MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

Size: px
Start display at page:

Download "MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS"

Transcription

1 MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri Manakula Vinayagar Engineering College, Puducherry, India R. BASKARAN Department of Computer Science and Engineering, Anna University, Chennai, India. Abstract : Ubiquitous computing applications occupied more research areas like medicine, banking and reporting applications that require user privacy. In this paper, privacy is detected as a set of parameters encapsulated in composite data entities called privons, through which, aim at infusing privacy into precision. The proposed scheme through real interaction in implementation of privons. The work implements as a privacy infusion into smart work place. Smart work place is designed for business. It allows managing an unlimited number of projects within an organization. Moreover, it offers a high level of flexibility when managing users, who have different access rights depending on the project. Access rights range from the basic read-only to the comprehensive full control level. We even extended this flexibility to projects: each project can have and individual structure and management style. The concept of privons as composite entity is introduced; comprising the privacy levels, date and services, developed for handling privacy for privacy management to reduce obtrusiveness privons is generated for all sessions that invoke transfer of information s through these entities. Keywords : Ubiquitous computing, Applications management, project management 1. Introduction A The main objective is to develop a generic architecture for balancing the conflicting goals of privacy and traceability in Ubi-Comp settings. The key challenge is to design a framework capable of adapting to chaotic environment and integrate itself with the existing legacy systems. Protecting privacy of users in Ubiquous environment posses severe problems. Misuse of sensitive information collected and processed by sensors and a computer present in every aspect of life is a fundamental barrier to the acceptance of UbiComp. Once the personal data of a certain quality can be acquired, traceability is required. Users in the Ubiquos environment had problem to protect the sensitive data. It cause huge impact in the production they mainly concentrate to protect the data with their own customized way. Project member had huge problem to differentiate their working and non working hours. Their own third party had the huge problem to accessing their data. Ubiquitous computing, in today s world, usually implies embedding the technology unobtrusively within all manner of everyday computers or appliances that can potentially transmit and receive information among each other [1]. In light of these developments, it is complacent to assume that social and organizational controls over accessibility of personal information are sufficient [2], or that intrusions into privacy will ultimately become acceptable when traded against potential benefits [3], [4]. Such an assumption could leave individual users with a heavy burden of responsibility to ensure that they do not, even inadvertently, intrude on others. It also leaves them with limited control over their own privacy. Some of the ubiquitous computing (ubicomp) systems have no mechanism for people to reflect upon the system, to see how they and their information affect, contribute, interact, or participate in the system [5]. It is ISSN:

2 also imperative that users are made aware of the limitations and constraints of the system. For example, a kitchen system that helps a person maintain groceries in the house will have sensing limitations, which may be dynamic, based on sensors and situations. Effective use of this tool requires understanding what the sensing system missed so that a person can compensate. As ubicomp systems rely on implicit sensing that is naturally ambiguous or errorprone, designers must help users comprehend the limitations of the system [6]. A frequent definition of information privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others [7]. Despite this definition, not sharing information is a fundamental aspect of privacy. The real privacy concerns people have today revolves around who has access to what information rather than what information is collected [8]. The ethics of privacy can emanate from the fact that knowledge is power. It is essential to have fine-grained control over privacy-sensitive information. One of the key concepts of ubiquitous computing is empowering technology to create a convenient environment surrounding the user which merges physical and computational infrastructures into an integrated information oriented habitat [9]. One of the challenges in deploying ubiquitous computing services on a significant scale is making adequate provision for handling personal privacy. The objectives of privacy and ubiquity are polar in nature. On the one hand, to ensure ubiquity, the applications are tuned to gather more information about the user to perform their tasks better. On the other hand, the more the application knows about the user, the greater is the threat to the user s privacy [10]. To develop a scheme that infuses privacy and the context of an event in the middleware of the ubiquitous computing framework is a significant challenge.s. 2. System Overview Architecture is developed that allows user to customize Privacy. This architecture, shown in figure 1, requires appropriate protection mechanisms for the collection, access, usage and dissemination of personal data considering transparency and usability issues. The users are concerned to actually exercise the control on privacy. It is important to determine, in which situations the privacy need to be balanced, and therefore which parties may be allowed to exercise control on this balance. Fig.1. Architectural Design for PITTS ISSN:

3 The part of each and every module plays a vital role in the implementation of the work and it is explained here briefly Package Used System Contains all of the classes for creating user interfaces and for painting graphics and images. It is a powerful header file as far as the.net framework is concerned. System.Drawing - Contains all of the classes for creating user interfaces and for painting graphics and images. A user interface object such as a button or a scrollbar is called, in system.drawing terminology, a component. The system.drawing package contains several layout manager classes and an interface for building your own layout manager. System.Data - Contains all the things needed for the database access from the.net applications. When this package is imported it supports the overall database support. System.Data.Oledb Contains all the things which are required for the Open Linking and Embedding Data Base Module Description Employees can submit their timesheet when they believe that the time is complete and correct. And also they submit the activities sheet with respect to the timesheet. Every employees fills out his/her time sheet on a weekly basis. When time sheets are completed, users can send an approval request to their Project Manager. Project Managers can then approve or reject time sheets. When time sheets are approved, Project Manager can see how much time each employee has spent on each project. This allows adapting the system s behavior accordingly. Especially, the tasks of this component are filtering and aggregation of time tracking data, classification and anonymization of personal data. This way higher level context is generated and provided in several levels of granularity.time tracking data and context that was acquired and processed is stored, temporarily or permanently. It is assumed that each user is equipped with a personal trusted device,a so called Minimal Entity(ME).The ME provides the main interface between the user and the environment.it allows a user to configure privacy and traceability preferences, to use pseudonyms, enables non-repudiation via digital signatures, provides configuration support and feedback mechanisms to the user about his current level of privacy. The transparency management component audits and documents any access to personal data in an accountable manner. It is a necessary component for traceability and privacy protection systems.parties and services that are allowed to access private data in specified cases should not routinely abuse this ability. Fig. 2. Login with their respective role On top of the context server, flexible fine-grained access control mechanisms are devised. Those mechanisms that allow for selective, context-dependant access are a crucial part, since a main challenge of the actual integration of privacy protection mechanisms into a context middleware is to enable context-awareness while protecting personal data. Especially, automation and delegation of access are considered in this ISSN:

4 component, and in its interplay with the identity management. Once access to sensitive data is granted to a third party or service, its further distribution needs to be controlled. Therefore, the proposed system devises a virtual environment component. It provides information flow control using trusted computing, thus uncontrollable profiling and linking of digital data is prevented. Fig. 3. To view the various report in the organization When implementing software, the correct implementation is more important than the software itself. This requires effective planning and efficient implementation. Implementation is a stage of project where theoretical design is turned into a working system. It involves careful planning, investigation of current system and its constraints on implementation, design of methods to achieve the changeover. It provides the detailed description about the implementation procedure and the deployment of the system. 3 Conclusions Interpreting privacy is more of a fluid and malleable concept rather than a strict set of rules. To process the abstract nature of personal privacy and convert it into tangible issues, a ubiquitous computing framework encompassing privacy infusions essential. The user can also view the data currently designated as transparent, protected, and private and make modifications if necessary. The system implemented with a light-weight version of Precision for smart phones and ported our privacy infusion scheme onto these devices. This work is a part of the work on Precision, our system for Privacy Enhanced Context-aware Information Infusion in ubiquitous computing environments. In this work, The system implemented with an innovative scheme to infuse privacy into context aware information through composite entities of data, services, and privacy, called privons. As the Future work of this work the generated privons can be checked for authorization constraints help the policy architect design and express higher level organizational rules. The future work will be concentrated both non-temporal and history-based authorization constraints with the use of Object Constraint Language (OCL) and first-order Linear Temporal Logic (LTL). References [1] Mark Weiser, The future of ubiquitous computing on campus, Communications of the ACM, vol. 41, No. 1, Page(s):41 42, [2] Radenkovic, M., and Lodge, T., Engaging the public through mass-scale multimedia networks, IEEE Journal of Multimedia, Volume 13, Issue 3, Page(s):12 15, July Sept [3] Bell, G., Auspicious computing?, IEEE Journal of Internet Computing, Volume 8, Issue 2, March-April 2004, Page(s): [4] Yong Liu, Connelly, K., SmartContacts: a large scale social context service discovery system, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, Page(s): , [5] Storz, O., Friday, A., Davies, N., Finney, J., Sas, C., and Sheridan, J., Public Ubiquitous Computing Systems: Lessons from the e- Campus Display Deployments, IEEE Journal of Pervasive Computing, Volume 5, Issue 3, Page(s):40 47, July Sept, [6] Huang, E.M., Mynatt, E.D., Russell, D.M., and Sue, A.E., Secrets to success and fatal flaws: the design of large-display groupware, IEEE Journal of Computer Graphics and Applications, Volume 26, Issue 1, Page(s):37 45, Jan Feb, ISSN:

5 [7] Westin, A., Privacy and Freedom, Atheneum, New York, [8] Murakami, Y., Legal issues for realizing ubiquitous information society, SICE 2004 Annual Conference Volume 2, Page(s): , [9] Khedo, K.K., Context-Aware Systems for Mobile and Ubiquitous Networks, Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), Page(s): , ISSN:

An Application Framework for a Situation-aware System Support for Smart Spaces

An Application Framework for a Situation-aware System Support for Smart Spaces An Application Framework for a Situation-aware System Support for Smart Spaces Arlindo Santos and Helena Rodrigues Centro Algoritmi, Escola de Engenharia, Universidade do Minho, Campus de Azúrem, 4800-058

More information

Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments

Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments Stefan G. Weber, Andreas Heinemann, Max Mühlhäuser Telecooperation Group Technische Universität Darmstadt

More information

Charting Past, Present, and Future Research in Ubiquitous Computing

Charting Past, Present, and Future Research in Ubiquitous Computing Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Sajid Sadi MAS.961 Introduction Mark Wieser outlined the basic tenets of ubicomp in 1991 The

More information

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space , pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Ubiquitous Home Simulation Using Augmented Reality

Ubiquitous Home Simulation Using Augmented Reality Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 112 Ubiquitous Home Simulation Using Augmented Reality JAE YEOL

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

Separation of Concerns in Software Engineering Education

Separation of Concerns in Software Engineering Education Separation of Concerns in Software Engineering Education Naji Habra Institut d Informatique University of Namur Rue Grandgagnage, 21 B-5000 Namur +32 81 72 4995 nha@info.fundp.ac.be ABSTRACT Separation

More information

Pervasive Computing: Study for Homes

Pervasive Computing: Study for Homes Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913 Issue Sept 2011, Vol. 4 71 Pervasive Computing: Study for Homes Department of Computer Science, Himachal Pradesh University,

More information

A User Interface Level Context Model for Ambient Assisted Living

A User Interface Level Context Model for Ambient Assisted Living not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing

Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing Louise Barkhuus Department of Design and Use of Information Technology The IT University of

More information

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare

More information

Amigo Approach Towards Perceived Privacy

Amigo Approach Towards Perceived Privacy Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy,

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

Definitions of Ambient Intelligence

Definitions of Ambient Intelligence Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features

More information

InherentTradeoffs in Ubiquitous Computing Services

InherentTradeoffs in Ubiquitous Computing Services InherentTradeoffs in Ubiquitous Computing Services StefanG.Weber, SebastianRies, Andreas Heinemann TelecooperationGroup Department ofcomputer Science, Darmstadt Universityof Technology Hochschulstraße

More information

The UCD community has made this article openly available. Please share how this access benefits you. Your story matters!

The UCD community has made this article openly available. Please share how this access benefits you. Your story matters! Provided by the author(s) and University College Dublin Library in accordance with publisher policies., Please cite the published version when available. Title Visualization in sporting contexts : the

More information

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN Proceedings of the Annual Symposium of the Institute of Solid Mechanics and Session of the Commission of Acoustics, SISOM 2015 Bucharest 21-22 May A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Towards Location and Trajectory Privacy Protection in Participatory Sensing

Towards Location and Trajectory Privacy Protection in Participatory Sensing Towards Location and Trajectory Privacy Protection in Participatory Sensing Sheng Gao 1, Jianfeng Ma 1, Weisong Shi 2 and Guoxing Zhan 2 1 Xidian University, Xi an, Shaanxi 710071, China 2 Wayne State

More information

Issue Article Vol.30 No.2, April 1998 Article Issue

Issue Article Vol.30 No.2, April 1998 Article Issue Issue Article Vol.30 No.2, April 1998 Article Issue Tailorable Groupware Issues, Methods, and Architectures Report of a Workshop held at GROUP'97, Phoenix, AZ, 16th November 1997 Anders Mørch, Oliver Stiemerlieng,

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

UNIT-III LIFE-CYCLE PHASES

UNIT-III LIFE-CYCLE PHASES INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development

More information

Towards an MDA-based development methodology 1

Towards an MDA-based development methodology 1 Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,

More information

Privacy Policy Framework

Privacy Policy Framework Privacy Policy Framework Privacy is fundamental to the University. It plays an important role in upholding human dignity and in sustaining a strong and vibrant society. Respecting privacy is an essential

More information

The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG

The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG The Privacy Case Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG Agenda Introduction Defining the privacy case Privacy-relevant

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

ithrow : A NEW GESTURE-BASED WEARABLE INPUT DEVICE WITH TARGET SELECTION ALGORITHM

ithrow : A NEW GESTURE-BASED WEARABLE INPUT DEVICE WITH TARGET SELECTION ALGORITHM ithrow : A NEW GESTURE-BASED WEARABLE INPUT DEVICE WITH TARGET SELECTION ALGORITHM JONG-WOON YOO, YO-WON JEONG, YONG SONG, JUPYUNG LEE, SEUNG-HO LIM, KI-WOONG PARK, AND KYU HO PARK Computer Engineering

More information

End-to-End Privacy Accountability

End-to-End Privacy Accountability End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?

More information

Sixth Management Seminar for the Heads of National Statistical offices in Asia and the Pacific

Sixth Management Seminar for the Heads of National Statistical offices in Asia and the Pacific COUNTRY PAPER: KYRGYZ REPUBLIC Sixth Management Seminar for the Heads of National Statistical offices in Asia and the Pacific (28 30 May 2007, Hong Kong, China) Mr. Orozmat ABDYKALYKOV Chairman of the

More information

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Jui-Feng Weng, *Shian-Shyong Tseng and Nam-Kek Si Abstract--In general, the design of ubiquitous

More information

HUMAN-COMPUTER INTERACTION: OVERVIEW ON STATE OF THE ART TECHNOLOGY

HUMAN-COMPUTER INTERACTION: OVERVIEW ON STATE OF THE ART TECHNOLOGY HUMAN-COMPUTER INTERACTION: OVERVIEW ON STATE OF THE ART TECHNOLOGY *Ms. S. VAISHNAVI, Assistant Professor, Sri Krishna Arts And Science College, Coimbatore. TN INDIA **SWETHASRI. L., Final Year B.Com

More information

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu

More information

HUMAN COMPUTER INTERFACE

HUMAN COMPUTER INTERFACE HUMAN COMPUTER INTERFACE TARUNIM SHARMA Department of Computer Science Maharaja Surajmal Institute C-4, Janakpuri, New Delhi, India ABSTRACT-- The intention of this paper is to provide an overview on the

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3238-3242 3238 An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Saima Zafar Emerging Sciences,

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter The Future of Smart Everyday Objects Advances in Human Computer Interaction 08.11.2007 Sven Steudter Overview Introduction Economical Chances Privacy, Definitions and Risks Social Challenges and Implications

More information

Enhancing Tabletop Games with Relative Positioning Technology

Enhancing Tabletop Games with Relative Positioning Technology Enhancing Tabletop Games with Relative Positioning Technology Albert Krohn, Tobias Zimmer, and Michael Beigl Telecooperation Office (TecO) University of Karlsruhe Vincenz-Priessnitz-Strasse 1 76131 Karlsruhe,

More information

Exploring Computing Environment Possibilities for Risk Oriented Testing

Exploring Computing Environment Possibilities for Risk Oriented Testing ISSN: 0974-6471, Vol. 10, No. (3) 2017, Pg. 674-682 Oriental Journal of Computer Science and Technology Journal Website: www.computerscijournal.org Exploring Computing Environment Possibilities for Risk

More information

Country Paper : Macao SAR, China

Country Paper : Macao SAR, China Macao China Fifth Management Seminar for the Heads of National Statistical Offices in Asia and the Pacific 18 20 September 2006 Daejeon, Republic of Korea Country Paper : Macao SAR, China Government of

More information

Comprehensive study on Internet-related issues / Étude détaillée sur les questions relatives à l Internet. June 2014 Juin 2014

Comprehensive study on Internet-related issues / Étude détaillée sur les questions relatives à l Internet. June 2014 Juin 2014 Comprehensive study on Internet-related / June 2014 Juin 2014 Étude détaillée sur les questions relatives à l Internet 1 Study scope & framing Study must cover: 1. Access to Information and Knowledge 2.

More information

SDN Architecture 1.0 Overview. November, 2014

SDN Architecture 1.0 Overview. November, 2014 SDN Architecture 1.0 Overview November, 2014 ONF Document Type: TR ONF Document Name: TR_SDN ARCH Overview 1.1 11112014 Disclaimer THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent

Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent Richard Gomer r.gomer@soton.ac.uk m.c. schraefel mc@ecs.soton.ac.uk Enrico Gerding eg@ecs.soton.ac.uk University of Southampton SO17

More information

Resource Review. In press 2018, the Journal of the Medical Library Association

Resource Review. In press 2018, the Journal of the Medical Library Association 1 Resource Review. In press 2018, the Journal of the Medical Library Association Cabell's Scholarly Analytics, Cabell Publishing, Inc., Beaumont, Texas, http://cabells.com/, institutional licensing only,

More information

Putting the Systems in Security Engineering An Overview of NIST

Putting the Systems in Security Engineering An Overview of NIST Approved for Public Release; Distribution Unlimited. 16-3797 Putting the Systems in Engineering An Overview of NIST 800-160 Systems Engineering Considerations for a multidisciplinary approach for the engineering

More information

SECTION 2. Computer Applications Technology

SECTION 2. Computer Applications Technology SECTION 2 Computer Applications Technology 2.1 What is Computer Applications Technology? Computer Applications Technology is the study of the integrated components of a computer system (such as hardware,

More information

Computer-Augmented Environments: Back to the Real World

Computer-Augmented Environments: Back to the Real World Computer-Augmented Environments: Back to the Real World Hans-W. Gellersen Lancaster University Department of Computing Ubiquitous Computing Research HWG 1 What I thought this talk would be about Back to

More information

Interior Design using Augmented Reality Environment

Interior Design using Augmented Reality Environment Interior Design using Augmented Reality Environment Kalyani Pampattiwar 2, Akshay Adiyodi 1, Manasvini Agrahara 1, Pankaj Gamnani 1 Assistant Professor, Department of Computer Engineering, SIES Graduate

More information

The Application of Human-Computer Interaction Idea in Computer Aided Industrial Design

The Application of Human-Computer Interaction Idea in Computer Aided Industrial Design The Application of Human-Computer Interaction Idea in Computer Aided Industrial Design Zhang Liang e-mail: 76201691@qq.com Zhao Jian e-mail: 84310626@qq.com Zheng Li-nan e-mail: 1021090387@qq.com Li Nan

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING

COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING COURSE: MCE 527 DISCLAIMER The contents of this document are intended for practice and leaning purposes at the

More information

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION Teleconference Presentation On the occasion of the Joint ITU-AICTO workshop Interoperability of IPTV in the Arab Region Dubai, United Arab

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

Internet of Things. (Ref: Slideshare)

Internet of Things. (Ref: Slideshare) Internet of Things (Ref: Slideshare) Contents Introduction/Overview The Internet of Things Applications of IoT Challenges and Barriers in IoT Future of IoT Internet Revolution Impact of the Internet Education

More information

The Social Impact of Pervasive Technologies

The Social Impact of Pervasive Technologies The Social Impact of Pervasive Technologies Anne Clarke European Management Services, Leeds, UK clarkeam@compuserve.com Abstract Large scale deployment of communications technologies has produced major

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

System of Systems Software Assurance

System of Systems Software Assurance System of Systems Software Assurance Introduction Under DoD sponsorship, the Software Engineering Institute has initiated a research project on system of systems (SoS) software assurance. The project s

More information

DATA PROTECTION IMPACT ASSESSMENT

DATA PROTECTION IMPACT ASSESSMENT DATA PROTECTION IMPACT ASSESSMENT Tool to support implementation of DPIA Ewa Piatkowska ewa.piatkowska@ait.ac.at Centre for Digital Safety and Security AIT Austrian Institute of Technology PRIVACY AND

More information

End-User Programming of Ubicomp in the Home. Nicolai Marquardt Domestic Computing University of Calgary

End-User Programming of Ubicomp in the Home. Nicolai Marquardt Domestic Computing University of Calgary ? End-User Programming of Ubicomp in the Home Nicolai Marquardt 701.81 Domestic Computing University of Calgary Outline Introduction and Motivation End-User Programming Strategies Programming Ubicomp in

More information

AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS

AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS Eva Cipi, PhD in Computer Engineering University of Vlora, Albania Abstract This paper is focused on presenting

More information

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Location and User Activity Preference Based Recommendation System

Location and User Activity Preference Based Recommendation System . Location and User Activity Preference Based Recommendation System Prabhakaran.K 1,Yuvaraj.T 2, Mr.A.Naresh kumar 3 student, Dept.of Computer Science,Agni college of technology, India 1,2. Asst.Professor,

More information

Digital Swarming. Public Sector Practice Cisco Internet Business Solutions Group

Digital Swarming. Public Sector Practice Cisco Internet Business Solutions Group Digital Swarming The Next Model for Distributed Collaboration and Decision Making Author J.D. Stanley Public Sector Practice Cisco Internet Business Solutions Group August 2008 Based on material originally

More information

Wireless Environments & Privacy

Wireless Environments & Privacy Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist

More information

Chapter 4. Research Objectives and Hypothesis Formulation

Chapter 4. Research Objectives and Hypothesis Formulation Chapter 4 Research Objectives and Hypothesis Formulation 77 Chapter 4: Research Objectives and Hypothesis Formulation 4.1 Introduction and Relevance of the Topic The present study aims at examining the

More information

The Blockchain Ethical Design Framework

The Blockchain Ethical Design Framework The Blockchain Ethical Design Framework September 19, 2018 Dr. Cara LaPointe Senior Fellow Georgetown University Beeck Center for Social Impact + Innovation The Blockchain Ethical Design Framework Driving

More information

Enduring Understandings 1. Design is not Art. They have many things in common but also differ in many ways.

Enduring Understandings 1. Design is not Art. They have many things in common but also differ in many ways. Multimedia Design 1A: Don Gamble * This curriculum aligns with the proficient-level California Visual & Performing Arts (VPA) Standards. 1. Design is not Art. They have many things in common but also differ

More information

EXTENDED TABLE OF CONTENTS

EXTENDED TABLE OF CONTENTS EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS

More information

Data Protection and Ethics in Healthcare

Data Protection and Ethics in Healthcare Data Protection and Ethics in Healthcare Harald Zwingelberg ULD June 14 th, 2017 at Brocher Foundation, Geneva Organized by: with input by: Overview Goal: Protection of people Specific legal setting for

More information

ACCENTURE INDONESIA HELPS REALIZE YOUR

ACCENTURE INDONESIA HELPS REALIZE YOUR ACCENTURE INDONESIA HELPS REALIZE YOUR POTEN TIAL ACCENTURE IN INDONESIA Accenture is the largest consulting services company in Indonesia Close to 50 years of experience in Indonesia, and have consistently

More information

! Computation embedded in the physical spaces around us. ! Ambient intelligence. ! Input in the real world. ! Output in the real world also

! Computation embedded in the physical spaces around us. ! Ambient intelligence. ! Input in the real world. ! Output in the real world also Ubicomp? Ubicomp and Physical Interaction! Computation embedded in the physical spaces around us! Ambient intelligence! Take advantage of naturally-occurring actions and activities to support people! Input

More information

Learning about End-User Development for Smart Homes by Eating Our Own Dog Food

Learning about End-User Development for Smart Homes by Eating Our Own Dog Food Joëlle Coutaz, James L. Crowley (2015): Learning about End-User Development for Smart Homes by Eating Our Own Dog Food. In International Reports on Socio-Informatics (IRSI), Proceedings of the CHI 2015

More information

SMART PLACES WHAT. WHY. HOW.

SMART PLACES WHAT. WHY. HOW. SMART PLACES WHAT. WHY. HOW. @adambeckurban @smartcitiesanz We envision a world where digital technology, data, and intelligent design have been harnessed to create smart, sustainable cities with highquality

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment

OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment SHU-CHEN CHENG1, CHIEN-FENG LAI2 Department of Computer Science and Information Engineering, Southern Taiwan

More information

Indoor Positioning with a WLAN Access Point List on a Mobile Device

Indoor Positioning with a WLAN Access Point List on a Mobile Device Indoor Positioning with a WLAN Access Point List on a Mobile Device Marion Hermersdorf, Nokia Research Center Helsinki, Finland Abstract This paper presents indoor positioning results based on the 802.11

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003

INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003 INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003 A KNOWLEDGE MANAGEMENT SYSTEM FOR INDUSTRIAL DESIGN RESEARCH PROCESSES Christian FRANK, Mickaël GARDONI Abstract Knowledge

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

Issues and Challenges in Ecosystems of Federated Embedded Systems

Issues and Challenges in Ecosystems of Federated Embedded Systems Issues and Challenges in Ecosystems of Federated Embedded Systems Efi Papatheocharous (SICS Swedish ICT, Postdoctoral Research Fellow) Jakob Axelsson (SICS Swedish ICT & Mälardalen University) Jesper Andersson

More information

Design and Application of Multi-screen VR Technology in the Course of Art Painting

Design and Application of Multi-screen VR Technology in the Course of Art Painting Design and Application of Multi-screen VR Technology in the Course of Art Painting http://dx.doi.org/10.3991/ijet.v11i09.6126 Chang Pan University of Science and Technology Liaoning, Anshan, China Abstract

More information

User Policies in Pervasive Computing Environments

User Policies in Pervasive Computing Environments User Policies in Pervasive Computing Environments Jon Rimmer, Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, and David Weir J.Rimmer@sussex.ac.uk Department of Informatics University of Sussex Brighton,

More information

Definition of Pervasive Grid

Definition of Pervasive Grid Definition of Pervasive Grid a Pervasive Grid is a hardware and software infrastructure or space/environment that provides proactive, autonomic, trustworthy, and inexpensive access to pervasive resource

More information

Design and Implementation Options for Digital Library Systems

Design and Implementation Options for Digital Library Systems International Journal of Systems Science and Applied Mathematics 2017; 2(3): 70-74 http://www.sciencepublishinggroup.com/j/ijssam doi: 10.11648/j.ijssam.20170203.12 Design and Implementation Options for

More information

Ultrasonic Indoor positioning for umpteen static and mobile devices

Ultrasonic Indoor positioning for umpteen static and mobile devices P8.5 Ultrasonic Indoor positioning for umpteen static and mobile devices Schweinzer Herbert, Kaniak Georg Vienna University of Technology, Institute of Electrical Measurements and Circuit Design Gußhausstr.

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Javier Jiménez Alemán Fluminense Federal University, Niterói, Brazil jjimenezaleman@ic.uff.br Abstract. Ambient Assisted

More information

LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC)

LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC) LLOYDS BANKING GROUP MATTERS RESERVED TO THE BOARDS (LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC) LLOYDS BANKING GROUP PLC, LLOYDS BANK PLC, BANK OF SCOTLAND PLC & HBOS PLC

More information

The secret behind mechatronics

The secret behind mechatronics The secret behind mechatronics Why companies will want to be part of the revolution In the 18th century, steam and mechanization powered the first Industrial Revolution. At the turn of the 20th century,

More information