Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing

  • J. Bohn
  • V. Coroamă
  • M. Langheinrich
  • F. Mattern
  • M. Rohs


Visions of ambient intelligence and ubiquitous computing involve integrating tiny microelectronic processors and sensors into everyday objects in order to make them “smart.” Smart things can explore their environment, communicate with other smart things, and interact with humans, therefore helping users to cope with their tasks in new, intuitive ways. Although many concepts have already been tested out as prototypes in field trials, the repercussions of such extensive integration of computer technology into our everyday lives are difficult to predict. This contribution is a first attempt to classify the social, economic, and ethical implications of this development.


Supply Chain Ubiquitous Computing Ethical Implication Border Crossing Ambient Intelligence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M. (1991) The Computer for the 21st Century. Scientific American, 265(3):66–75, September 1991.CrossRefGoogle Scholar
  2. 2.
    Ahola, J. (2001) Ambient Intelligence, ERCIM News, No 47, October 2001.Google Scholar
  3. 3.
    Coroama, V., Röthenbacher, F. (2003) The Chatty Environment — Providing Everyday Independence to the Visually Impaired. In: The 2nd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications (UbiHealth2003), October 2003. Available at Scholar
  4. 4.
    Moore, G.E. (1965) Cramming more components onto integrated circuits. Electronics, 38:114–117, April 1965.Google Scholar
  5. 5.
    Finkenzeller, K. (2003) RFID-Handbook. John, Wiley & Sons, 2nd edition.Google Scholar
  6. 6.
    Adamowsky, N. (2000) Kulturelle Relevanz. Ladenburger Diskurs “Ubiquitous Computing”, February 2000. Available at Scholar
  7. 7.
    Araya, A.A. (1995) Questioning Ubiquitous Computing. In: Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science. ACM Press, 1995. Available at Scholar
  8. 8.
    Lucky, R. (1999) Everything will be connected to everything else. Connections. IEEE Spectrum, March 1999. Available at Scholar
  9. 9.
    Thackara, J. (2001) The design challenge of pervasive computing. Interactions, 8(3):46–52, May 2001. Available at Scholar
  10. 10.
    Weiser, M. (1993) Ubiquitous Computing. IEEE Computer, 26(10):71–72, October 1993.Google Scholar
  11. 11.
    Siegele, L. (2002) How about now? A survey of the real-time economy. The Economist, 362(8257):3–18, January 2002.Google Scholar
  12. 12.
    Lee, H.L., Padmanabhan, V., Whang, S. (1997) The Bullwhip Effect in Supply Chains. MIT Sloan Management Review, 38(3):93–102, Spring 1997.Google Scholar
  13. 13.
    Joshi, Y.V. (2000) Information Visibility and its Effect on Supply Chain Dynamics. Master’s Thesis, MIT, June 2000.Google Scholar
  14. 14.
    Fleisch, E. (2002) Von der Vernetzung von Unternehmen zur Vernutzung von Dingen. In: Schögel, M., Tomczak, T., Belz, C. (eds) (2002) Roadm@p to E-Business — Wie Unternehmen das Internet erfolgreich nutzen. Thexis, St. Gallen, pp 270–284.Google Scholar
  15. 15.
    Ferguson, G.T. (2002) Have Your Objects Call My Objects. Harvard Business Review, 80(6):138–144, June 2002.Google Scholar
  16. 16.
    Skiera, B., Spann, M. (2002) Preisdifferenzierung im Internet. In: Schögel, M., Tomczak, T., Belz, C. (eds) (2002) Roadm@p to E-Business — Wie Unternehmen das Internet erfolgreich nutzen. Thexis, St. Gallen, pp 270–284.Google Scholar
  17. 17.
    Siegele, L. (2002) Tante Emma lebt. Die Zeit, (42):27, October 2002.Google Scholar
  18. 18.
    USA Today (2000) Amazon May Spell End for “Dynamic” Pricing. Associated Press. September 29, 2000.Google Scholar
  19. 19.
    Accenture Technology Labs (2001) Silent Commerce. Available at www. accenture. com/xd/xd.asp?it=enweb&xd=services/technology/vision/silent commerce. xml.Google Scholar
  20. 20.
    Maeder, T. (2002) What Barbie Wants, Barbie Gets. Wired Magazine, 10(1), January 2002.Google Scholar
  21. 21.
    Akerlof, G. (1970) The Market for Lemons: Qualitative Uncertainty and the Market Mechanism, The Quarterly Journal of Economics, 84(3), pp 488–500.Google Scholar
  22. 22.
    Reuters (2003) This DVD Will Self-Destruct. Wired News, May 16, 2003. Available at,1282,58883,00.html.Google Scholar
  23. 23.
    Talbott, S. (2000) The Trouble With Ubiquitous Technology Pushers, or: Why We’d Be Better Off without the MIT Media Lab. NetFuture: Technology and Human Responsibility. Available at 100.html#3.Google Scholar
  24. 24.
    Cochrane, P. (2000) Head to Head. Sovereign Magazine, pp 56–57, March 2000.Google Scholar
  25. 25.
    Rotenberg, M. (2001) Testimony and Statement for the Record. Hearing on Privacy in the Commercial World before the Subcommittee on Commerce, Trade, and Consumer Protection, U.S. House of Representatives, March 2001. Available at 0301.html.Google Scholar
  26. 26.
    Lessig, L. (1999) Code and Other Laws of Cyberspace. Basic Books, New York NY, 1999.Google Scholar
  27. 27.
    Westin, A.F. (1967) Privacy and Freedom. Atheneum, New York NY, 1967.Google Scholar
  28. 28.
    Warren, S., Brandeis, L. (1890) The Right to Privacy. Harvard Law Review, 4(1):193–220, December 1890.Google Scholar
  29. 29.
    Marx, G.T. (2001) Murky Conceptual Waters: The Public and the Private. Ethics and Information Technology, 3(3):157–169, July 2001.CrossRefGoogle Scholar
  30. 30.
    Mayo, R.N. (2001) The Factoids Project. July 2001. Available at Scholar
  31. 31.
    Rhodes, B. (1997) The Wearable Remembrance Agent: A System for Augmented Memory. Personal Technologies Journal. Special Issue on Wearable Computing, 1:218–224, January 1997.Google Scholar
  32. 32.
    O’Harrow, Jr. R. (2001) Prozac Maker Reveals Patient E-Mail Addresses. The Washington Post, July 2001.Google Scholar
  33. 33.
    The Declaration of Independence and the Constitution of the United States. Bantam Books, New York. August 1998.Google Scholar
  34. 34.
    Nagel, K.S., Kidd, C.D., O’Connell, T., Day, A., Abowd, G.D. (2001) Family Intercom: Developing a Context-Aware Audio Communication System. In: Abowd, G.D. et al [52], pp 176–183.Google Scholar
  35. 35.
    Westerlund, B., Lindquist, S., Sundblad, Y. (2001) Cooperative Design of Communication Support for and with Families in Stockholm, September 2001. Available at Scholar
  36. 36.
    Rhodes, B., Minar, N., Weaver, J. (1999) Wearable Computing Meets Ubiquitous Computing — Reaping the Best of Both Worlds. In: Proceedings of the Third International Symposium on Wearable Computers (ISWC’ 99), San Francisco CA, October 1999, pp 141–149.Google Scholar
  37. 37.
    Council of Europe (2001) Convention on Cybercrime. ETS No 185. Available at, November 2001.Google Scholar
  38. 38.
    Estrin, D., Culler, D., Pister, K., Sukhatme, G. (2002) Connecting the Physical World with Pervasive Networks. IEEE Pervasive Computing — Mobile and Ubiquitous Systems, 1(1):59–69, January 2002.Google Scholar
  39. 39.
    Satyanarayanan, M. (2001) Pervasive Computing: Vision and Challenges. IEEE Personal Communications, 8(4):10–17, August 2001.CrossRefGoogle Scholar
  40. 40. (2000) Some well publicized examples of domain names disputes. See Scholar
  41. 41.
    Domain Name Handbook (2003) Domain Dispute Index. See Scholar
  42. 42.
    Electronic Frontier Foundation EFF (2003) Blue Ribbon Campaign for free speech online. See Scholar
  43. 43.
    Lyon, D. (2001) Facing the Future: Seeking Ethics for Everyday Surveillance. Ethics and Information Technology, 3(3):171–180, July 2001.CrossRefGoogle Scholar
  44. 44.
    Gonçalves, D.J. (2001) Ubiquitous Computing and AI Towards an Inclusive Society. In: Heller et al [53], pp 37–40.Google Scholar
  45. 45.
    Makris, P. (2001) Accessibility of Ubiquitous Computing: Providing for the Elderly. In: Heller et al [53].Google Scholar
  46. 46.
    Stephanidis, C. (2001) Towards Universal Access in the Information Society. In: Heller et al [53].Google Scholar
  47. 47.
    Adamowsky, N. (2003) Smarte Götter und magische Maschinen — zur Virulenz vormoderner Argumentationsmuster in Ubiquitous-Computing-Visionen. In: Mattern, F. [54], pp 231–247.Google Scholar
  48. 48.
    Winner, L. (1999) The Voluntary Complexity Movement. NetFuture: Technology and Human Responsibility, September 1999. Available at 94.html#3.Google Scholar
  49. 49.
    Hilty, L., Behrendt, S., Binswanger, M., Bruinink, A., Erdmann, L., Fröhlich, J., Köhler, A., Kuster, N., Som, C., Würtenberger, F. (2003) Das Vorsorgeprinzip in der Informationsgesellschaft. Auswirkungen des Pervasive Computing auf Gesundheit und Umwelt. Studie des Zentrums für Technologiefolgen-Abschätzung TA-SWISS, TA 46/2003, August 2003.Google Scholar
  50. 50.
    Dryer, D.C., Eisbach, C., Ark, W.S. (1999) At what cost pervasive? A social computing view of mobile computing systems. IBM Systems Journal, 38(4):652–676.CrossRefGoogle Scholar
  51. 51.
    Dick, P.K. (1956) Minority Report. Fantastic Universe, January 1956.Google Scholar
  52. 52.
    Abowd, G.D., Brumitt, B., Shafer, S. (eds) (2001) Ubicomp 2001: Ubiquitous Computing. Prooceedings Series: Lecture Notes in Computer Science, Vol. 2201, Springer-Verlag.Google Scholar
  53. 53.
    Heller, R., Jorge, J., Guedj, R. (eds) (2001) Proceedings of the 2001 EC/NSF Workshop on Universal Accessibility of Ubiquitous Computing: Providing for the Elderly, Alcáacer do Sal, Portugal, May 2001, ACM Press. See also Scholar
  54. 54.
    Mattern, F. (eds) (2003) Total vernetzt: Szenarien einer informatisierten Welt. Springer-Verlag, 2003.Google Scholar
  55. 55.
    IBM Global Services (2001) Transforming the appliance industry. Switching on revenue streams in services. White Paper, 2001.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • J. Bohn
    • 1
  • V. Coroamă
    • 1
  • M. Langheinrich
    • 1
  • F. Mattern
    • 1
  • M. Rohs
    • 1
  1. 1.Swiss Federal Institute of Technology, Department of Computer Science, Institute for Pervasive, Computing ETH-ZentrumETH ZürichZüurichSwitzerland

Personalised recommendations