become important to some people
1048708 Constant (possibility of) communication affects the relationships between individuals (eg
family members etc)
1048708 People may become more insecure because they rely on the cell phone (eg for emergencies)
Environmental Issues1048708 Computing devices consist of various hazardous
andor non-recyclable materials
1048708 Plastics heavy metals toxic materials
1048708 Pervasive computing goals require massively
distributed devices embedded in the
environment
1048708 Environmental issues of mass production and
destruction of these devices
1048708 Energy consumption
Environmental Issues (cont)
1048708 Computer recycling no efficient methods
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 9: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/9.jpg)
1048708 Current design amp production practices do not take recycling into consideration
1048708 Computing devices become obsolete very quickly
1048708 Pervasive computing should incorporate mechanisms to minimize environmental impact
1048708 Save physical materials
1048708 Save energy
1048708 Extend the lifetime of devices
1048708 ldquoSmartrdquo amp efficient disposal
1048708 World wide agreement is needed
Environmental Issues
Minimizing physical materials
1048708 Functional integration
1048708 Combine several functions into a single device (eg PDA + cell phone + universal remote
control + hellip)
1048708 Resource sharing
1048708 Many users sharing one resource
1048708 Requires personalization features (eg use of biometrics)
1048708 Most computers are tremendously
underutilized
(challenges internet scale operating system and
economic models providing incentives for users to
lease out computer resources)
Environmental Issues
Minimizing physical materials (cont)
1048708 Modular design
1048708 Each device should have the components
needed for a specific application and no more
1048708 Modular design usually leads to ldquobulkyrdquo
components
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 10: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/10.jpg)
In the industrialized nations of the world the information revolution already has
significantly altered many aspects of life -- in banking and commerce work and
employment medical care national defense transportation and entertainment
Consequently information technology has begun to affect (in both good and bad
ways) community life family life human relationships education freedom
democracy and so on (to name a few examples) Computer ethics in the broadest
sense can be understood as that branch of applied ethics which studies and analyzes
such social and ethical impacts of information technology
In recent years this robust new field has led to new university courses conferences
workshops professional organizations curriculum materials books articles
journals and research centers And in the age of the world-wide-web computer
ethics is quickly being transformed into global information ethics
A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used Computers provide us with new
capabilities and these in turn give us new choices for action Often either no policies
for conduct in these situations exist or existing policies seem inadequate A central
task of computer ethics is to determine what we should do in such cases that is
formulate policies to guide our actions One difficulty is that along with a policy
vacuum there is often a conceptual vacuum Although a problem in computer ethics
may seem clear initially a little reflection reveals a conceptual muddle What is
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 11: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/11.jpg)
needed in such cases is an analysis that provides a coherent conceptual framework
within which to formulate a policy for action [Moor 1985 266]
Conclusion
Thus Ethics is a major issue that needs to be followed by people of all folks in life We cannot ignore ethics whether it may be in the field of Ubiquitous Computing as without it
no courtesy would be maintained Hence the world requires a medium or a belief that needs to be followed so that the
Ubiquitous Devices too can have a long lasting name in the History of mankind
Intelligencerdquo concept in ubiquitous computing
Natural and palpable interfaces to invisible computers spontaneous and continuous interaction
user intentiondemand anticipation and proactive computing self-management system and
autonomic computing organic computing sustainable computing intelligence scalability etc
Distributed artificial intelligence (DAI) distributed soft computing naturalbiological modeling
for ubiquitous intelligence multi-agent modeling approach massive multi-agent system
heterogeneous intelligence management and collaborations intelligence competition and
evolution amorphous computing spray computing etc
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 12: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/12.jpg)
Meaning and impact of ubiquitous intelligence social implications of ubiquitous intelligence and
smart world positive and negative sides of ubiquitous computing ethical issues training policy
and legal issues economic and culture impacts psychological and emotional factors politeness
in computational intelligence etc
Conclusion-
The ubiquitous intelligence as an emerging and very promising multidiscipline aims at new
models and technologies for graceful integrations and mutual actions of real worlds and virtual e-
worlds with different scales and purposes
Discussion on agents and multi agent systems
Discussion of current mobile devices wearables amp network applications in ubiquitous computing
Areas in Ubiquitous security
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 13: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/13.jpg)
Privacy issues in ubiquitous society privacy regulation and low privacy intrusion automatic
detection privacy protection framework and infrastructure identity and behavior trust trust
model and measure risk estimation trust management security technology for privacy and trust
guarantee etc
Privacy VS ubiquitous computing
1048708 At the heart of the ubiquitous computing vision lies an inherent contradiction
1048708 Computing environment must be highly knowledgeable about the user BUT
1048708 Large numbers of users different physical regions and service providers pose threat to privacy
and trust among parties
Privacy issues and concerns
1048708 Pervasive computing requires continuous monitoring of user actions
1048708 Data are not always ldquoanonymousrdquo
1048708 Who has access to this information
1048708 Governments
1048708 Law enforcement agents
1048708 Marketing companies
1048708 Strangers
1048708 All internet users
Privacy issues and concerns (cont)
1048708 The vision ubiquitous computing is thrilling and temptinghellip
1048708 This guarantees commercial success
1048708 But after the technology is widespread will the users be able to say ldquothanks butno thanks rdquo
Balance between privacy and
ubiquitous computing
1048708 Increased Awareness
1048708 The user is informed about the ldquoprivacy levelrdquo of a certain
applicationsituationlocation
1048708 Maintaining an audit trail
1048708 Monitoring who has sensitive information about a person
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 14: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/14.jpg)
1048708 Helps investigating abuse of personal info
1048708 Fear of being tracked down may sometimes helphellip
1048708 Creating a ldquosixth senserdquo
1048708 Sense the environment and judge whether it looks ldquosuspiciousrdquo or not
Balance between privacy and ubiquitous computing (cont)
1048708 Privacy-Enhancing Technologies (PETs)
1048708 Subject oriented (anonymity proxies)
1048708 Object oriented (exchanged objects do not contain traces of identification)
1048708 Transaction oriented (clean up transactions)
1048708 System oriented (combination of some or all of the previous concepts)
Security
Interactions cross multiple organisational boundaries
Specification analysis and integration for heterogeneous OS databases firewalls routers
Lessons from history
Cell phones IR garage doors CATV decoders
Everything worth hacking gets hacked
Need for secure lsquoout of the boxrsquo set up
Identify friend or foe 1048782 level of trust
Small communicators with confidential data are easily lost or stolen ndash biometric
authentication
Necessary security technology exists
Privacy
Location service tracks movement to within metres (cf mobile phones but pay-as-you-go
can be anonymous)
Clearly indicate you are being sensed or recorded + user control to stop recording or
control distribution of information
You are now predictable
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 15: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/15.jpg)
System can co-relate location context and behaviour patterns
Do you want employer colleagues or insurance company to know you carry a medical
monitor
Tension between authentication and anonymity ndash business want to authenticate you for
financial transactions and to provide lsquopersonalizedrsquo service of web sites
Constant spam of context dependent advertising
(httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Ubiquitous Computing Ethics and Social Inclusion1048708 Key Ethical Issues1048708 Freedom from harm1048708 How to ensure new technologies are effectively tested to ensure they will cause no harm1048708 Respect for human dignity1048708 Do ubiquitous computing solutions because of their nature of being unseen provide a particularly effective response to issues of stigmatisation1048708 Informed Consent1048708 Because of this same quality of being unseen do ubiquitous computing solutions create more challenges for providing informed consent1048708 With a vulnerable group as the primary users what other key challenges exist for achieving informed consent1048708 Self-determination1048708 By utilising ubiquitous computing how much control is given up ndash is there a risk of technology paternalism1048708 Do opt-out options lessen the effectiveness of technologies put in place to enhance safety and health1048708 Privacy1048708 What are the implications of the Internet of Things and the ability to track location of persons and things as it impacts the individualrsquos right to privacy How does this relate to identity
Management ndash the nightmare
1048782 Huge complex systems
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 16: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/16.jpg)
Billions of processors
Multiple organisations
Managing physical world controlling sensors actuators
1048782 Humans will be in the way
1048782 Errors propagate to bring down complete regions
1048782 Hacker and virus paradise
1048782 System propagates false information about individuals or organisation
1048782 Complexity of sw installation on a workstation or server ndash how do you cope with billions
Management Solutions
1048782 Intelligent agents mobile agents policy
1048782 QoS Management
Fat pipes and large storage can convert media streams to short traffic bursts in core network but
still needed for wireless links
1048782 Adaptive self-management is the only answer
Partitioned domains of responsibility
Genetic algorithms may be suitable for long-term strategy but need more deterministic solutions
for short term decision making
1048782 Remove human from the loop
Conclusion (httpseniorprojecteuresources1ExpertMeetingWadhwa2pdf)
Themes Emerging from Discussions1048708 The need to resist against broad categorisation of individuals as ldquoageingrdquo or ldquoelderlyrdquo ndash but rather to focus on clinical or other needs1048708 Need to effectively address ethical ambiguities ndash how to use ethical costbenefit comparisons to reach solutionsprovide guidance
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility
![Page 17: The Current State of Ubiquitous Computing](https://reader037.vdocuments.site/reader037/viewer/2022110302/546f1899b4af9fd2178b4683/html5/thumbnails/17.jpg)
1048708 Will the availability of technology to solve problems limit how far caregivers will go in trying to find the root issue of eldersrsquo needs (ie taking the technological way out of every situation)1048708 Viewing technology as empowering users rather than merely safeguarding them from harm ndash in the case of the elderly solutions need to look at what people CAN do and want to do rather than only focusing on what they can no longer do1048708 In designing technology solutions there is a need to clearly determine whose needs are being met (the elderrsquos or the caregivers)1048708 Self-determination Subject must have full control of applications with opt-out capabilities1048708 Need to recognise continuing constraints of technologies ndash many are still in their infancy and there are continuing strong barriers to overcome in terms of accuracy cost and availabilityaccessibility