Amigo Approach Towards Perceived Privacy
|
|
- Archibald Banks
- 6 years ago
- Views:
Transcription
1 Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy, i.e., how end-users perceive that the system affects their privacy, is one of the key aspects for the acceptance by users of ambient intelligent systems and one of the most complex to handle. Exploratory, field and conceptual design studies were conducted to generate user requirements as input and constraints for the development of mechanisms for the enforcement of privacy preferences. Based on these field studies, a model was created and a prototype was implemented in which the context, the content, and the presence of people was discovered, and shared under various privacysensitive conditions. Keywords: perceived privacy, ambient intelligent system, networked home environment, extended home environment, context-aware applications. 1 Introduction Applications in extended networked home environments are intended to facilitate the communication between users of different households and to provide them with a feeling of a shared ambiance. Connecting people in this way influences their social relationships. Home, as we know it, is a place where people can retreat from society and its social rules. Extended home applications induce intrusions in this familiar and trusted environment. Since ambient intelligent systems are by definition unobtrusive and embedded in the user s environment, users might easily forget their existence and unwillingly have their privacy violated. Perceived privacy or how end-users perceive that the system affects their privacy is one of the key aspects for the acceptance of ambient intelligent systems by users. It is also one of the most complex problems to handle. It is about how, when, and to what extent data about people are revealed to other people within a dynamic social context. The Amigo research into perceived privacy started with user studies [1, 2]. These studies explored daily communications and their related privacy issues in the field by means of a system for presence detection and sharing that information across homes. Conceptual design studies investigated the sensitivity of masking or hiding information that is being shared between different parties in relation to the type of application. These studies provided, in addition to a set of design guidelines the following major observations on user behavior with regard to handling perceived privacy: People use many diverse mechanisms to preserve their social privacy, People share their personal information only within a small community of relatives and friends, M. Mühlhäuser et al. (Eds.): AmI 2007 Workshops, CCIS 11, pp , Springer-Verlag Berlin Heidelberg 2008
2 404 M. Janse et al. People need to perceive a clear benefit for information sharing, People control the level of detail of the information that is being shared, and they are consciously maintaining this control. These observations resulted in a change of approach with regard to the Amigo architecture; handling privacy at the middleware service level by means of a rule-based filter that incorporated user preferences and that would use these preferences to either pass on the data or not. Such a mechanism is not sufficient for handling the user s perceived privacy because it does not offer direct user control. In particular, the type of information that is shared, the level of detail in which the information is shared, with whom that information is shared, and whether it is shared by single individuals or groups of people are crucial variables to take into account. To further investigate these implications an application implementation was developed. 2 Design Concept The major aim is to design a privacy-aware application that is embedded in an ambient in-home network as envisioned by the Amigo project s extended home environment scenario. A content-sharing application was selected as most suitable for this purpose. In this application, context and content data are shared from various sources between different users and locations, context input is used for privacy-based decisions and context-aware feedback is given to users. A subset of the overall Amigo extended home environment scenario was selected (Table 1). Table 1. Application Scenario Maria and Jerry have one child, Roberto. Jerry travels a lot for his work. They use an Amigo system to stay in touch. The system can be used from any display device that is connected to the Internet. By using the system, Maria and Jerry can be together, while they are at different locations. They can exchange information, share pictures, play games, chat, share activities, feel each other s presence and share their social context. Jerry is in the US on a long business trip. Maria likes to show some pictures while they are being together with the family in the week-end. She has three different sets of pictures on the system. The first set of pictures is from her first marriage. She does not want anyone to see these pictures. The second set of pictures, taken at the Zoo, is recent. She wants to look at these pictures with Jerry and Roberto. The third set of pictures show the cocktails that she prepared a few days ago for their friends. She wants to look at these pictures with Jerry and not with Roberto. This sharing application is context dependent and reacts based on the user privacy setting. Two people at different locations can share photos, location and presence. For the technical realization, existing Amigo prototypes were used and where needed extended. To maintain the home ambiance a TV was used as a display medium. Users could set their privacy preferences and navigate by means of a few buttons on a TV remote control. The user interface is built with CE-HTML (a CEA/DLNA standard).
3 Amigo Approach Towards Perceived Privacy Conceptual Model The following design constraints were assumed: Context information is retrieved from the environment. Different control points are used to allow users to control which information they are sharing with their contacts and how that information is shared. The application should allow users to share information and activities with their contacts at other locations. This information includes content, for example the user s photos, context information, for example, the user s exact or approximate location, and the user s social situation. The application will use context information as data to be shared and as data to control the privacy settings, i.e., sharing depend on context. Feedback to the user regarding content and context changes should be represented in different ways, for example, by different icons and/or light colors. The crucial components for handling perceived privacy in the Amigo extended home environment are: the services, the applications, the control, the user and the user s contacts (Figure 1). The information flow between these components results in a context dependent setting, i.e., how the application reacts is context dependent. The service component collects and provides contextual information about the environment and its users, for example, about the house and its inhabitants, such as, recognizing the persons and knowing their activities. The impact of the service component is mostly determined by the sensitivity of the data that it provides. The control component allows users to control the flow of data between components. It provides an interface for setting privacy preferences. Default values can be used when a user has not specified any privacy preferences or when the absence of data is privacy sensitive. The application component provides access to contextual information. Privacy settings will differ per application and per application usage. Contacts communicate with the user; they constitute, for example, the user s family, friends, or any other contact defined by the user. Contacts also have a context dependent factor. The user is also a component in this model, as preference settings differ per person and their context is a dependent factor. Different value combinations of these components create different settings. Applications Services User Control Contacts Fig. 1. Context Dependent Setting - Components context-aware sharing application
4 406 M. Janse et al. The following example illustrates the role of these components for part of the application scenario: if Maria [users] is in her room [services (context)] and is using a sharing application [applications], and her husband Jerry is alone [services (context)] at another location [contacts] and is also logged in to an application [applications], then use setting A- share photos [setting (context dependent)]. In this example, two different services and applications are running at the same time at two different locations. Setting A is a decision made at Maria s location to determine the dissemination of the information (in this case, to share photos). 2.2 Sharing Information Information about presence, location, and content of a user is shared. Presence refers to the status of a user. This status can have different values, e.g., is online, is away, is busy or is offline. Location refers to where a person is located at a specified point in time. Different sources of location information can have different levels of detail, e.g., room, building, and city, for the physical location. Furthermore, they can have the value known location, and do not share. These values can be based on agreements between users. In this way, users have control over the precision by which their location context will be disclosed to other people. The value known location, which is comparable to Lederer et al. s (2003) [3] vague location ordinal precision level, can be used as a custom location setting to simplify the preferences setting for the user and different levels of detail can be shared depending on the character of relationships between persons. This implies that users maintain control by configuring their preference settings with regard to who will see what and when. The application will react according to these preferences setting. Eindhoven WDC AmbiLab Known Location Fig. 2. Example of different levels of precision for location. AmbiLab is the room, WDC is the building, and Eindhoven is the city. Each of these levels can have a within value that is known location and that may be shared or not shared. Content refers to information of interest to persons. Content can have different values for sharing. For example for photos, these values can be: private, public, or conditionally specified like sharing with X when X is alone.
5 Amigo Approach Towards Perceived Privacy Presenting Context Information The information that is being shared about presence, location and content is presented in relation to the context. From the many available choices for the presentation of this information, the use of icons, colored text and colored light was selected, mainly for feasibility reasons. The presence status of an individual person is presented by means of colored text on the TV display. The joined presence status and activities is presented by means of colored lights, i.e., presentation without explicit interruption and integration of prior defined agreements and social conventions. Different colors represent different contexts; for example, being logged on or not in the sharing application, or whether someone else is in the same room as the user or not. In this way, the user in location B gets information about location A. These presence settings represent a compound context; they combine different information sources: activity, availability and location of more than one person. The photo-sharing application is presented by means of photo icons. 3 Implementation Different services and applications are installed in two different Amigo homes (Figure 3). Each home has three main components, the Amigo server, the Amigo client and the Internet. In the prototype, information is shared between the Amigo server which is running various Amigo Intelligent User Services, the Amigo client, which is running the privacy aware applications, and between the two homes, A and B. Fig. 3. Information sharing between two Amigo homes The Amigo server consists of different services running in the home. It functions as a centralized database that stores contextual information about the home and its inhabitants and provides different types of information to the client, e.g., the location of the user. The Intelligent User Services [4, 5] from the Amigo middleware are used to
6 408 M. Janse et al. retrieve contextual information and user profiles. The Context Management Service (CMS) is used to track the location of a user and store this location information on the server. The User Modeling and Profiling Service (UMPS) is used to reason on user context and feedback and to store user profiles and privacy preference settings. The Amigo Client consists of different applications that are running in the home. These applications are, for example, a content sharing application, a lighting application (LivingColor light), and a game application. Users can set their application and location privacy preferences using the interfaces from the application. Users receive feedback from the application interface. Different user states are presented by different colors of light, e.g., online/offline/sharing photos. The Amigo client can be any display device that is connected to the Amigo server and the Internet; in this case a CE-HTML enabled television. Context information is shared between two homes through an application and the Internet. The Internet is used to connect the homes. The Jabber server is used to store the user s contacts information. The Flickr Server [6] is used to upload and store the content; in this case, the user s photos, which have privacy-level tags. The application communicates via a Jabber server (Jabber Software Foundation, 2006 [7]). It exchanges messages on user location information, user availability and application activity between the homes. The user s availability is shown as the user s current status, e.g., is online, is away, is busy or is offline. The Jabber Server is also used for initialization of a photo sharing request and establishing the connection between the two homes. Users are given control over which information is to be shared. Before information is passed from one component to another, it will first go through privacy decision points (PDP). PDPs consist of rule-based software that checks against the user privacy preferences that are stored in the UMPS. They control the information that is being shared between different applications across different homes. Users can modify their privacy settings from the privacy preferences interface. The PDP is enforced to make sure that the application will react according to these privacy settings and the presence and location of the user (user context). The set of photos adapts when the context of the user changes. In sum, this implementation provides a real networked environment in which we can explore the consequences of system variables on user s perceived privacy. 4 Discussion The prototype implementation was demonstrated as a walkthrough based on the initial usage scenario to expert users to generate feedback with regard to the initial user requirements and design guidelines. Such a running prototype system provides a much better carrier for eliciting user feedback with regard to privacy considerations than design concepts and visualizations. It has the advantages of demonstrating the consequences of changes in context and can support the exploration of different situations. The experts that participated in the walkthrough had very different backgrounds, among others, user system interaction; security and encryption; software engineering; system architecture; and CE applications. They trusted the system. They trusted it even more than they trusted other users. One of their quotes: If I know the capability
7 Amigo Approach Towards Perceived Privacy 409 of the system I will trust it; I will have less trust in the people who will be using it. It was also stated that the system will be trustworthy if it takes a conservative decision. This implies that the default value for the privacy setting should be very rigid. It is not desirable that other people know what these settings are. They also wanted a central control or setting to control the application themselves. Another issue regarding trust was expressed as: Can you trust the system that it is sufficiently aware of the context to adapt automatically to the right setting? Being sufficiently aware is the crux that needs more exploration and research work. The relation between system autonomy and privacy is another critical factor. Being able to cheat was one of the requirements revealed by the user studies. Setting different privacy preferences and changing them during a session elicited discussions on how this might affect people s social relationships. With regard to the level of detail for the preference settings it was clear that different levels have different meanings for different people. The following verbalizations illustrate these points: People don t need to know that you have set some kind of privacy setting for them ; If I change my privacy setting for a particular friend, people will infer something, as if I wish to hide something ; If I really wanted to show my privacy settings, I should be able to override them, by having a kind of don t embarrass-me button. Presenting the context information by means of colored light provides opportunities for personal and intimate ambiance sharing. For this the system should be flexible. The prototype only used one light per room, but participants actually desired to have a light presentation for each individual person. The different levels of precision that were maintained in the application for the disclosure of personal information need further exploration. It is quite clear that people require control over their personal information and that they like to vary this level of detail depending on the context at hand. These levels are different for each individual. It appears that people require about 3 levels of detail, but that these levels are at different depth for each individual. These settings might potentially cause social embarrassments and conflicts. In sum, the application implementation made it possible to explore and experiment with privacy settings in a context-aware environment enabled by the Amigo middleware. The results highlight the need for more exploration in different settings and conditions. But it also identified that some privacy controls should be handled in a generic fashion, such as employing privacy rules and that next steps in this research need to focus on constructing more generic models. Acknowledgement The Amigo project is funded by the European Commission as an integrated project (IP) in the Sixth Framework Programme under the contract number IST The Amigo partners are: Philips, Fagor Electrodomesticos, France Telecom, Fraunhofer IMS, Fraunhofer SIT, Ikerlan, INRIA, Italdesign-Giugiaro, SingularLogic, Europaeisches Microsoft Innovation Center, Telematica Instituut, ICCS-NTUA, Telefonica, Univ. Paderborn, VTT.
8 410 M. Janse et al. References [1] Amigo Deliverable D4.7. In: Janse, M., et al. (eds.) Intelligent User Services Privacy and personal security, IST Amigo (2007) [2] Janse, M.D., Vink, P., Soute, I., Boland, H.: Perceived Privacy in Ambient Intelligent Environments. In: Proceedings of the Context Awareness and Trust 2007 Workshop, CAT 2007, Moncton, New Brunswick, Canada, July 20, (2007) (On-line CEUR-WS proceedings ISSN ) [3] Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., Mankoff, J.: Towards Privacy for Ubiquitous Computing, Technical Report UCB-CSD , Computer Science Division, University of California, Berkeley (2003) [4] Amigo Deliverable D4.7. In: Vink, P., et al. (eds.) Intelligent User Services Context Management Service, IST Amigo (2007) [5] Amigo Deliverable D4.7: Intelligent User Services User Modeling and Profiling Service. Otilia Kocsis & Elena Vidjiounaite. IST Amigo (2007) [6] [7] Jaber software foundation,
Privacy as Impression Management
Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210
More informationA User Interface Level Context Model for Ambient Assisted Living
not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,
More informationInteraction Design for the Disappearing Computer
Interaction Design for the Disappearing Computer Norbert Streitz AMBIENTE Workspaces of the Future Fraunhofer IPSI 64293 Darmstadt Germany VWUHLW]#LSVLIUDXQKRIHUGH KWWSZZZLSVLIUDXQKRIHUGHDPELHQWH Abstract.
More informationPersonal Data Protection Competency Framework for School Students. Intended to help Educators
Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework
More informationDistributing Multimedia Elements to Multiple Networked Devices
Distributing Multimedia Elements to Multiple Networked Devices Maddy Janse, Peter van der Stok Philips Research, NL 11th May 2005, Munich Jun Hu ID, TU/e 1/14 Hu? Pervasive computing, AmI? ICE-CREAM OZONE
More informationCollaboration on Interactive Ceilings
Collaboration on Interactive Ceilings Alexander Bazo, Raphael Wimmer, Markus Heckner, Christian Wolff Media Informatics Group, University of Regensburg Abstract In this paper we discuss how interactive
More informationSpade 3 Game Design. Ankur Patankar MS Computer Science Georgia Tech College of Computing Cell: (404)
Spade 3 Game Design By Ankur Patankar MS Computer Science Georgia Tech College of Computing ankur.patankar@gatech.edu Cell: (404) 824-3468 Design Game CS 8803 (Fall 2010) Page 1 ABSTRACT Spade 3 is a card
More informationINTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003 A KNOWLEDGE MANAGEMENT SYSTEM FOR INDUSTRIAL DESIGN RESEARCH PROCESSES Christian FRANK, Mickaël GARDONI Abstract Knowledge
More informationHow to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home
How to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home Laura Daniele, Frank den Hartog, Jasper Roes TNO - Netherlands Organization for Applied Scientific Research,
More informationImplementing Privacy as Symmetry in Location-aware Systems
Implementing Privacy as Symmetry in Location-aware Systems Anders Kofod-Petersen, Espen Klæboe, Jørgen Jervidalo, Kjetil Aaltvedt, Magnus Romnes, and Trond Martin Nyhus Department of Computer and Information
More informationContext-Aware Interaction in a Mobile Environment
Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationMobile Interaction in Smart Environments
Mobile Interaction in Smart Environments Karin Leichtenstern 1/2, Enrico Rukzio 2, Jeannette Chin 1, Vic Callaghan 1, Albrecht Schmidt 2 1 Intelligent Inhabited Environment Group, University of Essex {leichten,
More informationDesign and Implementation Options for Digital Library Systems
International Journal of Systems Science and Applied Mathematics 2017; 2(3): 70-74 http://www.sciencepublishinggroup.com/j/ijssam doi: 10.11648/j.ijssam.20170203.12 Design and Implementation Options for
More informationAMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces
AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces G. Ibáñez, J.P. Lázaro Health & Wellbeing Technologies ITACA Institute (TSB-ITACA),
More informationTA2 Newsletter April 2010
Content TA2 - making communications and engagement easier among groups of people separated in space and time... 1 The TA2 objectives... 2 Pathfinders to demonstrate and assess TA2... 3 World premiere:
More informationPanel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany
The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics
More informationInteractive Aircraft Cabin Simulator for Stress-Free Air Travel System: A Concurrent Engineering Design Approach
Interactive Aircraft Cabin Simulator for Stress-Free Air Travel System: A Concurrent Engineering Design Approach CheeFai Tan 1, Wei Chen and Matthias Rauterberg Designed Intelligence Group, Department
More informationAugmented Home. Integrating a Virtual World Game in a Physical Environment. Serge Offermans and Jun Hu
Augmented Home Integrating a Virtual World Game in a Physical Environment Serge Offermans and Jun Hu Eindhoven University of Technology Department of Industrial Design The Netherlands {s.a.m.offermans,j.hu}@tue.nl
More informationTowards an MDA-based development methodology 1
Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,
More informationContextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media
Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA
More informationEnd User Tools for Ambient Intelligence Environments: An Overview.
See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/221100226 End User Tools for Ambient Intelligence Environments: An Overview. CONFERENCE PAPER
More informationKey factors in the development of digital libraries
Key factors in the development of digital libraries PROF. JOHN MACKENZIE OWEN 1 Abstract The library traditionally has performed a role within the information chain, where publishers and libraries act
More informationA USEABLE, ONLINE NASA-TLX TOOL. David Sharek Psychology Department, North Carolina State University, Raleigh, NC USA
1375 A USEABLE, ONLINE NASA-TLX TOOL David Sharek Psychology Department, North Carolina State University, Raleigh, NC 27695-7650 USA For over 20 years, the NASA Task Load index (NASA-TLX) (Hart & Staveland,
More informationPush-to-talk ios User Guide (v8.0)
Push-to-talk ios User Guide (v8.0) PTT 8.0 ios - Table of Contents 1 Activating PTT on your ios device... 4 How to activate PTT on your Android Smartphone... 4 How to Logout and Login to the PTT Service...
More informationCatholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands
INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce
More informationPhantom-X. Unnur Gretarsdottir, Federico Barbagli and Kenneth Salisbury
Phantom-X Unnur Gretarsdottir, Federico Barbagli and Kenneth Salisbury Computer Science Department, Stanford University, Stanford CA 94305, USA, [ unnurg, barbagli, jks ] @stanford.edu Abstract. This paper
More informationENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS
BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of
More informationUsing Agent Technology for Ambient Assisted Living
Using Agent Technology for Ambient Assisted Living Nikolaos I. Spanoudakis 1 and Pavlos Moraitis 2 1 Applied Mathematics and Computers Laboratory Technical University of Crete, Greece nispanoudakis@isc.tuc.gr
More informationCan the Success of Mobile Games Be Attributed to Following Mobile Game Heuristics?
Can the Success of Mobile Games Be Attributed to Following Mobile Game Heuristics? Reham Alhaidary (&) and Shatha Altammami King Saud University, Riyadh, Saudi Arabia reham.alhaidary@gmail.com, Shaltammami@ksu.edu.sa
More informationWEB I/O. Wireless On/Off Control USER MANUAL
Wireless On/Off Control Technical Support: Email: support@encomwireless.com Toll Free: 1 800 617 3487 Worldwide: (403) 230 1122 Fax: (403) 276 9575 Web: www.encomwireless.com Warnings and Precautions Warnings
More informationMethodology for Agent-Oriented Software
ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this
More informationPervasive Services Engineering for SOAs
Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au
More informationA User-Friendly Interface for Rules Composition in Intelligent Environments
A User-Friendly Interface for Rules Composition in Intelligent Environments Dario Bonino, Fulvio Corno, Luigi De Russis Abstract In the domain of rule-based automation and intelligence most efforts concentrate
More informationAAL middleware specification
2 AAL middleware specification Ambient Assisted Living Joint Programme project no. AAL-2013-6-060 Deliverable 5.2, version 1.0 Lead author: Co-author: Maciej Bogdański, Poznań Supercomputing and Networking
More informationMulti-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living
Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Javier Jiménez Alemán Fluminense Federal University, Niterói, Brazil jjimenezaleman@ic.uff.br Abstract. Ambient Assisted
More informationSPTF: Smart Photo-Tagging Framework on Smart Phones
, pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,
More informationDoor Prizes. Exploring Big Issues with Data in Society: Using Case Studies with Students
7/10/18 Exploring Big Issues with Data in Society: Using Case Studies with Students Door Prizes Kristin Fontichiaro University of Michigan School of Information 4T Virtual Conference on Data Literacy July
More informationPrivacy Policy. Catalyst.Net Limited. Version 1.0
Privacy Policy Catalyst.Net Limited Version 1.0 November 2017 1 Scope 1.1. This Privacy Policy describes how Catalyst collects, uses, discloses, stores and gives access to Personal Information in accordance
More informationUsing the Tax Research Center
Using the Tax Research Center Always connect to the Tax Research Center through NAEA's website to receive the lowest possible price on research. Not a member? Join now members receive the absolutely lowest
More informationPanel: How to create intelligent services that leave the user in control
Panel: How to create intelligent services that leave the user in control Panel Chairman George A. Papadopoulos, Associate Professor Department of Computer Science University of Cyprus george@cs.ucy.ac.cy
More informationCONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017
CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction
More informationScience2Society Boosting innovation efficiency across Europe
Science2Society Boosting innovation efficiency across Europe BESTPRAC workshop September 20th, 2017 Brussels Bert Pluymers bert.pluymers@kuleuven.be This project has received funding from the European
More informationToday s Agenda. BIBSAM- The Royal Library Objectives for the 21st Century. Elsevier s Objective for the 21st Century
Bringing the World s Largest Scientific Database to the Desktops of BIBSAM-The Royal Library Researchers. Today s Agenda Regional Sales Offices -- Teams Review of Library Objectives Lenerl Sharp Account
More informationGo Daddy Online Photo Filer
Getting Started and User Guide Discover an easier way to share, print and manage your photos online! Online Photo Filer gives you an online photo album site for sharing photos, as well as easy-to-use editing
More informationPersonas & scenarios. TUTORIAL 3 Shyamli Sindhwani
Personas & scenarios TUTORIAL 3 Shyamli Sindhwani ssin820@aucklanduni.ac.nz Personas Archetype or character that represents a potential user of your website or system. A narrative description of a synthetic
More informationDocuSign for Sugar 7 v1.0. Overview. Quick Start Guide. Published December 5, 2013
Quick Start Guide DocuSign for Sugar 7 v1.0 Published December 5, 2013 Overview This guide provides information on installing and signing documents with DocuSign for Sugar7. The Release Notes for DocuSign
More informationKissenger: A Kiss Messenger
Kissenger: A Kiss Messenger Adrian David Cheok adriancheok@gmail.com Jordan Tewell jordan.tewell.1@city.ac.uk Swetha S. Bobba swetha.bobba.1@city.ac.uk ABSTRACT In this paper, we present an interactive
More informationhow many digital displays have rconneyou seen today?
Displays Everywhere (only) a First Step Towards Interacting with Information in the real World Talk@NEC, Heidelberg, July 23, 2009 Prof. Dr. Albrecht Schmidt Pervasive Computing University Duisburg-Essen
More informationCitiTag Multiplayer Infrastructure
CitiTag Multiplayer Infrastructure Kevin Quick and Yanna Vogiazou KMI-TR-138 http://kmi.open.ac.uk/publications/papers/kmi-tr-138.pdf March, 2004 Introduction The current technical report describes the
More informationDemonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools
Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information
More informationEntering Checkpoint Data
Entering Checkpoint Data How do I change which Checkpoint Period I m viewing? To change the period from one to another, here are the steps: On the right side of the screen, click the grey drop-down "Change
More informationA Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment
A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare
More informationClick here to give us your feedback. New FamilySearch Reference Manual
Click here to give us your feedback. New FamilySearch Reference Manual January 25, 2011 2009 by Intellectual Reserve, Inc. All rights reserved Printed in the United States of America English approval:
More informationEthical and social aspects of management information systems
Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How
More informationThe Co-existence between Physical Space and Cyberspace
The Co-existence between Physical Space and Cyberspace A Case Study WAN Peng-Hui, LIU Yung-Tung, and LEE Yuan-Zone Graduate Institute of Architecture, National Chiao Tung University, Hsinchu, Taiwan http://www.arch.nctu.edu.tw,
More informationediana Embedded Systems for Energy-Efficient Buildings
ediana Embedded Systems for Energy-Efficient Buildings www.artemis-ediana.eu Aitor Arriola, IKERLAN aarriola@ikerlan.es 4 th Concertation Meeting on Monitoring and Control Brussels, June 2 nd 2010 Project
More informationThe OASIS Concept. Thessaloniki, Greece
The OASIS Concept Evangelos Bekiaris 1 and Silvio Bonfiglio 2 1 Centre for Research and Technology Hellas, Hellenic Institute of Transport, Thessaloniki, Greece abek@certh.gr 2 PHILIPS FIMI, Saronno, Italy
More informationFamilySearch Tools for Advanced Users
FamilySearch Tools for Advanced Users For this and more information about FamilySearch go to the FamilySearch blog at: https://www.familysearch.org/blog/ As with any website, there are many advanced capabilities
More informationSemantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture
Western University Scholarship@Western Electronic Thesis and Dissertation Repository August 2011 Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Diego Zuquim
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationReport. RRI National Workshop Germany. Karlsruhe, Feb 17, 2017
Report RRI National Workshop Germany Karlsruhe, Feb 17, 2017 Executive summary The workshop was successful in its participation level and insightful for the state-of-art. The participants came from various
More informationGDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals
GDPR Awareness Kevin Styles Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals Introduction Privacy and data protection are fundamental rights
More informationA Survey of Autonomic Computing Systems
A Survey of Autonomic Computing Systems Mohammad Reza Nami, Koen Bertels Computer Engineering Laboratory, Delft University of Technology Abstract The evolution of networks and Internet has introduced highly
More informationASSEMBLY - 35TH SESSION
A35-WP/52 28/6/04 ASSEMBLY - 35TH SESSION TECHNICAL COMMISSION Agenda Item 24: ICAO Global Aviation Safety Plan (GASP) Agenda Item 24.1: Protection of sources and free flow of safety information PROTECTION
More informationieat: An Interactive Table for Restaurant Customers Experience Enhancement
ieat: An Interactive Table for Restaurant Customers Experience Enhancement George Margetis 1, Dimitris Grammenos 1, Xenophon Zabulis 1, and Constantine Stephanidis 1,2 1 Foundation for Research and Technology
More informationPotential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain
This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting
More informationSustainable information culture: what perception do information professionals have on their practices
Sustainable information culture: what perception do information professionals have on their practices Dominique Maurel, Associate Professor École de bibliothéconomie et des sciences de l information Université
More informationIntroduction Pervasive Computing and Urban Development Issues for the individual and society JSY Chin, V Callaghan, G Clarke, H Hagras, M Colley Intelligent Inhabited Environments Group http://iieg.essex.ac.uk
More informationAuto-Explanation System: Player Satisfaction in Strategy-Based Board Games
Auto-Explanation System: Player Satisfaction in Strategy-Based Board Games Andrew Chiou 1 and Kok Wai Wong 2 1 School of Computing Sciences, CQUniversity Australia, Rockhampton Campus, Rockhampton Campus,
More informationThe HiveSurf Prototype Project - Application for a Ubiquitous Computing World
The HiveSurf Prototype Project - Application for a Ubiquitous Computing World Thomas Nicolai Institute for Media and Communications Management University of St.Gallen thomas.nicolai@unisg.ch Florian Resatsch
More informationPervasive Computing: Study for Homes
Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913 Issue Sept 2011, Vol. 4 71 Pervasive Computing: Study for Homes Department of Computer Science, Himachal Pradesh University,
More informationOBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK
xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras
More informationMANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS
MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University, Puducherry, India. vengat.mailbox@gmail.com, dhavachelvan@gmail.com
More informationAn Audio-Haptic Mobile Guide for Non-Visual Navigation and Orientation
An Audio-Haptic Mobile Guide for Non-Visual Navigation and Orientation Rassmus-Gröhn, Kirsten; Molina, Miguel; Magnusson, Charlotte; Szymczak, Delphine Published in: Poster Proceedings from 5th International
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationLegacy FamilySearch Overview
Legacy FamilySearch Overview Legacy Family Tree is "Tree Share" Certified for FamilySearch Family Tree. This means you can now share your Legacy information with FamilySearch Family Tree and of course
More informationANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances
ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances In June 2015, the CEN and CENELEC BT members were invited to share their views on the need for
More informationOnline Identity By CommonLit Staff 2014
Name: Class: Online Identity By CommonLit Staff 2014 Consider the different ways we express our identity, especially in the new age of technology. The Internet has heavily shaped our notion of identity.
More informationAgent-Based Systems. Agent-Based Systems. Agent-Based Systems. Five pervasive trends in computing history. Agent-Based Systems. Agent-Based Systems
Five pervasive trends in computing history Michael Rovatsos mrovatso@inf.ed.ac.uk Lecture 1 Introduction Ubiquity Cost of processing power decreases dramatically (e.g. Moore s Law), computers used everywhere
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationPerformance Evaluation of an Online Text-Based Strategy Game
Performance Evaluation of an Online Text-Based Strategy Game Nazleeni S. Haron, Mohd K. Zaime, Izzatdin A. Aziz and Mohd H. Hasan Abstract Text-based game is supposed to be a low resource consumption application
More informationField Device Manager Express
Honeywell Process Solutions Field Device Manager Express Software Installation User's Guide EP-FDM-02430X R430 June 2012 Release 430 Honeywell Notices and Trademarks Copyright 2010 by Honeywell International
More informationScreens for Content. Kids Media Journeys revealed
Screens for Content Kids Media Journeys revealed Every day children look for media content on-screen - be it on, tablet, smartphone, offline or online. We followed their content journey to understand what
More informationPromoting citizen-based services through local cultural partnerships
Promoting citizen-based services through local cultural partnerships CALIMERA Policy Conference Copenhagen, January 2005 Ian Pigott European Commission Directorate General Information Society Directorate
More information04 - Introduction to Privacy
04 - Introduction to Privacy Lorrie Cranor, Blase Ur, and Rich Shay Engineering & Public Policy January 22, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security 1 Today! What does privacy
More informationSelecting Photos for Sharing
MHCI Team Ben Elgart Saara Kamppari Bridget Lewis Ajay Prasad Yong Woo Rhee Lalatendu Satpathy Microsoft Live Labs Steven Drucker Selecting Photos for Sharing Client-Sponsored MHCI Capstone Project Ben
More informationIoT in Health and Social Care
IoT in Health and Social Care Preserving Privacy: Good Practice Brief NOVEMBER 2017 Produced by Contents Introduction... 3 The DASH Project... 4 Why the Need for Guidelines?... 5 The Guidelines... 6 DASH
More informationHCI: CONTEXTUAL INQUIRY STORYBOARDS, DESIGN PATTERNS. Dr Kami Vaniea
HCI: CONTEXTUAL INQUIRY STORYBOARDS, DESIGN PATTERNS Dr Kami Vaniea 1 First, the news Privacy dark patterns http://darkpatterns.org/pr ivacy-zuckering/ Can you spot the dark pattern? 2 First, the news
More informationPractical measures to encourage the diffusion of green technologies: Licensing Fast tracking of green patents The GreenXchange Platform
Practical measures to encourage the diffusion of green technologies: Licensing Fast tracking of green patents The GreenXchange Platform Ahmed Abdel Latif Senior Programme Manager Innovation, Technology
More informationUser Guide: PTT Application - Android. User Guide. PTT Application. Android. Release 8.3
User Guide PTT Application Android Release 8.3 March 2018 1 1. Introduction and Key Features... 6 2. Application Installation & Getting Started... 7 Prerequisites... 7 Download... 8 First-time Activation...
More informationELG 5121/CSI 7631 Fall Projects Overview. Projects List
ELG 5121/CSI 7631 Fall 2009 Projects Overview Projects List X-Reality Affective Computing Brain-Computer Interaction Ambient Intelligence Web 3.0 Biometrics: Identity Verification in a Networked World
More informationThe GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD)
The GDPR and Upcoming mhealth Code of Conduct Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) EU General Data Protection Regulation (May 2018) First major reform in 20 years 25 th May 2018 no
More informationGetting started with AutoCAD mobile app. Take the power of AutoCAD wherever you go
Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go i How to navigate this book Swipe the
More informationCPE/CSC 580: Intelligent Agents
CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent
More informationThe Impact of Smartphone Technology in Clinical Practice Session 46, March 6, 2018 Dr. Sean P Spina, BScPharm, ACPR, PharmD, FCSHP Clinical Pharmacy
The Impact of Smartphone Technology in Clinical Practice Session 46, March 6, 2018 Dr. Sean P Spina, BScPharm, ACPR, PharmD, FCSHP Clinical Pharmacy Coordinator - Island Health Clinical Assistant Professor
More informationDesigning the user experience of a multi-bot conversational system
Designing the user experience of a multi-bot conversational system Heloisa Candello IBM Research São Paulo Brazil hcandello@br.ibm.com Claudio Pinhanez IBM Research São Paulo, Brazil csantosp@br.ibm.com
More informationTechnical Requirements of a Social Networking Platform for Senior Citizens
Technical Requirements of a Social Networking Platform for Senior Citizens Hans Demski Helmholtz Zentrum München Institute for Biological and Medical Imaging WG MEDIS Medical Information Systems MIE2012
More informationVirtual Foundry Modeling and Its Applications
Virtual Foundry Modeling and Its Applications R.G. Chougule 1, M. M. Akarte 2, Dr. B. Ravi 3, 1 Research Scholar, Mechanical Engineering Department, Indian Institute of Technology, Bombay. 2 Department
More informationA Service-Oriented Platform for Pervasive Awareness Systems
2009 International Conference on Advanced Information Networking and Applications Workshops A Service-Oriented Platform for Pervasive Awareness Systems C. Goumopoulos 1, A. Kameas 1,2, E. Berg 3, I. Calemis
More information